<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2923012&amp;fmt=gif">

Welcome our new partner SolarWinds Inc.!

Rutter Networking Technologies is pleased to announce its newest partner, SolarWinds Inc. SolarWinds is a powerful and affordable IT management software to customers worldwide – from Fortune 500 enterprises to small businesses. As a software provider that can scale across various size companies, SolarWinds provides customers downloadable, easy to use, maintain, and provide the power, scale, and flexibility needed to address users’ management priorities.

Read More

Identity Management: The Rutter Solution

One of the common questions that arises in the IT industry today, what is Identity Management? Identity Management (IDM) is having governance or policy over who has access to what information out of your existing users.  The old way of giving users within your environment access to certain servers, files, etc. was on an as-need and individual basis. Applying governance on an individual basis meant an IT resource would manually have to provision rights for users. As technologies in companies swell, the likelihood of mistakes using a manual process would only increase with time. This is not only time consuming, but hard to manage. It also introduced points of vulnerability in guaranteeing compliance with standards such as HIPPA, Sarbanes Oxley and so on.

Read More

1st #RNTChat -- August 22nd at 1PM -- Mobile Device Management (MDM)

How many ‘smart’ devices do you own? A Smart Phone? A Tablet? A Laptop? An e-reader? If you’re like most people, the answer is all of the above. As devices have become smaller, versatile, and more affordable it’s not all that uncommon for people that own these devices to use them both at home and in the workplace. However, this industry trend does not come without security ramifications, having more devices increases the need for the security and management.  A lost Smart Phone or tablet could put your personal and business data at risk and expose sensitive information to unauthorized individuals.

Read More

MDM (Mobile Device Management)

Mobile device management seems ideal for any business but necessary steps that need to be taken before implementing a MDM system. Mobile Device Management or MDM is the implemented policy allowing users to access various pieces of information from a mobile device that in most instances would normally be stored on desk top or in a remote server. This could range from that users e-mail, data sheets, or other applications that the company is using on a regular basis. Currently, the most commonly used devices that are used to access this information are tablets, laptops, smart phones, mobile printers, and mobile POS devices.

Read More

Welcome to the Rutter Networking Blog Site

Welcome to the Rutter Networking Technologies, Inc. Blog site.

Read More

In Depth VMware Monitoring In SCOM with nworks 5.7

Veeam has recently released Version 5.7 of the nworks Management Pack for Microsoft System Center Operations Manager (SCOM), expanding Rutter's Monitoring & Management competency.  With the new version, nworks now supports VMware ESXi 5.0 and VMware vCenter Server 5.0.

Read More

Packet Captures on Firewalls

If you have used Check Point for any period of time, you’ve probably run into the ‘fw monitor’ command which is a very useful troubleshooting tool in a variety of scenarios.

Read More