Home LookingPoint Blog

Blog

In the first entry of this series, we looked at the high-level mechanics involved in using AnyConnect with the ISE Posture module to perform endpoint host inspection (posture) when connecting to an AnyConnect VPN head-end (ASA/FTD). In the second entry of this series, we narrowly focused on getting the ISE posture module provisioned. In the third entry, we took stock of all the available posture...

Continue reading

In the first entry of this series, we looked at the high-level mechanics involved in using AnyConnect with the ISE Posture module to perform endpoint host inspection (posture) when connecting to an AnyConnect VPN head-end (ASA/FTD). In the second entry of this series, we narrowly focused on getting the ISE posture module provisioned. If you haven’t check those out yet, please do, links below!

Continue reading

In the last entry of this series, we looked at the high-level mechanics involved in using AnyConnect with the ISE Posture module to perform endpoint host inspection (posture) when connecting to an AnyConnect VPN head-end (ASA/FTD). If you haven’t read that one yet, you can find it here!

In this entry, we will be narrowly focused on provisioning the ISE posture module. Enjoy!

Continue reading

Project Manager: “We need to give them access to our network.”

IT Security: “No.”

Project Manager: “We really need to give them access to our network.”

IT Security: “Still no.”

Project Manager: “C’mon, pleeease??”

IT Security: “Ok fine. But we’ll need to assess their computer for vulnerabilities.”

Continue reading

Today we are getting a little SASE 😊 We are talking about the Secure Access Service Edge. Before I talk about the components of SASE, let's talk a little bit about what it is. It moves these secure access services to the edge, which I know sounds pretty obvious right, but what's the edge? You may have remote users working out of their homes, maybe they are not near an office location. SASE moves...

Continue reading

It’s officially spring and for a lot of us that means spring cleaning – the attic, garage, basement, or just all those papers off the desk in the office. While you’re cleaning and reorganizing your personal life it’s also a good idea to take a look at your network and make sure that is cleaned up too. Below is a list of our top 8 best practices for cleaning up your network and devices.

Continue reading
Jan 17

Cisco Meraki provides cloud managed networking solutions, including wireless, switching, network security, communications, enterprise mobility management, and security cameras. Meraki products are designed as simple, scalable, out-of-the-box solutions with single-pane-of-glass network management, allowing users to easily manage their complex networks all over the world from one central location.

Continue reading

In this Fireside Chat CEO, Sean Barr, sits down with Principal Network Architect, John Li, to discuss one of the hottest IT topics of 2017: security. Sit back, relax, and enjoy this Fireside Chat. 

Continue reading

Security is something that most IT folks have a love/ hate relationship with. OK, mostly hate… because data security is not easy and it’s not something you can just do and forget about, instead you must continuously adapt your network security to keep up with evolving threats and mitigate risk.

Continue reading

Next Generation Firewall (NGFW), we’ve all heard of this often-used term (maybe overused) but what does it mean? What do you get if you have one and how do you get it? All great questions that begs to be answered.

Continue reading
1 2