All the resources an IT professional needs

Check out our latest posts below. For access to additional resources including reports, podcasts, webinars, and more, head over to our resources page.

toolkit illustration

Searching for something? Filter by topic

Just browsing? Check out our latest posts

IT Leadership

IT Metrics & KPIs to Track Success

Imagine running an IT department without a compassโ€”no clear way to gauge performance, spot problems, or demonstrate value to the rest of the organizat
Author: Rebecca Grassing
Product Marketing Manager, Auvik
IT Leadership

Importance of Remote IT Support in Dispersed Teams

Despite the headlines return to office (RTO) has been making, remote work and distributed workforces are here to stay. Case in point: a Robert Half re
Author: Patrick Albert
VP Product Management
Protocols & Communication

Jitter vs Latency: Definitions and Differences for Better Network Performance

If you’ve ever experienced choppy audio or video calls, slow website loading, or laggy gaming sessions, chances are you’ve dealt with eith
Author: Lael Uberuaga-Rodgers
Network Management

What is Network Discovery? Everything You Need to Know

Struggling with blind spots on your network? Read this comprehensive network discovery guide explaining protocols, software, and steps for complete vi
Author: Rebecca Grassing
Product Marketing Manager, Auvik
Network Management

The Ultimate Guide to SNMP

Learn about SNMP, difference between SNMP v2 and v3, OIDs, SNMP alternatives and how monitoring networked devices is the core function of SNMP.
Author: Steve Petryschuk
Director & Tech Evangelist, Auvik
Network Management

SNMP Ports: Everything You Need to Know for Efficient Network Management

Simple Network Management Protocol (SNMP) is a widely used network monitoring and management protocol.  It allows you to keep track of the status
Author: Rebecca Grassing
Product Marketing Manager, Auvik
Cybersecurity

What is a Supply Chain Attack (and What Can You Do About It)?

Any cybersecurity breach is damaging to individual companies. But when it becomes a supply chain attack, the results can be chaotic and widespread. Wh
Author: Ryan LaFlamme
SaaS Management

Understanding Cybersecurity Insurance Requirements and How Network Visibility Can Help

Cybersecurity insurance requirements are tougher than ever. Learn how network visibility can help you secure coverage and claim support.
Author: John Harden
IT Leadership

What is Endpoint Monitoring? Definitions, Benefits & Best Practices

Learn about the importance of endpoint monitoring, key challenges, and best practices to protect your network from cyber threats. Explore emerging tre
Author: Patrick Albert
VP Product Management
IT Leadership

What is Endpoint Detection and Response (EDR) Software?

Organizations are rapidly adopting endpoint detection and response software to address the challenge and strengthen their overall network infrastructu
Author: Patrick Albert
VP Product Management

Whatโ€™s your shadow IT risk factor?

Find out in this free guide and exercise kit.
cover of shadow IT ebook
You will learn:
  • The impact shadow IT has on an organization
  • How to evaluate tools
  • Tips on security
  • A quiz to help you determine the severity of shadow IT in your org
  • Solutions to solve these problems