Auvik system security
Auvik’s network monitoring and management system is built with a mindset of security and privacy first.
The collector
Auvik uses a lightweight collector you install on a network to see and securely communicate with that network. Everything else lives in the cloud.
Encryption
Information such as device credentials and configuration data are encrypted using AES-128. They’re decrypted and made available to the system only as needed for delivering product features.
Data isolation
When you install the Auvik collector on a network, it’s uniquely configured to be associated only with your account. There’s no way another Auvik customer account can communicate with a collector you’re using, either accidentally or purposefully.
Secure data centers
Auvik servers are kept in secure, state-of-the-art data centers with electronic surveillance, multi-factor access control, and 24-7 security guard protection. The data centers are ISO 27001, ISO 27017, and ISO 27108 certified, and undergo regular SOC 2 Type II audits.

Download the Auvik system security
white paper
Our system security white paper outlines the type of network information we collect, how it’s collected, and how it’s stored. You’ll learn about the security protocols we follow to keep the networks you manage safe.