Blog-Hero.jpg

Blog

Cisco IOS/IOS-XE Local Password Authentication Best Practices

Hello loyal blog readers. Over the last few weeks I have been busy working on a network assessment for one of our fantastic customers. One of the areas we look at when assessing a customer’s network is how they are protecting/restricting access to the management plane of their network infrastructure.

Continue reading  

How secure is your network? There is one way to find out.

So, you have invested in the latest generation of security appliances with their application aware policy capabilities, integrated IDS/IPS and URL filtering. All your endpoint devices have been deployed with the newest Advanced Malware Protection agents using the latest machine learning technology. You subscribe to the CVE feed and have a well-defined procedure to patch your entire environment at the first hint of a zero-day exploit. System and policy changes are required to go through rigorous change control, and if that’s not enough all your employees have been subjected to intensive information security training. One might think it’s time to relax put your feet up and grab yourself a nice cup of tea or favorite adult beverage.

Continue reading  
Subscribe to Our Blog

Subscribe to the informative Newsletter to be Notified Updates in the Technology world.

subscribe to our blog

CONTACT INFO

Phone Number: 925-566-3480

Email: sales@lookingpoint.com

HEADQUARTERS
391 Taylor Blvd. Suite 120
Pleasant Hill, California 94523
GET IN TOUCH
Join our mailing list to stay up to date and get notices about our new releases!

© 2016 Lookingpoint - ALL RIGHTS RESERVED