[image] Increase Efficiency with an IT Command Center: N-able Passportal and Auvik (On Demand)MSP efficiency

Increase Efficiency with an IT Command Center: N-able Passportal and Auvik (On Demand)

Have you ever been in the middle of troubleshooting and caught yourself wondering, “I wish all the information I need was easier to find?” It’s possible! If you prepare an IT command center that stores and updates your documentation for you,…

Rebecca GrassingMay 11, 2021
[image] Preventing Firmware Attacks

Preventing Firmware Attacks

Firmware attacks are on the rise, so it is more important than ever to invest in firmware…

Destiny BertucciAug 3, 2021
[image] Classful and Classless Addressing ExplainedNetwork protocols

Classful and Classless Addressing Explained

The advantages of classless addressing far outweigh their complexity. But what are they, and how…

Steve PetryschukJul 27, 2021
[image] What is Hierarchical Network Design?

What is Hierarchical Network Design?

Looking for a network with scale and the highest level of performance? Hierarchical network…

Lawrence PopaJul 20, 2021
[image] Dealing with Rogue DHCP ServersNetwork configuration

Dealing with Rogue DHCP Servers

First, understand what a Rogue DHCP server is, how it works, and how it can threaten your…

Steve PetryschukJul 13, 2021
[image] Observability vs. Monitoring: What’s the Difference?Network management

Observability vs. Monitoring: What’s the Difference?

Monitoring tells you when something is wrong, while observability provides you context as to why.…

Destiny BertucciJun 29, 2021
[image] What is Network Visualization?Network topology & mapping

What is Network Visualization?

Network visualization is a map of connected links, nodes, and other data points to show network…

Steve PetryschukJun 15, 2021
[image] What is Network Optimization? 8 Reliable TechniquesNetwork configuration

What is Network Optimization? 8 Reliable Techniques

Maintaining an optimized network requires a set of tools and techniques to ensure efficient…

Steve PetryschukJun 1, 2021
[image] The What and The Why of TLS InspectionNetwork management

The What and The Why of TLS Inspection

Let’s look at what the process of a secure connection through TLS entails, how it can be used…

Steve PetryschukMay 25, 2021
[image] SNMPv2 vs. SNMPv3: An SNMP Versions Comparison TableNetwork protocols

SNMPv2 vs. SNMPv3: An SNMP Versions Comparison Table

The most significant difference between SNMP v2 and v3 is the level of security for the user on…

Steve PetryschukMay 19, 2021
[image] What is Network Congestion? Common Causes and How to Fix Them

What is Network Congestion? Common Causes and How to Fix Them

Network congestion occurs when a node carries more data than it's designed to handle. Learn how…

Steve PetryschukMay 12, 2021
[image] What is a Backplane? A Network Backplane Throughput PrimerNetwork configuration

What is a Backplane? A Network Backplane Throughput Primer

Understanding what backplane throughput is, and it’s related concepts, can help you better…

Lawrence PopaMay 11, 2021
[image] What is 802.1X Authentication?Network protocols

What is 802.1X Authentication?

Want to understand network access control, and authentication 802.1X at the base layer? This…

Steve PetryschukApr 27, 2021
[image] How to Find IP Addresses on a Network and Monitoring their UsageNetwork monitoring

How to Find IP Addresses on a Network and Monitoring their Usage

Learn how to find all IP addresses on your network with just a few commands, then map the devices…

Steve PetryschukApr 21, 2021
[image] How to Find and Fix IP Address ConflictsTroubleshooting

How to Find and Fix IP Address Conflicts

IP address conflict resolution 101 - /ipconfig release, /ipconfig renew. If that doesn't work,…

Lawrence PopaApr 20, 2021
[image] Secure IT Operations (On Demand)Cybersecurity

Secure IT Operations (On Demand)

As an IT pro, what keeps you awake at night?  🆘  Security breaches?  🆘  Network…

Rebecca GrassingApr 16, 2021
[image] Network Firewall Security: Monitoring Firewalls 101Firewalls

Network Firewall Security: Monitoring Firewalls 101

Configuring your firewall security manager is essential to maintaining the health and safety of…

Steve PetryschukApr 13, 2021
[image] What is an ARP Table?Network protocols

What is an ARP Table?

Let's peer under the hood of how ARP tables help us see data similar to the "show arp" or "arp-a"…

Steve PetryschukApr 10, 2021
[image] How to Monitor Router Traffic: 6 Router Monitoring TipsNetwork management

How to Monitor Router Traffic: 6 Router Monitoring Tips

Router traffic monitoring gives IT admins real-time insight into any potential network hazards.…

Destiny BertucciApr 9, 2021
[image] Network Design and Best PracticesNetwork configuration

Network Design and Best Practices

Trying to learn more about network design and best practices? Auvik explains how to design a…

Steve PetryschukApr 7, 2021
[image] What Is a Network Diagram?Network topology & mapping

What Is a Network Diagram?

What is a network diagram and why is it important for your business? Learn more about the…

Kevin DooleyMar 26, 2021
[image] The Importance of Network DocumentationNetwork management

The Importance of Network Documentation

The importance of network documentation becomes very clear when you have to sit down and…

Destiny BertucciMar 24, 2021
[image] What Is the OSI Model?Network management

What Is the OSI Model?

The OSI network model is an important conceptual reference used in network design and management.…

Steve PetryschukMar 23, 2021
[image] 7 Best Network Infrastructure Mapping ToolsNetwork topology & mapping

7 Best Network Infrastructure Mapping Tools

Network infrastructure mapping helps you maintain up-to-date maps for quickly diagnosing…

Steve PetryschukMar 19, 2021
[image] Networking Automation Software: Pros & Cons For 2021Network management

Networking Automation Software: Pros & Cons For 2021

As network growth increases—and complexity along with it—we’ll need efficient and scalable…

Steve PetryschukMar 17, 2021
[image] Network Throughput vs Bandwidth and How to Measure It

Network Throughput vs Bandwidth and How to Measure It

Learn everything you need to know about network throughput from the experts at Auvik Networks.…

Steve PetryschukMar 16, 2021
[image] Securing Your DNSCybersecurity

Securing Your DNS

Why does DNS security matter, and what are some security options available to help protect your…

Steve PetryschukMar 9, 2021
[image] How to Draw Network Diagrams

How to Draw Network Diagrams

Good network diagrams aren't hard to make, yet they're distressingly rare. Even network engineers…

Kevin DooleyMar 8, 2021
[image] 5 Steps to Configure Cisco AnyConnect VPN

5 Steps to Configure Cisco AnyConnect VPN

Follow these 5 simple steps to configure Cisco AnyConnect VPN on ASA firewalls for your network.

Kevin DooleyMar 2, 2021
[image] 11 Network Traffic Terms to Know

11 Network Traffic Terms to Know

Monitoring network traffic is important—but first you need to understand the basic terms and…

Steve PetryschukFeb 23, 2021
[image] What Are the Types of Network Devices?Network management

What Are the Types of Network Devices?

Understanding the types of network devices is vital to effective network management. Here, we…

Steve PetryschukFeb 17, 2021
[image] Layer 2 vs Layer 3 Network Switches: What’s the Difference?Switches

Layer 2 vs Layer 3 Network Switches: What’s the Difference?

What's the difference between Layer 2 and Layer 3 network switches and how critical are they to a…

Steve PetryschukFeb 16, 2021
[image] What Is Cloud Networking?Cloud

What Is Cloud Networking?

Cloud networking taps into network resource availability in the cloud and complements or replaces…

Steve PetryschukFeb 12, 2021
[image] 6 Best Network Traffic Monitor Software OptionsNetwork monitoring

6 Best Network Traffic Monitor Software Options

Some network monitoring solutions have clear usability gaps, but we found some great choices.…

Destiny BertucciFeb 10, 2021
[image] What Are Network Address Translation and Port Address Translation?Network management

What Are Network Address Translation and Port Address Translation?

NAT—network address translation—is an important tool for both conserving IP addresses and…

Kevin DooleyFeb 9, 2021
[image] What Is Network Security?Cybersecurity

What Is Network Security?

Network security is a variety of different resources, behaviors, software, hardware components,…

Steve PetryschukFeb 5, 2021
[image] 11 Types of Networks: Understanding the DifferencesNetwork topology & mapping

11 Types of Networks: Understanding the Differences

Different types of networks enable different business and personal goals. Knowing how one network…

Steve PetryschukFeb 3, 2021
[image] 10 Best Network Monitoring Tools for 2021Network monitoring

10 Best Network Monitoring Tools for 2021

Your networks should be safely monitored with the most reliable tools available on the market.…

Destiny BertucciJan 29, 2021
[image] Network Discovery Software: Pros & Cons for 2021Network management

Network Discovery Software: Pros & Cons for 2021

You can’t manage what you can’t see—when it comes to the network, you need full visibility…

Steve PetryschukJan 27, 2021
[image] Evolving Your IT Skills in a SaaS WorldCloud

Evolving Your IT Skills in a SaaS World

Here's how to evolve your IT skills as the adoption of SaaS—and XaaS (everything as a…

Steve PetryschukJan 26, 2021
[image] The Pros and Cons of VPN Split TunnelingCybersecurity

The Pros and Cons of VPN Split Tunneling

Should you use VPN split tunneling? Here's what you need to know to decide.

Kevin DooleyJan 12, 2021
[image] A Beginner’s Guide to Microsoft Power BI & Network ReportsNetwork monitoring

A Beginner’s Guide to Microsoft Power BI & Network Reports

Microsoft Power BI is a business intelligence tool that helps you visualize & analyze data from…

Annette HynesDec 8, 2020
[image] Are Network Blind Spots Endangering Your Business?Network management

Are Network Blind Spots Endangering Your Business?

Network blind spots are the things you can't see and don't know about — and they can be deadly…

Alex HoffNov 24, 2020
[image] Configuring and Troubleshooting Multicast ProtocolsNetwork configuration

Configuring and Troubleshooting Multicast Protocols

There are two important protocols required to get your network to forward multicast packets.…

Kevin DooleyNov 10, 2020
[image] 5 Reasons to Add Network Monitoring  to Your 2021 IT Budget

5 Reasons to Add Network Monitoring to Your 2021 IT Budget

Allocating money in your IT budget for network monitoring in 2021 may be more important than…

Steve PetryschukOct 27, 2020
[image] What Is Multicast Networking and How Does It Work?Network management

What Is Multicast Networking and How Does It Work?

Multicast networking is based on the concept that a single packet can be sent by a server & it…

Kevin DooleyOct 20, 2020
[image] Reducing Mean Time to Resolution With AuvikAuvik

Reducing Mean Time to Resolution With Auvik

You can streamline troubleshooting, shrink mean time to resolution & spare network users from…

Steve PetryschukOct 13, 2020
[image] Security for Humans – FIT 071Cybersecurity

Security for Humans – FIT 071

Struggling to get users to comply with your IT security practices? You might be going about it…

Jennifer TribeOct 1, 2020
[image] The Employee Offboarding Checklist for IT Pros

The Employee Offboarding Checklist for IT Pros

Somebody leaving? Keep your network & data secure! Use this handy employee offboarding checklist…

Annette HynesSep 29, 2020
[image] Special IP Address Ranges and When to Use ThemNetwork management

Special IP Address Ranges and When to Use Them

There are several special IP address ranges that have specific purposes. Network engineer Kevin…

Kevin DooleySep 22, 2020
[image] 5 Great Reasons to Store and Analyze Centralized LogsNetwork monitoring

5 Great Reasons to Store and Analyze Centralized Logs

Whether log events point to issues with hardware, applications, capacity, or security issues,…

Rod LewisSep 15, 2020
[image] Subnetting: What it is and how it Works

Subnetting: What it is and how it Works

You don't need that subnet calculator! Not when you have this handy guide to subnetting using…

Kevin DooleySep 8, 2020
[image] Getting Started With Syslog in AuvikAuvik

Getting Started With Syslog in Auvik

Auvik centralizes syslog data for all your network devices, allowing you to search & filter to…

Enam RabbaniAug 25, 2020
[image] Making the Move to Windows Virtual Desktop – FIT 068Cloud

Making the Move to Windows Virtual Desktop – FIT 068

Should you move to virtual desktops? Nerdio’s Joseph Landes joins us to look at the trend, the…

Jennifer TribeAug 20, 2020
[image] How to Manage a Network: 10 Essential Steps to TakeNetwork management

How to Manage a Network: 10 Essential Steps to Take

Managing a new network? Check out this list of 10 easy to follow steps from the experts at Auvik…

Steve PetryschukAug 18, 2020
[image] The No Sweat Guide to Effective Switch Management

The No Sweat Guide to Effective Switch Management

Switches are a critical network link & switch management is an important job. Learn how to choose…

Ethan BanksAug 11, 2020
[image] Implementing a Bring Your Own Device Policy In Your OrganizationNetwork management

Implementing a Bring Your Own Device Policy In Your Organization

A bring your own device policy is more important than ever since users can bring unsecured…

Kevin DooleyAug 4, 2020
[image] sFlow vs NetFlow: What’s the Difference?Network protocols

sFlow vs NetFlow: What’s the Difference?

Two of the most common flow protocols you’ll run into are NetFlow and sFlow, and these are some…

Andrés TapiaJul 28, 2020
[image] Network Security Threats From the “Light Web” – FMSP 066Cybersecurity

Network Security Threats From the “Light Web” – FMSP 066

Today’s biggest network threats might just be coming at you from scammers using totally legal…

Jennifer TribeJul 23, 2020
[image] Managing IT Risk When Everyone’s Working RemoteCybersecurity

Managing IT Risk When Everyone’s Working Remote

Top IT & cybersecurity experts share their advice for leaders scrambling to contend with a new…

Lindsay Windover-KroesJul 7, 2020
[image] 3 Reasons to Use Auvik’s Remote Management FeaturesAuvik

3 Reasons to Use Auvik’s Remote Management Features

You can't always be on site to troubleshoot every network issue that pops up. With Auvik’s…

Lawrence PopaJun 23, 2020
[image] 10 Computer Networking Books Every Network Manager Should ReadNetwork management

10 Computer Networking Books Every Network Manager Should Read

Get a fresh perspective on general networking, network management, network monitoring, security,…

Annette HynesJun 9, 2020
[image] How to Configure Syslog on a Cisco DeviceNetwork configuration

How to Configure Syslog on a Cisco Device

Every modern network device has at least some syslog capabilities. Learn all you need to know…

Kevin DooleyJun 2, 2020
[image] How to Troubleshoot Network Connectivity Issues With AuvikNetwork management

How to Troubleshoot Network Connectivity Issues With Auvik

Network connectivity issues can be some of the worst to troubleshoot. But with Auvik, problems…

Steve PetryschukMay 26, 2020
Hi! Looks like you have JavaScript disabled. Please turn it on so you can see and interact with everything on our site.