Auvik system security

Auvik’s network monitoring and management system is built with a mindset of security and privacy first.

collector icon

The collector

Auvik uses a lightweight collector you install on a network to see and securely communicate with that network. Everything else lives in the cloud.

encryption icon


Information such as device credentials and configuration data are encrypted using AES-128. They’re decrypted and made available to the system only as needed for delivering product features.

isolation icon

Data isolation

When you install the Auvik collector on a network, it’s uniquely configured to be associated only with your account. There’s no way another Auvik customer account can communicate with a collector you’re using, either accidentally or purposefully.

secure data centers icon

Secure data centers

Auvik servers are kept in secure, state-of-the-art data centers with electronic surveillance, multi-factor access control, and 24-7 security guard protection. The data centers are ISO 27001, ISO 27017, and ISO 27108 certified, and undergo regular SOC 2 Type II audits.

white paper cover, Auvik Networks System Security

Download the Auvik system security
white paper

Our system security white paper outlines the type of network information we collect, how it’s collected, and how it’s stored. You’ll learn about the security protocols we follow to keep the networks you manage safe.

Download now

Hi! Looks like you have JavaScript disabled. Please turn it on so you can see and interact with everything on our site.