Hi! Looks like you have JavaScript disabled. Please turn it on so you can see and interact with everything on our site.
See Auvik in action
Dive into our sandbox to demo Auvik on your own right now.
Auvik’s network monitoring and management system is built
with security and privacy first.Have questions? Our team is here to help.
Auvik’s cloud-based software is purpose-built for the cloud following industry best practices of secure data collection and storage. Auvik servers use an industry standard four-tier architecture, with security protocols at every layer. This architecture includes:
When the Auvik collector is installed on a network, it’s uniquely configured to be associated with only one account. As data from the collector reaches the Auvik system, it’s partitioned in such a way that it cannot cross from one account to another.
Auvik leverages AES-256 encryption for data at rest, and all communications between the Auvik collector and the cloud require a minimum of TLS v1.2 encryption.
Systems holding customer data can only be accessed by authorized personnel through controlled mechanisms.
Auvik’s agent, known as the collector, is a piece of code that uses industry standard protocols to gather information about a network, such as topology details, configurations, and network statistics. The collector summarizes and sends that information to the Auvik servers over encrypted connections.
All collector connections to the cloud are outbound, and encrypted (minimum of TLS v1.2) using certificate authentication to ensure communication is always and only between the collector and Auvik servers.
Through a combination of physical and logical security measures detailed below, we’ve made it virtually impossible for non-approved and non-authorized users to access Auvik customer information.
Auvik servers are hosted in AWS’ (Amazon Web Services) secure, state-of-the-art data centers that offer:
Data housed within Auvik is protected by a number of logical controls, including:
Security isn’t just a department at Auvik—it's ingrained in every process:
At Auvik, our users’ right to data privacy and protection is paramount. The Auvik platform doesn’t collect and process personal user information beyond what’s required for administering the platform. Learn more about Auvik’s compliance program.
At Auvik, we're on a mission to squish all bugs. We look forward to working with the security community to find vulnerabilities in order to keep our businesses and customers safe. Learn more about our Vulnerability Disclosure program.
Learn about the type of network information we collect, how it’s collected, and how it’s stored to keep the networks you manage safe.
Deploy Auvik to as many sites and monitor as many devices as you like in this unlimited 14-day free trial.
Dive into product features that support your security program.