Home LookingPoint Blog

Blog

At LookingPoint, we understand that even the best technical teams sometimes need a second set of eyes, faster escalation paths, or just a bit of extra support when it matters most. That’s why we’re excited to introduce Express Support—our enhanced support offering designed to work alongside your existing Cisco SMARTnet.

Continue reading

In today’s modern network security landscape, protecting your organization’s resources requires more than just securing IP addresses. The key to a robust and adaptive security strategy is integrating user identity (User-ID) with your firewall. Palo Alto Networks offers a powerful and flexible User-ID feature, allowing you to associate network traffic with user identities, rather than relying...

Continue reading

When it comes to securing a network, firewalls play an indispensable role. Among the leading firewall vendors, Palo Alto Networks stands out for its advanced, feature-rich solutions that go beyond traditional security to offer next-generation firewall capabilities. From small businesses to large enterprises, Palo Alto firewalls provide an effective defense mechanism to safeguard sensitive data...

Continue reading

When upgrading or transitioning from a Palo Alto Networks PA-820 to a PA-1410, it's important to ensure that your configuration settings are seamlessly transferred. The PA-1410 offers higher performance and more features than the PA-820, but transferring configurations can sometimes be tricky. This blog post will guide you through the necessary steps to copy configurations from a PA-820 to a...

Continue reading

In networking, switches play a critical role in connecting devices and managing network traffic within a local area network (LAN). When you deploy a new switch, it's important to configure it properly to ensure optimal performance, security, and functionality. This guide will walk you through the essential steps for setting up a base configuration for a network switch.

Continue reading

In modern network environments, providing seamless communication and service discovery for Apple devices is essential. Bonjour, Apple’s zero-configuration networking protocol, is widely used for device discovery, resource sharing, and communication in local area networks (LAN). It allows devices such as printers, cameras, speakers, and computers to automatically detect and connect to each other...

Continue reading

Sometimes it happens, for some reason, you need to move your VMWare hosts to a new subnet. Let’s talk about what you might want to consider and how to make the process as smooth as possible.

Continue reading

In today’s digital landscape, ensuring the security of your network is more critical than ever. With cyber threats evolving rapidly, organizations must adopt robust security measures to protect their sensitive data and systems. One powerful tool in the cybersecurity arsenal is Nessus, a widely used vulnerability scanner. In this blog, we'll explore what Nessus is, how to effectively use it, and...

Continue reading

In network environments, security is a top priority. One of the critical aspects of securing Cisco devices is controlling who can access them and what level of permissions they have. Authentication, Authorization, and Accounting (AAA) is a Cisco framework designed to provide a robust and scalable security mechanism to manage access control on network devices. In this blog, we'll focus on using AAA

Continue reading

In today’s interconnected world, the need for robust cybersecurity measures in industrial environments has never been more critical. With the rise of Industry 4.0 and the integration of IoT devices into manufacturing processes, the Purdue Model provides a structured approach to securing operational technology (OT). In this blog, we’ll explore the Purdue Model, its significance, and how...

Continue reading
  • There are no suggestions because the search field is empty.

Latest Tweets