When organizations plan a network deployment, the focus usually centers on configuration standards, firmware versions, and installation timelines.
Continue readingHome LookingPoint Blog
When organizations plan a network deployment, the focus usually centers on configuration standards, firmware versions, and installation timelines.
Continue readingWhen a fast-growing manufacturer partnered with LookingPoint, they were expanding service centers across the globe at an aggressive pace.
Each new location required a standardized End User Equipment deployment package: displays, technician workstations, charging carts, tablets, and supporting hardware. The challenge wasn’t sourcing the technology.
The challenge was scaling deployment without...
Continue readingWelcome back! Today we're diving deep into one of the most misunderstood (and frankly, confusing) aspects of Cisco Secure Access – the decryption decision flow. If you've ever scratched your head wondering why IPS and SWG (Secure Web Gateway) have separate decryption settings, or why your Do-Not-Decrypt (DND) lists seem to behave differently depending on which entry point your traffic takes, then...
Continue readingLast year my company bought Cisco Secure Access and at the same time one of my customers also bought Cisco Secure Access after having some issues with their current setup with Z-scaler. In that time I was exposed pretty intimately with the product and the different components that make up the Secure Access portfolio.
Continue readingSince the year 2000, Cisco Call Manager (now Unified CM) has been the backbone of enterprise voice, powering communication for organizations worldwide. For over 26 years, this mature platform has established itself as the gold standard in corporate telephony.
So, why are we writing about a 26-year-old product today? Because its continued relevance is undeniable.
Continue readingWelcome back! In this entry, we're diving into one of the most compelling features of Cisco Secure Access – Clientless Zero Trust Access, or as I like to call it, "the VPN killer that actually works." If you've been following along with our zero-trust journey, you know that the traditional perimeter-based security model is about as effective as a screen door on a submarine. So, what's the...
Continue readingFILE TRANSFER TO VCENTER 7 or 8 VCSA WITH WINSCP (Or How to address the “Host is not communicating for more than 15 seconds” error)
Continue readingIn today’s world, employees use their phones and tablets for both personal and work tasks. That’s great for productivity—but it also means company data can end up on devices outside your control. Microsoft Intune makes this easy with App Protection Policies (APP)—a simple way to keep corporate information safe without touching personal apps or data.
Continue readingIn today’s fast-moving digital landscape, organizations don’t just need technology; they need someone to help them use it well. That’s why partnering with a technology integrator has become one of the smartest moves an IT team can make. A strong integrator does far more than deploy solutions. They bring a true Customer Success practice to ensure your technology delivers measurable outcomes,...
Continue readingI’ve always been fascinated by the quiet resilience of infrastructure — the invisible backbone that keeps businesses humming. But nothing highlights that resilience quite like an unexpected outage in the field.
Continue reading
Looking Point Inc. 2019