Home LookingPoint Blog

Blog

In three decades we went from shared 10 Mb hubs and beige pizza-box routers to leaf-spine fabrics pushing 400 GbE (and beyond), software-defined overlays, and AI-optimized data centers with liquid cooling and smart NICs. The big shifts: switches replaced hubs, virtualization and cloud changed traffic patterns, leaf-spine killed big L2 domains, EVPN-VXLAN became the standard overlay, copper gave...

Continue reading

In today’s connected world, protecting your business means more than simply having a firewall in place. Threats evolve by the minute, and every misconfiguration or missed update creates potential risk. A Managed Firewall is the smarter way to keep your defenses strong; combining advanced technology with continuous oversight from security experts. At LookingPoint, we built our Managed Firewall...

Continue reading

Wifi-7 (802.11be) was ratified last year and we have now started seeing vendors shipping APs based on these new standards. In this post lets discuss what is new with Wifi-7 and compare it to how it its an improvement over Wifi-6e.

Continue reading

Managing large numbers of devices in Microsoft Entra ID is easier when you organize them into groups. These groups can be used for applying policies, deploying apps, and managing access through Intune or other Microsoft services.

Continue reading

Ah, OAuth 2.0. The protocol that promised to end password reuse and save us from the deep, dark, insecure corners of the web. The one we thought would be the antidote to phishing. But guess what?

Continue reading

With Windows 10 reaching End of Life on October 14, 2025, now is the time to start planning your upgrade path to Windows 11! Whether you're testing on a single device or rolling it out company-wide, Microsoft Intune gives you a streamlined, hands-off way to manage the entire process.

Continue reading

Keeping network devices up to date is essential for security, performance, and reliability but coordinating upgrades across dozens or hundreds of switches can be a challenge. That’s where Cisco Catalyst Center 2.3.7 comes in. With major improvements to its Software Image Management (SWIM) workflow, this release introduces powerful new features like upgrade grouping and sequencing,...

Continue reading

Cisco Secure Access: Cloud Security Simplified

Cisco Secure Access is a cloud-delivered Security Service Edge (SSE) solution built to secure your workforce, no matter where they’re working. Leveraging zero trust principles, it provides seamless and secure access to applications and data across any network. Designed for modern businesses, it streamlines security management while keeping threats...

Continue reading

I've been doing a fair amount of wireless surveys lately, and part of the survey process includes generating the report that I present to the customer. These reports come with a series of heatmaps that aren't always self explanatory. This often leads to a discussion with the customer where i provide additional interpretation of the heatmap. In this post lets talk about the different heatmaps you...

Continue reading

Last year I wrote a blog about going passwordless (you can check it out here: https://www.lookingpoint.com/blog/passwordless). Now I’m doubling down and telling you that passwords are outdated. They’re reused, guessed, phished, and stolen. Despite password managers and multi-factor authentication (MFA), the underlying security model of passwords is inherently weak.

Continue reading
  • There are no suggestions because the search field is empty.

Latest Tweets