Home Default HubSpot Blog

Blog

As threats become more sophisticated, organizations are responding by introducing layers of security that go beyond just securing your internet edge and deploying anti-virus on the desktops. A big challenge with this approach is managing the often disparate systems that make up these layers. Cisco has made huge strides to correct this with their software releases this year, but in reality, it...

Continue reading

Network security is often delegated to singular devices within the network. For instance, you might allow unfettered access for all endpoints within the core of your corporate network and enforce the access policy at the edge firewall. For your wireless users, you might choose to enforce a singular policy for all users allowing every wireless user access to HTTP, HTTPS, SSH, and Telnet and...

Continue reading

Fireside Chats are a LookingPoint video series where we bring casual technology conversations to you! In this chat we are discussing a topic that many of our customers are talking about this year: Security and Network Visibility. Sit back, relax, and enjoy another fireside chat. 

Continue reading

Collaboration solutions for the modern workforce are focused more and more on enabling the mobile workforce, and why should security be any different? Today’s workforce is digitizing rapidly with more and more companies’ business model reflecting trends like mobility and “bring your own device”. The exponential growth of online devices is expected to grow from 15B today to 500B by 2030. With...

Continue reading

Last week Cisco hosted it’s second Partner Summit of 2016 in San Francisco, CA. At the summit Cisco announced the release of numerous new products and product updates to its partners. A few members of the LookingPoint team attended the summit and shared with us their top takeaways and exciting announcements from the Partner Summit.

Continue reading

Today, the most significant cyber threat is Ransomware – a type of malicious software designed to hold a user’s files (such as healthcare records, financial contracts, software codes, and other documents) for ransom by encrypting them and demanding the user pay a fee to decrypt them. Ransomware attacks use sophisticated infrastructure and resilient techniques to target data and hold critical...

Continue reading