Hey Team! Today we will be looking at a quick “How-To” on how to go about Editing/Deleting NAT rules and Access Control List entries, inside of Cisco Defense Orchestrator for Firepower Management Center. Let’s get to it!
Continue readingHome LookingPoint Blog
Hey Team! Today we will be looking at a quick “How-To” on how to go about Editing/Deleting NAT rules and Access Control List entries, inside of Cisco Defense Orchestrator for Firepower Management Center. Let’s get to it!
Continue readingNetwork security is often delegated to singular devices within the network. For instance, you might allow unfettered access for all endpoints within the core of your corporate network and enforce the access policy at the edge firewall. For your wireless users, you might choose to enforce a singular policy for all users allowing every wireless user access to HTTP, HTTPS, SSH, and Telnet and...
Continue readingFireside Chats are a LookingPoint video series where we bring casual technology conversations to you! In this chat we are discussing a topic that many of our customers are talking about this year: Security and Network Visibility. Sit back, relax, and enjoy another fireside chat.
Continue readingCollaboration solutions for the modern workforce are focused more and more on enabling the mobile workforce, and why should security be any different? Today’s workforce is digitizing rapidly with more and more companies’ business model reflecting trends like mobility and “bring your own device”. The exponential growth of online devices is expected to grow from 15B today to 500B by 2030. With...
Continue readingLooking Point Inc. 2019