Hi! Looks like you have JavaScript disabled. Please turn it on so you can see and interact with everything on our site.
Request Pricing Info
JOIN US AT FRANKLY MSP LIVE!
Our Black Friday sale is on now, and tickets won’t last long.
What's the difference between Layer 2 and Layer 3 network switches and how critical are they to a properly functioning network?
A Layer 3 switch combines the capabilities of a Layer 2 switch and a router in one device. Does this mean the death of the router is…
You can’t manage what you can’t see—when it comes to the network, you need full visibility & awareness. But you don’t need to…
A cynical network engineer might say, “configuration drift happens when you take the day off.” Someone changed something they…
A single healthcare network monitoring system is one of the most effective solutions for improving the management of distributed and…
During the COVID-19 pandemic, network performance needs to be rock solid so users can access the resources they need, when they need…
Connectivity is more important than ever to support our education system. BYOD, remote classes, Wi-Fi, and a variety of digital learning…
Given the risks, you can’t blame the paranoid network engineer that doesn’t want to change or update anything. The problem is that…
So how do we get from IPv4 to IPv6—which we all agree has to happen—when there’s still a raging debate about one of the biggest…
What exactly makes a network distributed? Is a distributed network fundamentally different from a decentralized network? And if they are…
When I hear QUIC, my immediate reaction is, “The QUICk brown fox jumps over the lazy dog.” That sentence has been ingrained in me…
DNS filtering is the use of DNS to block or allow access to specific content through the use of DNS requests. While technically you can…
IPAM (IP address management) is critical software to help ensure seamless connectivity and much more. Learn what it is and how it can…
The advantages of classless addressing far outweigh their complexity. But what are they, and how can you tell the difference?
First, understand what a Rogue DHCP server is, how it works, and how it can threaten your network. Then, techniques to prevent them.
Network visualization is a map of connected links, nodes, and other data points to show network paths between endpoints. Let's review…
Maintaining an optimized network requires a set of tools and techniques to ensure efficient bandwidth management, latency, and network…
Let’s look at what the process of a secure connection through TLS entails, how it can be used to see past “invisible traffic” and…
The most significant difference between SNMP v2 and v3 is the level of security for the user on the network. Let's look at an SNMP versions.
Trying to decide between staying in a technical IT role, or moving into a management position? There might be value in either path. Let's…
Network congestion occurs when a node carries more data than it's designed to handle. Learn how to fix common causes of network congestion.
Want to understand network access control, and authentication 802.1X at the base layer? This article goes through all the ins and outs of…
If you’re looking for a specific IP address, the simplest way to discover that device is to use the ICMP ping command. Typing in…
Configuring your firewall security manager is essential to maintaining the health and safety of your network. Learn the key routines for…
Let's peer under the hood of how ARP tables help us see data similar to the "show arp" or "arp-a" command without having to open a…
Trying to learn more about network design and best practices? Auvik explains how to design a network and lists our design best practices…
Learn how network integration can help you identify and solve problems quickly and move from reactive to proactive in your work. Hosted…
The OSI network model is an important conceptual reference used in network design and management. Its seven layers help IT professionals…
Network infrastructure mapping helps you maintain up-to-date maps for quickly diagnosing problems. Similarly, network maps can help…
As network growth increases—and complexity along with it—we’ll need efficient and scalable ways to handle it. You simply won’t…
Learn everything you need to know about network throughput from the experts at Auvik Networks. And while we’re at it, let’s cover the…
Why does DNS security matter, and what are some security options available to help protect your network from DNS data attacks?
Monitoring network traffic is important—but first you need to understand the basic terms and concepts. Here are 11 key network traffic…
Understanding the types of network devices is vital to effective network management. Here, we take a look at 11 common network devices.
Cloud networking taps into network resource availability in the cloud and complements or replaces traditional networking.
Network security is a variety of different resources, behaviors, software, hardware components, and policies. The priorities and elements…
Different types of networks enable different business and personal goals. Knowing how one network type differs from the others is…
Before you turn completely to resolving a network issue, there’s another important aspect to any resolution that you can’t forget,…
Here's how to evolve your IT skills as the adoption of SaaS—and XaaS (everything as a service)—continues.
COVID-19 has us all spending more time in front of screens & has changed the way we use networks and the internet. Here's what it means…
Allocating money in your IT budget for network monitoring in 2021 may be more important than ever. Here are five reasons why.
Managing a new network? Check out this list of 10 easy to follow steps from the experts at Auvik Networks to help you get started and be…
Network connectivity issues can be some of the worst to troubleshoot. But with Auvik, problems can be solved in seconds just by popping…
Old, unused network devices create security risks, eat up IT time, and bloat operating costs. Here's how to keep IT infrastructure fresh…
Managing a lot of remote workers right now? Here’s how to use VPN monitoring to stay on top of capacity issues and keep workers connected.
Two-factor authentication or 2FA requires a user to identify themselves in two ways—or using two different methods—before allowing…
Network segmentation—breaking a network into smaller chunks—improves network visibility, monitoring, security, and performance.…
You probably have support for NetFlow or other flow protocols on your client devices already. That means you can quickly and…
Network device security is one of the most important elements of network management. Learn what it is and best practices to follow.
A new Sophos report reveals IT pros can’t identify almost half (45%) of the traffic flowing through their networks. That’s a massive…
Network topology visualization can provide instant client context to service techs, speed up training time, expedite troubleshooting,…
It’s obvious you need to deal with emergency and critical network alerts. But what about simple warning alerts? Your first impulse may…