Auvik Blog

Tech Industry

3 Key Trends From the 2020 Network Vendor Diversity Report

In the 2020 Network Vendor Diversity report, we analyzed a sample of 30,000 networks, compared the data to previous years & identified 3 key trends.
Configuration & Troubleshooting

Configuring and Troubleshooting Multicast Protocols

There are two important protocols required to get your network to forward multicast packets. Here’s how to configure & troubleshoot them.
Configuration & Troubleshooting

Reducing Mean Time to Resolution with Auvik TrafficInsights and Syslog

You can streamline troubleshooting, shrink mean time to resolution & spare network users from prolonged downtime with Auvik. Here’s how.
Managed Service Providers (MSPs)

Planning for the Post-Pandemic World as an IT Leader

IT will play a critical role in helping companies adapt to work post-pandemic. Prepare yourself by taking these practical planning steps.
Network Management

5 Great Reasons to Store and Analyze Centralized Logs

Centralized logging, where all of your network devices send data to a central server, is a better approach than logging locally. Here’s why.
IT Leadership

Use the Triple-A Framework to Optimize Your IT Services

Operationally mature IT teams use the triple-A framework—assess, adapt, automate—to focus their efforts & deliver. Here’s how you can do the same.
Protocols & Communication

sFlow vs NetFlow: What’s the Difference?

Two of the most common flow protocols you’ll run into are NetFlow and sFlow, and these are some of the differences between the two to keep in mind.
Managed Service Providers (MSPs)

Making Co-managed IT Work In the Real World (From Pros Who’ve Walked the Walk)

Simplex-IT CEO Bob Coppedge & Christian Health Ministries CIO Bryan Schultz discuss what has made their 10 year co-managed IT partnership a success.
Cybersecurity

Managing IT Risk When Everyone’s Working Remote

Top IT & cybersecurity experts share their advice for leaders scrambling to contend with a new set of IT risks in a post-pandemic world.
Cybersecurity

What is a zero-trust network?

The cybersecurity landscape has changed a lot thanks to the increase in cloud-based services, and zero-trust is now an extremely achievable goal.
IT Leadership

4 Time Management Strategies to Boost Your IT Team’s Productivity

The IT workload can quickly become overwhelming. The trick is managing your team’s time so the work gets. These 4 time management strategies can help.
Network Management

10 Computer Networking Books Every Network Manager Should Read

Get a fresh perspective on general networking, network management, network monitoring, security, and more with these 10 computer networking books.
Cybersecurity

10 Low-Cost or Free Cybersecurity Training Resources

Want to advance your career or make the most of your team’s professional development budget? This list of low-cost or free cybersecurity training resources can…
Network Management

How to Keep IT Infrastructure Devices Fresh and Fit for Purpose

Old, unused network devices create security risks, eat up IT time, and bloat operating costs. Here’s how to keep IT infrastructure fresh & fit for purpose.
IT Leadership

Helping Your IT Team’s Productivity During the Pandemic

Trying to boost your IT team’s motivation and productivity during the pandemic? Here’s how other IT leaders are getting their teams to do their best work.