Home LookingPoint Blog

Blog

Network security is often delegated to singular devices within the network. For instance, you might allow unfettered access for all endpoints within the core of your corporate network and enforce the access policy at the edge firewall. For your wireless users, you might choose to enforce a singular policy for all users allowing every wireless user access to HTTP, HTTPS, SSH, and Telnet and...

Continue reading

Fireside Chats are a LookingPoint video series where we bring casual technology conversations to you! In this chat we are discussing a topic that many of our customers are talking about this year: Security and Network Visibility. Sit back, relax, and enjoy another fireside chat. 

Continue reading

Collaboration solutions for the modern workforce are focused more and more on enabling the mobile workforce, and why should security be any different? Today’s workforce is digitizing rapidly with more and more companies’ business model reflecting trends like mobility and “bring your own device”. The exponential growth of online devices is expected to grow from 15B today to 500B by 2030. With...

Continue reading
1
  • There are no suggestions because the search field is empty.

Latest Tweets