Destiny Bertucci

Destiny Bertucci

Destiny Bertucci, Auvik Network’s Product Strategist, has spent 15 years focusing on IT monitoring and management software, security, networking, and troubleshooting. Destiny has a broad array of certifications and degrees such as Auvik Certified Professional, SolarWinds Certified Professional, Cisco’s CCNA, and CompTIA CIOS and CSIS certifications. She has also worked and advocated towards empowering women in IT and STEAM programs. Destiny joins Auvik from SolarWinds, where she was a Product Manager and Senior Application Engineer.

See more from Destiny Bertucci

article
|
Cybersecurity

What Is Phishing? Insider Risk & How to Prevent It

When it comes to security, phishing is one of any IT team’s biggest concerns—as it targets the weakest link in the security chain: end-users. No matte
article
|
Protocols & Communication

What Else But SNMP?

What does the future hold for SNMP? SNMP isn’t dead, but there’s been a gradual shift to other network monitoring alternatives. Let’s explore.
article
|
Tech Industry

Data Sovereignty: Everything You Need to Know

“What’s data sovereignty? Is it the same thing as data privacy? What about data sovereignty vs data residency?” These are questions that plague many b
article
|
Configuration & Troubleshooting

Cover Your DRaaS: Everything you need to know about Disaster Recovery

Unplanned downtime carries a hefty price tag for enterprises. In 2020, critical server outages cost enterprises on average at least $10,000 per hour,
article
|
Tech Industry

10 Best Network Monitoring Tools in 2024

There are plenty of options for network monitoring tools today, and that can make it hard to pick the right one for you. Here, we’ll help you sort thr
article
|
Cybersecurity

Beyond Zero Trust: What is Continuous Security Validation?

Your continuous control validation efforts can force you to improve your security controls. In turn, your continuous control validation efforts will n
article
|
Network Management

Government IT Modernization Must Be More than Skin-Deep

The fact of the matter is that modernizing government technology has become a necessity. The COVID-19 pandemic proved just how unprepared, and unsuppo
article
|
Network Management

Preventing Firmware Attacks

Firmware attacks are on the rise. Learn how to defend and prevent firmware hacking.
article
|
Network Management

What’s the Difference Between Observability vs. Monitoring?

Monitoring tells you when something is wrong, while observability provides you context as to why. Let’s look at how they work together to optimize you
article
|
Network Management

How to Monitor Router Traffic: 6 Router Monitoring Tips

Router traffic monitoring gives IT admins real-time insight into any potential network hazards. Here’s 6 router monitoring tips to know to avoid any d
article
|
Network Management

The Importance of Network Documentation

The importance of network documentation becomes very clear when you have to sit down and troubleshoot a network from top to bottom. Or when there’s a
article
|
Network Management

Network Traffic Monitoring in 2024: Discover the Top 7 Solutions

Explore this guide to network traffic monitoring, covering fundamentals, best practices, and reviews of the top 7 tools on the market today.

What’s your shadow IT risk factor?

Find out in this free guide and exercise kit.
book cover - The Modern Professional's Guide to Shadow IT
You will learn:
  • The impact shadow IT has on an organization
  • How to evaluate tools
  • Tips on security
  • A quiz to help you determine the severity of shadow IT in your org
  • Solutions to solve these problems