We made a video.
It involves IT.
A scissor lift.
And a few things you probably wouldn’t expect from a technology company.
Let’s just say… it’s very LookingPoint.
Watch it here.
Great day out at Field Day with the Northern California Cisco teams.
Nothing better than a little friendly competition, teamwork, and time together outside the office. We appreciate the partnership and always enjoy opportunities to connect, collaborate, and have some fun along the way.
Looking forward to the next one!
Cisco just closed a major gap in network management.
You can now manage Catalyst 9500 switches directly in the Meraki dashboard using StackWise Virtual.
That means one unified platform for access and core switching. No more splitting management between CLI and cloud.
In this blog, we break down what changed, how it works, and what to watch out for when converting and configuring SVL.
Link in bio.
Chrome certificate changes are coming and Cisco Collaboration environments will feel it.
If you manage CUCM or Expressway, it is time to prepare.
Link in bio.
Most Cisco networks already have powerful tools in place.
They’re just not fully being used.
If you’re running both Cisco Catalyst Center and the Cisco Meraki Dashboard, the challenge isn’t the technology. It’s knowing what each should actually do.
In our latest blog, we break down:
• Where each platform fits
• What most teams are underutilizing
• How to simplify your operational model
If your dashboards aren’t delivering value, this is worth a read.
Link in bio.
Most IT deployments are not slowed down by engineering. They are slowed down by environment. Limited staging space, competing schedules, and repeated hardware handling can turn a simple deployment into months of work.
In this blog, we explain how LookingPoint’s Integration Center moves staging and configuration upstream so equipment arrives ready for installation.
Link in bio.
Our new LookingPoint video may be finished… but the behind-the-scenes moments might be even better.
Huge thank you to everyone who helped bring this project to life. From early planning to the final shots, it truly took a team.
Special shoutout to our director @maxfancher and his incredible team @maximizevideo for turning a wild idea into something real, and to our CEO Sean Barr for bringing the vision to life on screen. 🎥
A manufacturer was opening new service centers and receiving nearly 100 OEM boxes per site. LookingPoint redesigned the deployment model. We consolidated everything into one secure, pre-integrated crate. Fully asset tagged. Deployment ready. Zero onsite packaging waste.
The result: 3 to 4 days saved per location.
We do not just ship hardware. We engineer deployment.
Link in bio.
Decryption in Cisco Secure Access doesn’t work the way most people think.
IPS and SWG don’t just share settings. They follow different decision paths, see different data, and exist for very different reasons. One protects against threats. The other enforces policy and visibility.
In our latest blog, we break down the decryption decision flow in Cisco Secure Access, explaining when the IPS decrypts traffic and immediately discards it, when SWG decrypts traffic for policy enforcement and visibility, why Do Not Decrypt lists behave differently depending on entry point, and how to balance threat protection with user privacy.
If you have ever wondered why traffic is or is not being decrypted, this one is worth the read.
Read the full breakdown on the blog link above.
Cisco Secure Access brings together DNS security, cloud firewalling, and zero trust access into a single platform but understanding how the pieces fit together can be confusing.
In our latest blog, we break down the core components of Cisco Secure Access including DNS Defense, Secure Internet Access, Secure Private Access, and Zero Trust Access. The post walks through how users connect, how traffic is inspected, and how policy is applied across hybrid and remote environments.
If you are evaluating Cisco Secure Access, this guide provides a clear, practical look at how the platform actually works.
Read the full blog here: /blog/cisco-secure-access-explained-components-and-architecture