Operations | Monitoring | ITSM | DevOps | Cloud

Does Your MSP Have a Single Point of Failure?

When I’m speaking to any IT solution provider or managed service provider (MSP), one of the most common questions I’m asked is, “What’s the one mistake you’d recommend any IT businesses avoid?” My answer is always this: Not documenting your business. The reason is simple. If you don’t document your business, you’ll inevitably find your business is prone to an SPF—a single point of failure.

Distributed Healthcare Network Monitoring is Possible (with the Right System)

Healthcare SysAdmins haven’t just taken the concept of digital transformation to heart—they’re one of its largest proponents. Quality care improves patient outcomes, so healthcare organizations have embraced the idea of highly connected and digitally enhanced environments to help deliver that care. But while healthcare might often be at the forefront of the digital transformation and tech adoption wave, that doesn’t mean the process isn’t fraught with challenges.

What is an Access Control List (ACL)?

A commonly used tool at the Cisco command line is the access control list (ACL). At their simplest, access control lists are collections of IP addresses that are used by a router, switch, or a firewall to identify network traffic that must be handled in a special way. Cisco and other network vendors use ACLs for many different purposes. This article focuses on IOS access control lists as used on Cisco routers, although much of this discussion applies to Cisco switches as well.

Network Basics: Configuring Interfaces on Ethernet Switches

Administrators are tasked with configuring interfaces on network devices more than any other single thing. This makes sense—interfaces are the main points of connectivity, sending and receiving traffic throughout an organization. Configuring interfaces can be deceptively easy. Switchports might require a VLAN assignment, and often function with no other configuration at all. Router interfaces can be up and running with only an IP address.

Beyond Zero Trust: What is Continuous Security Validation?

Continuous security (or control) validation helps me explain network security with one of my favorite analogies. Network security is like jiu-jitsu. You have no idea how strong your defenses are if you’re not rolling (sparring) regularly. Let’s take a closer look at continuous security validation, and explain why, just like jiu-jitsu, you need to keep your system in practice to keep it sharp.

Sustainable competitive advantage: 10 Ways a Small MSP Can Punch Above Its Weight

Sometimes we associate “big” with power and success, but being small doesn’t mean you can’t compete—you just need to be smarter at creating a sustainable competitive advantage. Here are 10 things you can do as a small managed service provider (MSP) to punch above your weight.

Network Automation: What It Is, Where It's Heading, and How to Start Planning

Automation. It’s a common term. Some may call it a buzzword, even. When it comes to building a network, it’s usually not your first consideration. After all, what’s most important is getting users and devices online—and keeping them there. Isn’t automating the network an advanced step? Are we even capable of making network monitoring and management automatic?

Auvik's Network Vendor Diversity 2021: Who Reigns the Network?

At the end of November 2021, Auvik released our annual Network Vendor Diversity Report, and the data we collected had some interesting findings. Over 520,000 devices across 40,000 networks contributed, showing which vendors are taking a leading share of the market. In this roundup, we’ll show you some of the most interesting learnings we saw in 2021.

Auvik Rollup & Roadmap Update - Q4 2021

Patrick Albert, VP Product Management, and Julie Forsythe, VP Engineering discussed the latest Auvik developments and handy new features in our Q4 2021 Rollup & Roadmap Update. See what's new, from Discovery Dashboard, syslog, and device information improvements to certification updates for SAML SSO admins to out-of-the-box identification support for 40 more devices, and get a sneak peek into what we're working on to improve your troubleshooting experience and product extensibility.