Home LookingPoint Blog

Blog

The day of love is upon us. Valentine's Day is a day most of us spend celebrating our loved ones. We buy cards, candy, and gifts for the special people in our lives - all in the name of love. This year we wanted to take some time on this day celebrating the technologies we love most. There are so many amazing technologies out there to choose from, but we somehow managed to pair the list down to...

Continue reading
Series: Cisco Identity Services Engine (ISE).
Continue reading

On the first day of Christmas LookingPoint delivered me, a best practice network design. 

Continue reading

In this Fireside Chat CEO, Sean Barr, sits down with Principal Network Architect, John Li, to discuss one of the hottest IT topics of 2017: security. Sit back, relax, and enjoy this Fireside Chat. 

Continue reading

Security is something that most IT folks have a love/ hate relationship with. OK, mostly hate… because data security is not easy and it’s not something you can just do and forget about, instead you must continuously adapt your network security to keep up with evolving threats and mitigate risk.

Continue reading

Recently I deployed Cisco’s AMP for Endpoints for a 50-user organization. For the uninitiated, AMP for Endpoints is Cisco’s cloud based, enterprise grade, advanced malware protection software that is deployed to each end device in the network. Each endpoint reports back to the central cloud controller and is managed by the controller. Cisco integrated AMP for Endpoints with Cisco’s ThreatGRID to...

Continue reading

In our first LookingPoint Tech Talk Dominic Zeni, LookingPoint Consulting Services SME, discusses Cisco's Identity Services Engine, how it works, and why you should care. 

Continue reading

"On March 6, 2017, Apache disclosed a vulnerability in the Jakarta multipart parser of Apache Struts could allow an unauthenticated, remote attacker to execute arbitrary code on an affected system. This vulnerability has been assigned CVE-ID CVE-2017-5638. " (Cisco Security Advisory) 

Continue reading

Network security is often delegated to singular devices within the network. For instance, you might allow unfettered access for all endpoints within the core of your corporate network and enforce the access policy at the edge firewall. For your wireless users, you might choose to enforce a singular policy for all users allowing every wireless user access to HTTP, HTTPS, SSH, and Telnet and...

Continue reading
  • There are no suggestions because the search field is empty.

Latest Tweets