In a year rife with change, one thing that stayed the same was Auvik’s publishing schedule. Every Tuesday at 9 a.m., you could always find a brand-new blog post live on the website, no matter what happened the week before.

To date, we’ve published 53 blog posts—some explained technical topics, some compiled resources to help you build your career, and others were focused on helping you navigate the COVID-19 pandemic.

As we close out the year, we’re looking back to find out what were our most popular blogs based on web traffic data. Here’s our top 10:


10. Getting Started With Syslog in Auvik

When something goes wrong in your network, you often don’t find out about it until your users are affected, and you’re left scrambling to identify the issue and understand its root cause. Auvik centralizes syslog data for all your network devices across all your sites, allowing you to search and filter to get to the root cause of network issues and troubleshoot them faster. | Read it

auvik on a laptop

9. How Auvik Can Help Keep Networks Steady During the COVID-19 Pandemic

In the wake of the COVID-19 pandemic, things were changing rapidly: offices shut down, remote work increased, and users were accessing on-premises resources from everywhere other than the office. People you were supporting experienced a lot of change, and possibly a few challenges. The last thing they needed was more roadblocks to getting their work done. During this time of uncertainty, network performance needed to be rock solid so users could access the resources they needed. In this blog post, we explained a few key ways Auvik could help. | Read it

traffic light

8. An Introduction to Web Proxies

Web proxies intercept traffic from your systems as they move to other systems, analyze the packets, then send the data along. There are a lot of reasons why you might want to intercept packets and, in this article, network engineer Kevin Dooley explains them all. | Read it

apple on a book

7. 9 Low-Cost or Free Cybersecurity Training Resources

When it comes to cybersecurity, the landscape is constantly changing and there’s a lot to learn about cybersecurity if you want to keep up and keep your users protected. Whether you’re looking to advance your career or make the most out of your team’s professional development budget, this list of 9 low-cost or free cybersecurity training resources can help. | Read it

hand carving supporting tree

6. Free Software and Resources for Supporting Remote Workers During COVID-19

In the beginning of the COVID-19 pandemic, IT teams were being flooded with dozens of requests to set up employees up to work remotely and were searching for ways to quickly enable people to work and collaborate remotely while keeping their networks stable and secure. To help, we put together this list of software that was free in response to the global coronavirus pandemic. | Read it

plant over books

5. 10 Computer Networking Books Every Network Manager Should Read

As a network manager, you’re responsible for knowing a little bit about everything when it comes to computer networking. From fundamentals to anticipating future tech changes, there’s a lot of ground to cover. To keep up, you need to keep learning, and this list of 10 computer networking books can help. When you’re done reading, you’ll have a fresh perspective on the basics of general networking, network management, network monitoring, security, and more. | Read it

cisco switch

4. How to Configure Syslog on a Cisco Device

Essentially every modern network device has at least some syslog capabilities, and the ones that don’t support it directly have their own logging consoles that can usually be configured to filter and forward logs on to another centralized syslog server. In this blog post, network engineer Kevin Dooley explains how you can configure syslog on network devices. | Read it


3. What Is Syslog and How Does It Work?

In the prelude post to How to Configure Syslog on a Cisco Device, Kevin explained how syslog works. In case you’re wondering, syslog is a standard network-based logging protocol that works on an extremely wide variety of different types of devices and applications, allowing them to send free text-formatted log messages to a central server. Get the full low down in this post. | Read it


2. An Introduction to Subnetting

Subnetting isn’t hard but even experienced network engineers end up looking for subnet calculators or trying to count in binary on their fingers. This quick primer can help you avoid the same fate by explaining what a subnet is and how to think about the IP address in binary. | Read it


1. The Big -aaS List of As-a-Service Offerings

These days, -aaS can mean just about anything delivered by subscription or even just a plain old outsourced service, whether the cloud is involved or not. Some -aaS models are an industry category and some are proprietary to a single company. It’s enough to drive an IT pro mad trying to keep up. So if your head is spinning, don’t worry—you’re not the only one. To help, we’ve pulled together a list of 51 ‘as a service’ offerings, everything from AIaaS to XaaS. | Read it

Annette Hynes

About Annette Hynes

Annette is Auvik’s marketing content specialist. She learned the ins-and-outs of network management while working in the telco industry and hopes to one day become a Jeopardy! champion.

Leave a comment

Got something to say? Name and email are required, but don't worry, we won't publish your email address.