Home LookingPoint Blog

Blog

Poorly configured networks are vulnerable to many attacks. Easy attacks. In this blog we will demonstrate how easy it is to perform a DoS attack on a DHCP scope. Afterwards, we will remediate our poorly configured network devices with a security feature that you should include on every deployment to protect against this type of attack.

Continue reading

Today we are talking about 802.1X, like authenticating a device coming into a conference room.What is 802.1X ? In simple terms, it is an authentication mechanism that we leverage.

Continue reading

Cisco HyperFlex Solution

Continue reading
Jun 12

Today kicked off day one of Cisco Live 2018 in Orlando, FL! The day was filled with a keynote, breakout sessions, Innovation Showcases, and of course the World of Solutions. Here are our top takeaways from Cisco Live Day 1.

Continue reading

You have been working as a network administrator for your company for a few years now. In that time you have been asked to complete a handful of network projects; a new office turn up here, replace some switches or a router there. The whole time you work from old templates or, in the case of replacement gear, just copy and paste the old config. Have you ever really stepped back and looked at the...

Continue reading

Many refer to the digital revolution as the industrial revolution of the 21st century. Technology has become fundamentally integrated to all aspects of our society as it impacts all aspects of business and society today. The network is the foundation from which we have built our digital lives. As a business, you rely on your network to function securely and expediently, and in the age of digital...

Continue reading

Today more and more businesses are focused on application security and visibility. With expected exponential growth in online devices - from 15B today to an expected 500B by 2030, securing those devices has never been more important. Today’s rapidly evolving business models reflect trends like hybrid cloud, mobility and BYOD, meaning the traditional network perimeter has largely dissolved. The...

Continue reading

Network security is often delegated to singular devices within the network. For instance, you might allow unfettered access for all endpoints within the core of your corporate network and enforce the access policy at the edge firewall. For your wireless users, you might choose to enforce a singular policy for all users allowing every wireless user access to HTTP, HTTPS, SSH, and Telnet and...

Continue reading

Collaboration solutions for the modern workforce are focused more and more on enabling the mobile workforce, and why should security be any different? Today’s workforce is digitizing rapidly with more and more companies’ business model reflecting trends like mobility and “bring your own device”. The exponential growth of online devices is expected to grow from 15B today to 500B by 2030. With...

Continue reading

Currently I am working on a project where I am going through and optimizing a large set of Access Control Lists (ACL) on a set of 5585 Firewalls. While going through each ACL I have noticed a few mistakes other engineers have made while configuring these rules. I have compiled a list of these common mistakes. The focus of this blog will be around ACLs on Cisco ASA’s; however these rules still...

Continue reading
1 2
  • There are no suggestions because the search field is empty.

Latest Tweets