Sage 50 Software on the iMac, iPad, and iPhone.

Did you know that Qutera offers Sage 50 anywhere any time access from Apple Devices. We support iMac, iPad, and iPhone access of your accounting software in the office or on the go!

Qutera currently offers Sage 50 Accounting 2014, at the special price of only $175.00 per month, includes 5 users and 20GB Storage Space. Receive an additional 10% discount on annual payments.

Qutera is the fastest, most secure and affordable Sage Authorized Hosting Partner.

Click here to Get Started | Find out more about Sage Hosting Providers | Find out more about Qutera



QuickBooks for $29.95 a month, license included.

Qutera™ is currently offering hosting for QuickBooks Pro 2014, including the license, at the special price of only $29.95 per user, per month. Receive an additional 10% discount on annual payment.

Qutera™ is the fastest, most secure and affordable Intuit Authorized Hosting Partner. No terminal services desktops, run the application right on your local desktop. Printers just work, copy and paste information between your cloud local applications.

Qutera fully Supports all Apple and Android products (Mac, iPad, Android devices).

Click here to Get Started | Find out more about Intuit Hosting | Find out more about Qutera™


Qutera provides comprehensive cloud security to its clients.

Recently a report was created through SSL Labs, the authority on internet (Cloud) security, to test the SSL Security of the various Intuit Authorized Commercial Hosting companies. Qutera was the only provider to score an (A+) Overall,  PCI, and FIPS Compliant.

Qutera™ Report Link :

Qutera™ is not just a hosting company, but develops and hosts some of the industries leading edge solutions. They understand security and provide the most comprehensive set of active measures available. Their four prong approach to hosting and edge security ensures the safety of their clients, their software and data. Qutera™ has been online since 2008 and have never been breached.


Qutera™ Security Model provides multiple layers of protection from the physical data center all the way through to the database. Security is the core of the Qutera™ infrastructure, not something that’s been bolted on, but a planned architecture built around security.


The Qutera™ infrastructure exceeds the compliance mandates for HIPAA, FIPS and PCI DSS with a secure, validated cloud. This auditor friendly environment protects healthcare and payment businesses of all sizes from the risk of crippling cybercrime.


Only hardware, software, systems and configurations designed specifically for high performance, production workloads meet the entry criteria for the Qutera™ cloud. Secure servers are ranked #1 for performance in 3rd party benchmarks.


Proactive support meets control and visibility. With over 24 distinct points of service; Qutera™ builds robust APIs and a powerful portal designs, Qutera™ serves as an extension of any IT department. We take pride in providing automation with a human touch.

Cloud Computing and Virtualization gives you agility and efficiency to instantly expand your business. Qutera™ handles the complex issues of data network entrance and egress points, this brings a whole host of new security issues – data co-mingling, privileged user abuse, snapshots and backups, data deletion, data leakage, geographic regulatory requirements, cloud super-admins, outside packet sniffing, denial of service and many more. Fortunately, the experts at Qutera™ agree that encryption is the unifying cloud security control, allowing you protect, control and comply. Security certificates are not evidence of a secure and encrypted network.

Qutera™ has proven encryption and enterprise key management solutions create a trusted and compliant environment by solving the critical challenges of data governance, control, and ownership – no matter where you are or how you access your data.

BY: Gerald Livingston; President, CEO








Are you using a secure QuickBooks hosting company?

Recently a report was created through SSL Labs, the authority on internet (Cloud) security, to test the SSL Security of the various Intuit Authorized Commercial Hosting companies. While all these companies were audited as secure at one time or another, and can produce a security certificate (https:// with lock icon); that does not mean that your data is safe.

Due to the sensitive nature of the information being transmitted by these companies, it was decided to take the top tier companies and see how they stack up against one another on an actual attack.

Rating Guilde | SSL Server Rating Guide 2014

Below is an overall grade, detailed list of areas tested and on the last page, are the companies PCI and FIPS compliant status, and link to the actual report.

1. (A+) Overall  | PCI and FIPS Compliant | Qutera : Qualys SSL Labs –

2. (A-) Overall | PCI Compliant | Unidata / Skyline : Qualys SSL Labs –

3. (B) Overall  | PCI Compliant | My Own ASP : Qualys SSL Labs –

4. (B) Overall  | PCI Complaint | Harbor Cloud : Qualys SSL Labs –

5. (B) Overall  | PCI Compliant | Novel ASPect : Qualys SSL Labs –

6. (B) Overall  | PCI Compliant | Swizznet : Qualys SSL Labs –

7. (B) Overall  | PCI Compliant | SkySphere : Qualys SSL Labs –

8. (B) Overall  | PCI Compliant | Infinitely Virtual : Qualys SSL Labs –

9. (B) Overall  | PCI Compliant | Novel ASPect : Qualys SSL Labs –

10. (F) Overall | Cloud 9 Real Time : Qualys SSL Labs –

11. (F) Overall | MyVAOQualys SSL Labs –

12. (F) Overall | InsynQ / CPAASP : Qualys SSL Labs –

13. (F) Overall | XCentric : Qualys SSL Labs –

14. (X) Overall | Right Networks : Openly Supplied an RDP Connection and No Protocols are supported.

This report is quite shocking. Only 2 companies passed for security and of those that failed, it is most likely because they are trying to lower security to achieve faster internet speed. However, Qutera ( ) and Unidata ( ). Are both able to deliver the fastest speeds, over low broadband and still provide the best encryption service.


ADDENDUM 1.00 | April 23rd, 2014

UPGRADED: (B) Overall | PCI Compliant | Cloud 9 Real Time : 

ADDENDUM 1.01 | May 12th, 2014

UPGRADED: (A+) Overall | PCI and FIPS Compliant | Qutera :

Is the cloud truly secure?

Cloud Security: Understanding SSL Deployment Best Practices

shutterstock_183804560Most cloud hosting companies and even your favorite SaaS applications, are open to security attacks. Their are many reasons for this, but mainly it comes down to two factors

First, the IT personnel within these companies many not have the skills necessary to implement security properly. Security is not a “Lock Icon” and the words “https://” in your browser bar. You can have this and be totally vulnerable to attacks and theft of your data. Security begins at the server level, then the gateways, then the protocols, then encryption during transports, then your local devices, just to name a few over arching examples. The most common attack is a hacker listening to your data as it passes through the internet; and if it is not encrypted properly, they can have access to everything you see and all the data in the transmission.

Second, the cloud providers are trying to improve the speed of their application transmissions. Broadband costs a lot and customers demand that their applications run smoothly. Therefore, most terminal servers, remote desktops, and other streaming services have minimal security. This ensures a speedy packet exchange between the host server and the clients device. Example: a data packet with encryption and session based security is larger (100% more) and takes more broadband to transmit; thereby slowing down the user experience. However, a simple session packet with no encryption travels mush faster, costs less and the average end user has no way of knowing the difference.

The IT personnel implementing security and the firms that try to audit security deployments, are typically not as expert as you might think. You need a true understanding of so many IT disciplines to implement cloud based security or perform an outside audit of it (Programming, Networking, Server Deployments, Routing, Datacenter Operations, LEC Operations, Virtualization, ISP Edge Setups, etc.). With the shortage of expert IT personnel, someone with this much knowledge and experience is very hard to come by. They are typically contractors or are $200K+ employees of large tech firms. The average accounting firm and indeed even some of the best hosting companies, just simply cannot afford these type of personnel.

I recently meet a client who stated that their security was setup by a retired, government security expert. I said, “Well that sounds good, but the US government is about 10 years behind on security and if I said I worked for NASA, does that make me a rocket scientist or a janitor.” Last year a major law firm from the tobacco settlement cases, built a new server farm and had a “White Hat Hacker”, with excellent credentials from other fortune 500 companies setup their cloud security. The CEO has been a good friend for many years, so he asked my team at Cloud Jitsu to see how secure they really were. We listened on the outside for RDP (Terminal Services) packets to pass. They were not encrypted. We observed the screen cast of an employee logging in and watched as he sifted through case files and other information. I had lunch a week later with their CEO, told him the case numbers, assigned attorneys and main argument in 6 different cases. He was floored! I told him the fix was simple; add more broadband and encrypt you RDP data sessions with a 128 or 256 bit security in transmission path.

Bringing clarity to Cloud Security.

SSL/TLS is a deceptively simple technology. It is easy to deploy, and it just works . . . except that it does not, really. The first part is true—SSL is easy to deploy—but it turns out that it is not easy to deploy correctly. To ensure that SSL provides the necessary security, users must put more effort into properly configuring their network and program servers.

In 2008, Qutera began working with SSL Labs because we wanted to understand how SSL was used and to remedy the lack of easy-to-use SSL tools and documentation. We have achieved some of our goals through thier global surveys of SSL usage, as well as the online assessment tool, but the lack of documentation is still evident.

This document should be your first step toward addressing that problem. The focus in this document is on advice that is practical and easy to understand. For those interested in advanced topics, they provide references at the end of the guide.

Download the guide:

SSL/TLS Deployment Best Practices (PDF)
Version 1.3 / 17 September 2013

SaaS developers use the Agile Methodology.

What Is the Agile Methodology?

The development of SaaS applications that proposes alternatives to traditional IST standards and project management. This approach is typically used in web based software development to help businesses respond to unpredictability and speed of an ever changing marketplace.

Who is Cloud Jitsu?

cloud-jitsu-smallCloud Jitsu is the most adaptive SaaS development company. Cloud Jitsu has a proprietary way of introducing Agility into the development process, by using the Agile Methodology; due to its simplicity and flexibility. Because Cloud Jitsu and the Agile Methodology’s popularity, many organizations claim to be following the Agile method, but aren’t doing anything close to Cloud Jitsu’s approach. Cloud Jitsu emphasizes empirical feedback, team self management, and striving to build properly tested product increments within short testing iterations. Cloud Jitsu’s implementation of the Agile Methodology usually comes into conflict with existing habits at established non-Agile software development projects and legacy organizations.

Cloud Jitsu uses three roles: Product Owner, Cloud Jitsu Team and Review Group (Made up from bithe owner and Cloud Jitsu members). The responsibilities of the traditional project manager role are split up among these three roles.

Cloud Jitsu has five meetings: Project Proposal (Acquisition), Sprint project planning meeting (Startup), daily sprint management, weekly sprint review meetings with three milestone elements (Technical/Design Review, Alpha Module Testing, and the Beta Testing), and the project closeout meeting.

Many books and classes are available from a variety of competing sources of varying accuracy and quality.  One place Cloud Jitsu and Qutera recommends you start would be the Scrum Training Series, which uses an entertaining approach to cover the most popular way of introducing Agile to teams. You can also download the 6-page illustrated Scrum Reference Card.

Origins of the Agile Methodology and Cloud Jitsu?

In 1970, Dr. Winston Royce presented a paper entitled “Managing the Development of Large Software Systems,” which criticized sequential software development. He asserted that software should not be developed like an automobile on an assembly line, in which each piece is added in sequential phases. In such sequential phases, every phase of the project must be completed before the next phase can begin. Dr. Royce recommended against the phase based approach in which developers first gather all of a project’s requirements, then complete all of its architecture and design, then write all of the code, and so on. Royce specifically objected to this approach due to the lack of communication between the specialized groups that complete each phase of work.

It’s easy to see how the sequential methodology is far from optimized compared to agile methodology that Cloud Jitsu uses. First of all, it assumes that every requirement of the project can be identified before any design or coding occurs. Put another way, do you think you could tell a team of developers everything that needed to be in a piece of software before it was up and running? Or would it be easier to describe your vision to the team if you could react to functional software? Many software developers have learned the answer to that question the hard way: At the end of a project, a team might have built the software it was asked to build, but, in the time it took to create, business realities have changed so dramatically that the product is irrelevant. In that scenario, a company has spent time and money to create software that no one wants. Development timeframes need to move from 2-3 years to less than 1 year; Cloud Jistu’s use of the Agile Methodology, makes that possible. Cloud Jistu makes it possible to ensure the end product will still be relevant and on budget when it is actually finished?

Why Cloud Jitsu?

Cloud Jitsu provides opportunities to assess the direction of a project throughout the development lifecycle. This is achieved through thier regular cadences of work, known as sprints or iterations, at the end of which teams must present a potentially shippable product increment. Cloud Jitsu does this focusing on the repetition of abbreviated work cycles (modules) as well as the functional product they yield, their implementation of the agile methodology is described as “iterative” and “incremental.” In a standard “waterfall method” project model, development teams only have one chance to get each aspect of a project right. In an agile paradigm, every aspect of development — requirements, design, etc. — is continually revisited throughout the lifecycle to ensure the project stays on track. When a team stops and re-evaluates the direction of a project every week, there’s always time to steer the development in agreed direction; thereby managing in “mission creep” or “deviations” to the agreed design.

The results of this “inspect-and-review” approach to development greatly reduces both development costs and time to market. Because teams can develop software at the same time they’re reviewing requirements, the phenomenon known as “analysis paralysis” is less likely to impede a team from making progress because of deviations in design. And because a team’s work cycle is limited to weekly reviews, it gives stakeholders recurring opportunities to calibrate releases for success in the real world. Agile development methodology helps companies build the right product. Instead of committing to market a piece of software that hasn’t even been written yet. Cloud Jitsu empowers its teams to continuously replan their release to optimize value throughout development, allowing the application to be as competitive as possible in the marketplace, and allowing the proper timing for deviations and enhancement inclusion; without impacting the project timeline and agreement by all involved. Development using an agile methodology preserves a product’s critical market relevance and ensures a team’s work doesn’t wind up on a shelf, never released.

Intuit ProSeries Tax Cloud Hosting


Do you have multiple offices or want to work from more than one location? Now you can access your ProSeries Software anytime, from anywhere and on virtually any internet enabled device.

Intuit ProSeries Tax is now hosted by Qutera through their SaaS managed services offering.

11022919-young-handsome-business-man-engeneer-in-datacenter-server-roomProSeries Tax software is hosted in the cloud environment to enable 24X7 accessibility and real time collaboration among you accounting firms end users. ProSeries Tax in the Qutera cloud is a viable option for the small and budding business enterprises as it offers many advantages like reduced cost of ownership, easy installation, anytime-anywhere access and easy integration with other applications like AWS, Quickbooks, and Microsoft Office applications.

You can get started today with 2 users and 2 applications for Only $85.00 per month. Each SaaS server subscription includes the following access and services:

  • Users per subscription (performance based on user activity)
  • Applications per subscription(based on server resources selected)
  • Windows Server 2008 R2 SP1, Standard Edition
  • 2x Intel® Xeon® E7-4870 2.40GHz, 30M cache, 6.4 GT/s QPI, Turbo, HT, 10C, 1066MHz BUS
  • 1066MHz, Quad Ranked LV RDIMMs for 2 Processors, Perf Optimized
  • 15K RPM SAS HDD with 6Gbps Transfer Rate
  • Terminal Services Desktop or Streaming Application Remote Access
  • CISCO Edge Network Security (Managed By Qutera Support)
  • Unlimited Bandwidth Usage (Over 300Mbps available)

Qutera SaaS Cloud Servers extend your business reach into the customization of your own private Cloud. You can install your choice of applications ($10.00 Per Additional Application) and quantity of users ($30.00 Per Additional User).

Additional Package Pricing Details:

SaaS Package (2 Users, 2 Applications) – $85.00
SaaS Package (2 Users, 3 Applications) – $95.00
SaaS Package (2 Users, 4 Applications) – $105.00
SaaS Package (3 Users, 2 Applications) – $115.00
SaaS Package (3 Users, 3 Applications) – $125.00
SaaS Package (3 Users, 4 Applications) – $135.00
SaaS Package (4 Users, 2 Applications) – $145.00
SaaS Package (4 Users, 3 Applications) – $155.00
SaaS Package (4 Users, 4 Applications) – $165.00
SaaS Package (5 Users, 2 Applications) – $175.00
SaaS Package (5 Users, 3 Applications) – $185.00
SaaS Package (5 Users, 4 Applications) – $195.00


Qutera takes applications that were made to reside on a local environment and enables them to become cloud accessed software. Qutera can take virtually any application and turn it into what we call a SaaS Enabled Application offering. Qutera’s proprietary streaming application technology allow you to use the SaaS application from your local desktop or Mobile device. This allows distributed access which reduces cost and lowers overhead. Software Developers, ISVs and even consumer business will have a strong, competitive edge by moving these types of applications to the cloud.

To get started now, click here. For more information contact Qutera Sales at (800) 969-9524.

Once you subscribe to your own Qutera SaaS Cloud Hosting Environment and the server is provisioned; one of our on boarding experts will contact you and walk you through the process of accessing ProSeries or any other supported applications you need cloud based access to.

By: Gerald Livingston


Finding security and reliability in cloud computing.

One of the biggest concerns expressed to me by those considering switching to cloud applications is the safety of their data and their clients’ data. It’s a concern cloud vendors have been fighting to overcome for years. How can you know the data is safe?


My first reaction to this question is, “Are you talking about SaaS (Software as a Service) or Application Hosting.” Most people exposed to the cloud, think these are one in the same; but they are NOT! SaaS was designed and made for the cloud; from top to bottom the true meaning of a powerful cloud computing software. On the other hand…Application Hosting is taking software that was designed for use in a local environment and “cloud enabling” it for the end users. This consolidates your access and costs through a robust cloud based architecture. Application Hosting is deployed in many different ways and you should seek the guidance of an experience IT consultant to help you choose the right vendor and access model for your company. While remote desktops and mock portals have been the standard; companies like Qutera and AWSEND use the streaming application model to provide the best security and reliability available in this type of deployment.

As you move into the cloud, the first step is making sure the cloud hosting company uses a data center that has received a Service Organization Controls Report (SOC), formerly known as a SAS 70 report. There are three types of SOC reports, they are not leveled, but stand alone as needed to address a specific portion of a provider. Not all are required:

  • AICPA SOC 1: Report on Controls at a Service Organization Relevant to User Entities’ Internal Control over Financial Reporting. These reports are specifically intended to meet the needs of user entities’ management and their auditors, as they evaluate the effect of the controls at the service organization on the user entities’ financial statement assertions.
  • AICPA SOC 2: Report on Controls at a Service Organization Relevant to Security,  Availability, Processing Integrity, Confidentiality and/or Privacy. These reports can form an important part of the users’ oversight of the service organization; vendor management; and internal corporate governance and risk management.
  • AICPA SOC 3: Trust Services Report. This reports is designed to meet the needs of users who want assurance on the controls at a service organization related to security, availability, processing integrity, confidentiality, or privacy but do not need the level of detail provided in a SOC 2 Report. 

A vendor that undergoes such an examination is stringently evaluated on its controls over the system or service it provides to user entities. The controls address the components of a system which include:

  • Infrastructure. The physical and hardware components of a system (facilities, equipment and networks).
  • Software. The programs and operating software of a system (systems, applications and utilities).
  • People. The personnel involved in the operation and use of a system (developers, operators, users and managers).
  • Procedures. The programmed and manual procedures involved in the operation of a system (automated and manual).
  • Data. The information used and supported by a system (transaction streams, files, databases and tables).

Best practices also include using a monitor system that tracks sales, service and technical support case management. This information can be posted by the vendor on thier website.

Another important consideration is unscheduled downtime and how easily customers can access their own data. There’s a concept of “five 9s” in the cloud world, which relates to “uptime,” or how often the system will be accessible by users—99.999% uptime, which amounts to 5.26 minutes of total unscheduled downtime per year. This does not include scheduled downtime, which many vendors say they set during weekends or overnight to limit interruptions to users. This is often guaranteed as part of service-level agreements and/or the terms of service (Policy Statement) depending on the contracts or subscriptions obtained. Some vendors are starting to say “no nines,” meaning their systems are never down, but the truth is most internal or local office networks don’t even come near “two 9s” of unscheduled downtime in a year.

More often than not, the cause of downtime will lie with the customers and their local environments. An example if this is when they don’t have ample bandwidth or any Internet access interruptions on their end, since access to data is driven by a company’s ability to access the Web. Also if the customers local environment is not setup or configured correctly or IAW standard and practices for their hardware or software. Under these circumstances, the “five 9s” do not apply, as this is beyond the vendors control. In fact, most cloud companies will not provide assistance beyond their datacenter environment.

Many businesses choose telephone companies as both their primary and secondary providers, which is OK as long as they aren’t the same one, or even related. But choosing a cable company as a primary may be a better choice and may even provide faster speeds. Telco’s are not the best or most reliable broadband providers anymore.

As you move to the cloud, trust is important. Obtain some guidance from an industry expert as you try to find the right company to fulfill your cloud computing needs.

By: Gerald Livingston


For personal finance, should you use

Mint is a SaaS based online personal finance service similar to Quicken. Over the past year, I’ve used for my personal finances. With Mint you have no local software to install, and it’s a service you can access with any browser or most mobile devices.

Getting started with

Once you sign up, is a easy to add accounts. I picked all my financial accounts to test their service. I have a mixture of: banking, credit cards, loans, and investing brokerage accounts. seamlessly downloaded my financial data.

When I revisit their web site, my financial data gets updated automatically. The dashboard presents information in an easy-to-use web interface – with great graphics. Though the service appears to be more about the graphical interface than useful functionality. Mint’s dashboard gives you an overview of what’s going on with your personal finances.

Budgeting is what it’s all about

Mint’s primary feature is all about budgeting and setting up goals, and this is the coolest part of the free service. Budgeting is easy to setup. Downloaded transactions will get automaticly-categorized into standard categories. You can create your own subcategories, however you cannot modify the main categories.

It has budgeting and tracking expenses, but its invest tracking area leaves a lot to be desired. Mint, it is much simpler than Intuit’s Quicken or other similar products and is lacking in many ways. You can make changes to your transactions after downloaded, and you will need to as the auto categorization is not intuitive, and you will need to make many adjustments as new transactions appear. Mint does do a good job remember previous transactions so it will they will match to the same category through continued use.

With the acquisition of Mint by Intuit, it’s obvious they want to glean its code for future iterations of the Quicken product line. They are the only kid on the block now that Microsoft discontinued Money  back in January of 2011. from anywhere, at anytime and from most devices.

Mint offers access to your financial data via their web site, and by mobile device. They have mobile apps for Apple’s iPhone, iPad, and Google’s Android. This allows access to your finances on the go.

Mint QuickView is a companion app available only for Apple’s OS X operating system. It’s another method to get a quick glimpse into your personal finances. You then get a leaf on your toolbar that’s always running in the background. The app will alert to changes to your finances. QuickView has similar functionality to Mint’s web site, and is recommended if you use Apple’s OS X and like Mint’s service. uses push technology

Through the next generation push technology; Mint keeps an eye on your financial accounts, so you don’t have to. sends alerts to an Email address or directly to your mobile device. Typical alerts are…

  • Late Fees
  • Over budget on a category
  • Bill reminders
  • Large purchases (Sometimes Annoying) what’s Hot!

  • Weekly summaries  – Weekly reporting of your finances.
  • Alerts  – pending bills ,and ways to save money on transaction fees.
  • Budgeting – Know exactly where you are spending your money.
  • Mobile – Support for the Apple’s iPhone, iPad, OS X, and Google Android. The apps are all free.
  • Auto Downloads – Automatically syncs your data into Mint (when it works properly). what’s lame!

  • Junkie investment features - Their investing section is a joke.
  • Push Technology Issues – This is a sore point with many users of Mint. At times syncing with your bank breaks, and takes a long time to get resolved.
  • Report generation – The only way to generate a report is exporting a CSV file to a spreadsheet like Microsoft Excel.
  • Cannot Reconcile – You cannot reconcile against your monthly bank statements. Mint assumes the data downloaded is always correct. Maybe, maybe not….
  • Where is the Customer Support – No Phone support and Emails support can take up to weeks.
  • No Historical Data – You cannot  bring in financial transactions from other personal finance application.
  • Security – No real disclosure and is know to sell financial data to cover its overhead.
  • Backups – With many SaaS services, you are relying on them to perform proper backups. Users have reported loss of transactions within the service.
  • Categorization – Assignments to income/expense categories are not always correct, and manual intervention needed often.

How Does Make Money?

The service is free to use, and there are no hidden fees. You might be asking, “How does Mint make money from this free service?” Mint makes their money by offering “ways to save” or make you money by recommending various financial services in which they get a referral fee.

Now this one’s hard to swallow…..Mint also sells the aggregate (not your individual, supposedly) financial data to various providers. Things like: consumer spending, the average credit card balance, how many retirement accounts a user may have, and more. It must be stressed, the data is reported to be collected anonymously and does not reference back to individual usage. However, with the NSA and government snooping scandals; a fearful public might not take to allowing their data pooled or not, made available to the highest bidder.

Is the future?

I think locally installed applications like Quicken are going the way of the Dodo bird. I know, call me old fashion, but I like having all of my data locally within Quicken. I do think a hybrid of local and remote application (cloud based) like or a better version of it will be the future of this industry. Intuit’s Quicken 2014 edition has already “borged” some code for it’s kissing cousin, thereby showing some future possibility of this realm.

Since I’m in the technology industry and deal with security all the time, I know the risks of leaving security to a third party. Mind you, I’m not saying Mint is insecure. In many cases an individual’s desktop computer is much less secure. Of course, for Mint the perception of security and credibility due to is funding practices is their biggest adoption road block. vs. Quicken? Intuit has learned from Microsoft….

While I use Quicken as our primary method to manage our finances, I have also somewhat outgrown Quicken as well. Recently, I’ve been creating Microsoft Excel spreadsheets for managing parts of my portfolio. Specifically I manage our investing portfolio, and security bucket outside of Quicken. Quicken, or any other application for that matter, does not seem to have tools to help manage these areas of your finance. To manage these assets, I wind up transferring the total amount into a Quicken account. With this said, Quicken still has many features and functionality that in is either very simplistic or non-existent.

However, be on the lookout over the next 2 years. You will see companies come out of nowhere with SaaS financial software that will be easier, inclusive and intuitive. Companies like CloudJitsu Corporation out of Nevada a currently locked down in development of what is anticipated to be the next evolution in personal and business financial accounting.


In Summarry, Intuit did the right thing in aquiring Mint is great for creating, and tracking your budget. The push technology alerts via Email are useful and welcomed feature. It’s unfortunate that Mint’s investing area is very weak for all but the basic investors. The investing area is so weak – they don’t list it on their own web site as one of the primary reasons to use

Mint, unfortunately, does not have investment and asset allocation tools like Personal Capital. If you have over $100,000 in investments, you will need to find a better fit.

In addition, Newer applications from emerging SaaS companies, will not have the same synchronization issues as due to the better code base and development processes available today vs. 6 years ago. As an example, when Intuit acquired, it replaced Yodlee (which does the financial synchronization far better) with their own internal system. That spawned serious synchronization issues as Yodlee is equipped to handle push technology and Intuits system is not; this made things worse in my opinion. Intuit thinks too highly of its products vs. the reality of their use; in an effort to lower the total cost of delivery to the masses as a free service.

Many users of stated synchronization issues started happening only after this switchover occurred. New emerging software from cloudjitsu bosts the use of  Yodlee to link up to accounts. Most cloud developers agree the Yodlee synchronization is more reliable.

I would only recommend using Mint for its basic budgeting features. Since does not cost anything to use, you might as well signup and give it a spin. For better investment tools and more reliable synchronization, I recommend using excel or even Quicken….but take heart, better software is on the horizon.