Operations | Monitoring | ITSM | DevOps | Cloud

Auvik

NetFlow Basics: An Introduction to Monitoring Network Traffic

To fully understand what NetFlow is and why it’s used for network monitoring, we first need to know what a flow is. When computers need to talk to one another they establish communication channels, commonly referred to as connections. (Technically speaking, these communication channels can only be called connections when the TCP protocol is involved.) A flow refers to any connection or connection-like communication channel.

Digital Transformation Is Top IT Priority in 2019, TechTarget Reports

Nearly 70% of businesses have digital transformation as their top IT priority in 2019, according to the 2019 TechTarget IT Priorities survey. But what does that mean? Digital transformation is a loose term, used by different people in different ways, to encompass the initiatives businesses undertake to modernize their IT operations.

To Protect and Secure: Selling Cybersecurity as a Service

Auvik AVP of product management Patrick Albert talks with Tayler Feigl, Channel Development Manager, APAC at Datto to discuss key findings in Datto’s annual State of the Channel Ransomware Report, the result of interviewing 100,000 small to mid-sized business (SMBs) around the globe. You’ll hear what your MSP peers are doing to prepare, protect, and recover against ransomware, and investigate how you can use these findings to sell cybersecurity as part of your managed services offering.

Auvik Use Case #12: Fast Client Onboarding

Onboarding new clients can be a very time-consuming process for MSPs. To get the lay of the land, you typically need to make the trip to the client site, crawl through switch closets, perform a site survey, and complete many more manual tasks. But even after that investment of time and resources, sometimes you don’t get the full picture.

What Could Your MSP Do With a Power-Up in 2019?

Imagine if your MSP business had an elite group of advisors—made up of some of the brightest minds in the business—standing by to give you advice. Decades of insight and expertise on tap, there to safely guide you around pitfalls and share success strategies that have worked for them. Imagine the kind of boost that might give you.

5 Security Best Practices for Network Devices

It’s a sad but common truth that not all network devices are built with security in mind. Some ship with default credentials like admin / admin, with SNMP set to public, or with operating systems that haven’t been updated in years. As with any other device, it’s important to practice good hygiene when managing network devices. Good hygiene means things like keeping firmware up to date, changing credentials away from the defaults, and refreshing end-of-life hardware and software.