All the resources an IT professional needs

Check out our latest posts below. For access to additional resources including reports, podcasts, webinars, and more, head over to our resources page.

toolkit illustration

Searching for something? Filter by topic

Just browsing? Check out our latest posts

Network Management

What is Hierarchical Network Design?

Looking for a network with scale and the highest level of performance? Hierarchical network design might be the most effective option.
Author: Lawrence Popa
Sales Engineer, Auvik
Network Management

NetFlow Basics: An Introduction to Monitoring Network Traffic

You probably have support for NetFlow or other flow protocols on your client devices already. That means you can quickly and inexpensively start gaini
Author: Steve Petryschuk
Director & Tech Evangelist, Auvik
Configuration & Troubleshooting

How to Troubleshoot a Broadcast Storm

Broadcast storms are a major pain point for network admins. Learn more about what they are, what causes them, and how to deal with them.
Author: Ray Patel
IT Leadership

MSP vs Internal IT: What’s the Right Choice for My Company?

MSP vs. internal IT: what’s right for your business? Explore the benefits and challenges to determine the best IT management strategy for your unique
Author: Rebecca Grassing
Product Marketing Manager, Auvik
Protocols & Communication

SNMPv2 vs. SNMPv3: An SNMP Versions Comparison Table

The most significant difference between SNMP v2 and v3 is the level of security for the user on the network. Let’s look at an SNMP versions.
Author: Steve Petryschuk
Director & Tech Evangelist, Auvik
Configuration & Troubleshooting

Dealing with Rogue DHCP Servers

First, understand what a Rogue DHCP server is, how it works, and how it can threaten your network. Then, techniques to prevent them.
Author: Steve Petryschuk
Director & Tech Evangelist, Auvik
Network Management

What is Multicast Networking and How Does It Work?

Multicast networking is based on the simple concept that a single packet can be sent by a server and it will be received by many receivers. Multicast
Author: Kevin Dooley
Protocols & Communication

NetFlow Analyzers: Definitions, Key Features & Use Cases

Discover how NetFlow analyzers can enhance your network security, visibility, and performance in our comprehensive guide.
Author: Nolan Greene
Product Marketing Manager, Auvik
Devices

How to Enable Hyper-V: An IT Pro’s Guide to Mastering Virtual Environments

Learn how to enable Hyper-V on Windows. Plus, explore the basics of managing virtual machines in this easy-to-follow guide for IT pros.
Author: Nolan Greene
Product Marketing Manager, Auvik
Tech Industry

Average IT Job Salary: 10 Statistics, Trends, and Predictions

Explore top-paying IT roles by title and by state. Learn current trends and average IT job salaries to boost your career.
Author: Rebecca Grassing
Product Marketing Manager, Auvik

What’s your shadow IT risk factor?

Find out in this free guide and exercise kit.
cover of shadow IT ebook
You will learn:
  • The impact shadow IT has on an organization
  • How to evaluate tools
  • Tips on security
  • A quiz to help you determine the severity of shadow IT in your org
  • Solutions to solve these problems