Operations | Monitoring | ITSM | DevOps | Cloud

Auvik

How to Use the Triple-A Framework to Optimize Your IT Services

Marketing teams have the 4 Ps (product, price, place, and promotion). Sales teams have ABC (Always Be Closing). As far as frameworks go, there are a lot of great examples out there for how we can effectively do our jobs, create processes, and make decisions. But what about IT teams looking to optimize their services? Do any frameworks exist? One does, it’s called the triple-A framework—and it’s got nothing to do with batteries.

How to solve network issues faster than ever with Auvik

Getting to the bottom of a network issue is a race against the clock. But with Auvik, time is on your side. Learn how having network topology, performance metrics, traffic analytics, and centralized logs all in one convenient dashboard can help you dramatically shrink resolution times on network issues and keep your end users connected.

The No Sweat Guide to Effective Switch Management

An on-site switch plays a critical role in a network: that of connecting your users to the rest of the IT infrastructure. Don’t think of that jack in the wall or under the cubicle as a simple Ethernet port. As part of effective switch management, you need to think of it as the mission-critical gateway to IT services that it is.

sFlow vs NetFlow: What's the Difference?

In any given network, switches, routers, and firewalls may support different flow protocols. After all, there’s NetFlow, sFlow, IPFIX, and J-Flow, to name a few. With so many options, you may be wondering “Which flow protocol should I use?” It’s a common question, and it has a relatively simple answer: While some devices support multiple protocols, a device typically only supports one type of flow protocol, so you should use the protocol your device and collector supports.

Making Co-managed IT Work In the Real World (From Pros Who've Walked the Walk)

An IT director and an MSP walk into a bar… Well, it wasn’t actually a bar, it was a panel session on the second day of the Protect & Streamline Summit for IT Leaders. And they didn’t so much walk in as hit join meeting from their respective home offices. Nevertheless, the discussion between Bryan Schultz and Bob Coppedge, moderated by Datto’s Rob Rae, felt a lot like a candid conversation between friends.

Managing IT Risk When Everyone's Working Remote

Cybersecurity has always been an evolving challenge for IT teams—even before the pandemic and subsequent mass exodus to the home office. At the Protect & Streamline Summit for IT Leaders, experts from the IT and cybersecurity space came together to share advice for IT leaders scrambling to contend with a new set of business risks. Read on for key takeaways or access all session recordings for a deeper dive.

Why a Zero-Trust Network Is More Desirable-and Achievable-Than Ever

A few years ago I wrote a blog article about the zero-trust network security model and why I thought it was something every organization should be thinking about implementing. While I still believe that to be true—probably more true than ever, in fact—the landscape since then has changed a great deal, particularly because of the increase in cloud-based services, and zero-trust is now an extremely achievable goal.

3 Reasons to Use Auvik's Remote Management Features

In today’s world, it isn’t always practical or possible to be on site to troubleshoot every network issue that pops up. Whether you’re under mandatory stay-at-home orders because of a global pandemic, in the middle of a surprise snowstorm, or sleeping cozy in your bed 60 miles away, being able to access remotely the network would make your life infinitely easier. With Auvik’s remote management features, it’s possible.