I’ve always been fascinated by the quiet resilience of infrastructure — the invisible backbone that keeps businesses humming. But nothing highlights that resilience quite like an unexpected outage in the field.
Continue readingHome LookingPoint Blog
I’ve always been fascinated by the quiet resilience of infrastructure — the invisible backbone that keeps businesses humming. But nothing highlights that resilience quite like an unexpected outage in the field.
Continue readingWelcome back to our exploration of modern zero trust technologies! In this entry, we're going to pull back the curtain on Cisco Secure Access and examine how Zero Trust Network Access (ZTNA) client traffic steering actually works under the hood. If you've been wondering how your private applications and internet traffic know which path to take through the Secure Access cloud, you're in for a...
Continue readingIn three decades we went from shared 10 Mb hubs and beige pizza-box routers to leaf-spine fabrics pushing 400 GbE (and beyond), software-defined overlays, and AI-optimized data centers with liquid cooling and smart NICs. The big shifts: switches replaced hubs, virtualization and cloud changed traffic patterns, leaf-spine killed big L2 domains, EVPN-VXLAN became the standard overlay, copper gave...
Continue readingIn today’s connected world, protecting your business means more than simply having a firewall in place. Threats evolve by the minute, and every misconfiguration or missed update creates potential risk. A Managed Firewall is the smarter way to keep your defenses strong; combining advanced technology with continuous oversight from security experts. At LookingPoint, we built our Managed Firewall...
Continue readingWifi-7 (802.11be) was ratified last year and we have now started seeing vendors shipping APs based on these new standards. In this post lets discuss what is new with Wifi-7 and compare it to how it its an improvement over Wifi-6e.
Continue readingManaging large numbers of devices in Microsoft Entra ID is easier when you organize them into groups. These groups can be used for applying policies, deploying apps, and managing access through Intune or other Microsoft services.
Continue readingAh, OAuth 2.0. The protocol that promised to end password reuse and save us from the deep, dark, insecure corners of the web. The one we thought would be the antidote to phishing. But guess what?
Continue readingWith Windows 10 reaching End of Life on October 14, 2025, now is the time to start planning your upgrade path to Windows 11! Whether you're testing on a single device or rolling it out company-wide, Microsoft Intune gives you a streamlined, hands-off way to manage the entire process.
Continue readingKeeping network devices up to date is essential for security, performance, and reliability but coordinating upgrades across dozens or hundreds of switches can be a challenge. That’s where Cisco Catalyst Center 2.3.7 comes in. With major improvements to its Software Image Management (SWIM) workflow, this release introduces powerful new features like upgrade grouping and sequencing,...
Cisco Secure Access is a cloud-delivered Security Service Edge (SSE) solution built to secure your workforce, no matter where they’re working. Leveraging zero trust principles, it provides seamless and secure access to applications and data across any network. Designed for modern businesses, it streamlines security management while keeping threats...
Looking Point Inc. 2019