blog icon
Network monitoring

The Evolution of Network Visibility

As modern work has evolved, so too has the network end users rely on to do their jobs. Today’s network is vastly different from the networks of just a few years ago, with the new last mile of the office network evolving to cover anywhere end…

Steve PetryschukMar 14, 2023
blog icon
Network management

The 2023 Network IT Management Report Part 3: Extending Your Reach

This is the third in a four-part series focusing on the findings from our 2023 annual Field Report for IT Management. We surveyed 4500 IT…

Rebecca GrassingFeb 28, 2023
NVDR Report
blog icon
Network monitoring

The Future of the Network is End User Experience. Are you Ready?

Don’t get me wrong—the world still absolutely needs all of the physical network devices, cabling, access points, etc. that connect us…

Steve PetryschukOct 18, 2022
blog icon
Network monitoring

5 Reasons to Add Network Monitoring to Your Budget

Allocating money in your IT budget for network monitoring in 2021 may be more important than ever. Here are five reasons why.

Steve PetryschukJul 27, 2022
blog icon
Network monitoring

Agent vs Agentless Monitoring: Which is Best?

Agent-based and agentless monitoring are the two main approaches network monitoring tools use to capture and report data from network…

Ryan LaFlammeJul 21, 2022
Command Center (N-Able)
blog icon
Network monitoring

Proactive Healthcare Network Monitoring: The Importance of Early Detection

Healthcare IT is simultaneously one of the most complex and sensitive networking systems there are. Aside from the wealth of confidential…

Lemna ManoharanJul 12, 2022
blog icon
Network monitoring

Embracing Shadow IT (Video)

Shadow IT. Many IT pros shudder at the term. For those who may not be familiar, shadow IT refers to the devices, systems, and…

Alex HoffJul 7, 2022
blog icon
Network assessments

Identify Vulnerable Devices From Vendor Recalls and Security Notices

When network hardware vendors issue device recalls, field notices, or security alerts, the implication can be massive for MSPs. But Auvik…

Sarah Cunningham-ScharfJun 1, 2022
blog icon
Auvik

Introducing SNMP Poller History

Despite everyone’s best efforts, network failures happen. And when downtime means lost productivity, fast troubleshooting becomes an…

Lemna ManoharanApr 26, 2022
Secure IT Ops
blog icon
Network monitoring

What Is IoMT (And How Is It Shaping Healthcare)?

Smart devices are everywhere nowadays, from refrigerators and coffee makers to security cameras and thermostats. A significant percentage…

Rebecca GrassingNov 15, 2021
blog icon
Network management

Managing the Complex Networks of Financial Services

It’s possible to perform network mapping, device discovery, and asset management manually, but it’s not sustainable. Modern networks…

Lawrence PopaNov 15, 2021
blog icon
Network monitoring

The Challenge of Monitoring a Distributed Network

What exactly makes a network distributed? Is a distributed network fundamentally different from a decentralized network? And if they are…

Steve PetryschukSep 21, 2021
blog icon
Network monitoring

How to Find IP Addresses on a Network and Monitor their Usage

If you’re looking for a specific IP address, the simplest way to discover that device is to use the ICMP ping command. Typing in…

Steve PetryschukApr 21, 2021
blog icon
Network monitoring

Network Throughput vs Bandwidth and How to Measure It

Learn everything you need to know about network throughput from the experts at Auvik Networks. And while we’re at it, let’s cover the…

Steve PetryschukMar 16, 2021
blog icon
Network monitoring

11 Network Traffic Terms to Know

Monitoring network traffic is important—but first you need to understand the basic terms and concepts. Here are 11 key network traffic…

Steve PetryschukFeb 23, 2021
blog icon
Network monitoring

6 Best Network Traffic Monitor Software Options

Some network monitoring solutions have clear usability gaps, but we found some great choices. Learn about the 6 best network traffic…

Destiny BertucciFeb 10, 2021
blog icon
Network monitoring

A Beginner’s Guide to Power BI & Network Reports

Microsoft Power BI is a business intelligence tool that helps you visualize & analyze data from your network through custom reports &…

Annette HynesDec 8, 2020
blog icon
Network monitoring

5 Great Reasons to Store and Analyze Centralized Logs

Whether log events point to issues with hardware, applications, capacity, or security issues, they contain the data you need to quickly…

Rod LewisSep 15, 2020
blog icon
Network monitoring

What Is Syslog and How Does It Work?

Almost every device on a network has a syslog agent you can use to send messages to a central location. Here's how the network-based…

Kevin DooleyMay 5, 2020
blog icon
Network monitoring

VPN Monitoring: Keeping Remote Workers Connected With Auvik

Managing a lot of remote workers right now? Here’s how to use VPN monitoring to stay on top of capacity issues and keep workers connected.

Steve PetryschukApr 21, 2020
Vendor Diversity Report 2020
blog icon
Network management

Packet Errors, Packet Discards, and Packet Loss: What’s the Difference?

It’s a question the Auvik support team receives often: “What’s the difference between a packet error, a packet discard, and packet…

Annette HynesAug 27, 2019
blog icon
Auvik

Auvik TrafficInsights: How to Solve Network Cases Like a Super Sleuth

With Auvik TrafficInsights, if any traffic flows through a flow-enabled network device, you can see who’s on the network, what…

Annette HynesAug 6, 2019
webinar icon
Auvik

5 Ways to Troubleshoot Faster, Boost Security, and Upsell Clients with Auvik TrafficInsights™ – (On Demand)

With Auvik TrafficInsights, MSPs have deep visibility into all traffic that flows across client networks, so you can be confident knowing…

Sarah Cunningham-ScharfJul 5, 2019
blog icon
Network monitoring

NetFlow Basics: An Introduction to Monitoring Network Traffic

You probably have support for NetFlow or other flow protocols on your client devices already. That means you can quickly and…

Steve PetryschukMar 19, 2019
blog icon
Network management

3 Minor Network Alerts You Shouldn’t Ignore

It’s obvious you need to deal with emergency and critical network alerts. But what about simple warning alerts? Your first impulse may…

Steve PetryschukFeb 13, 2018
blog icon
Network management

How I Strategically Tune Auvik Alerts to Reduce Noise and Optimize Monitoring

Auvik is pre-configured to alert on a list of standard metrics at industry best-practice thresholds. If the thresholds are too low for…

Corey KirkendollJan 16, 2018
blog icon
Network management

How to Dig Deeper on the Network When You Don’t Have NetFlow

NetFlow is great for gaining deeper visibility at Layer 3 and beyond—but not everyone has the luxury of putting it to use. Thankfully,…

Ray PatelAug 15, 2017
blog icon
Network management

Network Monitoring: How to Handle High CPU Utilization Alerts

Seeing high CPU utilization on a network device is always an uncomfortable feeling. The harder the device is working, the more likely…

Ray PatelApr 4, 2017
blog icon
Network monitoring

How to Look Up a Custom OID

Is there a network device you want to learn more about or monitor? Being able to look up OIDs (the device’s Object Identifiers) is the…

Dana OrosFeb 7, 2017
blog icon
Network management

6 Pro Tips for Handling IT Alert Fatigue

IT alert fatigue — becoming so overwhelmed with notifications that you stop paying attention — is a dangerous phenomenon that can…

Dana OrosSep 15, 2015