Home LookingPoint Blog

Blog

For the last few years we have been able to manage the Catalyst 9300 switches in the Meraki portal. Cisco figured out if they create a special version of IOS-XE with a container used for connecting to the Meraki cloud, then you can manage the switch the same way we manage traditional Meraki MS switches. The 9300 was the perfect platform because it has the same form factor as the existing MS...

Continue reading

With all the conflicts happening around the world, the last thing an IT admin expects is "friendly fire" between their web browser and the collaboration servers they manage. But big changes are coming to Google Chrome and they’re coming fast.

Continue reading

If you manage a Cisco network, you likely have an underused management platform at your disposal. Maybe it came bundled with a licensing agreement. Maybe it was part of a refresh project that moved fast, and the management layer got configured just enough to work. Either way, the dashboard is there. The question is whether it is actually working for you.

Continue reading

Welcome back! Today we're diving deep into one of the most misunderstood (and frankly, confusing) aspects of Cisco Secure Access – the decryption decision flow. If you've ever scratched your head wondering why IPS and SWG (Secure Web Gateway) have separate decryption settings, or why your Do-Not-Decrypt (DND) lists seem to behave differently depending on which entry point your traffic takes, then...

Continue reading

Since the year 2000, Cisco Call Manager (now Unified CM) has been the backbone of enterprise voice, powering communication for organizations worldwide. For over 26 years, this mature platform has established itself as the gold standard in corporate telephony.

So, why are we writing about a 26-year-old product today? Because its continued relevance is undeniable.

Continue reading

Welcome back! In this entry, we're diving into one of the most compelling features of Cisco Secure Access – Clientless Zero Trust Access, or as I like to call it, "the VPN killer that actually works." If you've been following along with our zero-trust journey, you know that the traditional perimeter-based security model is about as effective as a screen door on a submarine. So, what's the...

Continue reading

In today’s connected world, protecting your business means more than simply having a firewall in place. Threats evolve by the minute, and every misconfiguration or missed update creates potential risk. A Managed Firewall is the smarter way to keep your defenses strong; combining advanced technology with continuous oversight from security experts. At LookingPoint, we built our Managed Firewall...

Continue reading

Cisco Secure Access: Cloud Security Simplified

Cisco Secure Access is a cloud-delivered Security Service Edge (SSE) solution built to secure your workforce, no matter where they’re working. Leveraging zero trust principles, it provides seamless and secure access to applications and data across any network. Designed for modern businesses, it streamlines security management while keeping threats...

Continue reading

Call recording has long been a vital component of business communications, especially in regulated industries such as finance, healthcare, and government. What began as a basic compliance tool has evolved into a powerful engine for business intelligence, customer satisfaction, and agent training. In this blog, we explore how call recording has transformed over time, its growing importance in the...

Continue reading

Hey there! The Cisco Catalyst 9800 Series Wireless LAN Controllers (WLCs) are pretty awesome, and one cool trick up their sleeve is the Always-On Tracing feature. It’s a total lifesaver for figuring out what’s going wrong in your wireless network. Let’s break it down quick—what it is, how it works, and why you’ll love it!

Continue reading
  • There are no suggestions because the search field is empty.

Latest Tweets