Home LookingPoint Blog

Blog

Hey Team! Today we will be looking at a quick “How-To” on how to go about Editing/Deleting NAT rules and Access Control List entries, inside of Cisco Defense Orchestrator for Firepower Management Center. Let’s get to it!

Continue reading

Network security is often delegated to singular devices within the network. For instance, you might allow unfettered access for all endpoints within the core of your corporate network and enforce the access policy at the edge firewall. For your wireless users, you might choose to enforce a singular policy for all users allowing every wireless user access to HTTP, HTTPS, SSH, and Telnet and...

Continue reading

Welcome back to another recap of LookingPoint Fireside Chat, where we bring casual yet insightful conversations on modern IT solutions. In this episode, CEO Sean Barr is joined by Marshall Hill, Solutions Architect at LookingPoint, to talk about a critical topic that’s top-of-mind for every IT leader: Security.

Continue reading

Collaboration solutions for the modern workforce are focused more and more on enabling the mobile workforce, and why should security be any different? Today’s workforce is digitizing rapidly with more and more companies’ business model reflecting trends like mobility and “bring your own device”. The exponential growth of online devices is expected to grow from 15B today to 500B by 2030. With...

Continue reading
1
  • There are no suggestions because the search field is empty.

Latest Tweets