LookingPoint, Inc.

@lookingpoint

We are a full-service IT solutions provider. We can help you with all your IT infrastructure needs. Reach out, we would love to help!
Followers
305
Following
254
Account Insight
Score
20.84%
Index
Health Rate
%
Users Ratio
1:1
Weeks posts
We made a video. It involves IT. A scissor lift. And a few things you probably wouldn’t expect from a technology company. Let’s just say… it’s very LookingPoint. Watch it here.
44 2
2 months ago
Great day out at Field Day with the Northern California Cisco teams. Nothing better than a little friendly competition, teamwork, and time together outside the office. We appreciate the partnership and always enjoy opportunities to connect, collaborate, and have some fun along the way. Looking forward to the next one!
7 1
3 hours ago
Cisco just closed a major gap in network management. You can now manage Catalyst 9500 switches directly in the Meraki dashboard using StackWise Virtual. That means one unified platform for access and core switching. No more splitting management between CLI and cloud. In this blog, we break down what changed, how it works, and what to watch out for when converting and configuring SVL. Link in bio.
1 0
12 days ago
Chrome certificate changes are coming and Cisco Collaboration environments will feel it. If you manage CUCM or Expressway, it is time to prepare. Link in bio.
1 0
26 days ago
Kicked off Q2 with an offsite at the @TheGameShowExperience . Competitive spirit showed up, teamwork showed out. Let’s go!
19 0
1 month ago
Another epic pickleball day with our friends at @Cisco ! Always a great event bringing people together on and off the court!
16 1
1 month ago
Most Cisco networks already have powerful tools in place. They’re just not fully being used. If you’re running both Cisco Catalyst Center and the Cisco Meraki Dashboard, the challenge isn’t the technology. It’s knowing what each should actually do. In our latest blog, we break down: • Where each platform fits • What most teams are underutilizing • How to simplify your operational model If your dashboards aren’t delivering value, this is worth a read. Link in bio.
1 0
1 month ago
Most IT deployments are not slowed down by engineering. They are slowed down by environment. Limited staging space, competing schedules, and repeated hardware handling can turn a simple deployment into months of work. In this blog, we explain how LookingPoint’s Integration Center moves staging and configuration upstream so equipment arrives ready for installation. Link in bio.
8 0
1 month ago
Our new LookingPoint video may be finished… but the behind-the-scenes moments might be even better. Huge thank you to everyone who helped bring this project to life. From early planning to the final shots, it truly took a team. Special shoutout to our director @maxfancher and his incredible team @maximizevideo for turning a wild idea into something real, and to our CEO Sean Barr for bringing the vision to life on screen. 🎥
15 0
2 months ago
A manufacturer was opening new service centers and receiving nearly 100 OEM boxes per site. LookingPoint redesigned the deployment model. We consolidated everything into one secure, pre-integrated crate. Fully asset tagged. Deployment ready. Zero onsite packaging waste. The result: 3 to 4 days saved per location. We do not just ship hardware. We engineer deployment. Link in bio.
9 0
2 months ago
Decryption in Cisco Secure Access doesn’t work the way most people think. IPS and SWG don’t just share settings. They follow different decision paths, see different data, and exist for very different reasons. One protects against threats. The other enforces policy and visibility. In our latest blog, we break down the decryption decision flow in Cisco Secure Access, explaining when the IPS decrypts traffic and immediately discards it, when SWG decrypts traffic for policy enforcement and visibility, why Do Not Decrypt lists behave differently depending on entry point, and how to balance threat protection with user privacy. If you have ever wondered why traffic is or is not being decrypted, this one is worth the read. Read the full breakdown on the blog link above.
2 0
2 months ago
Cisco Secure Access brings together DNS security, cloud firewalling, and zero trust access into a single platform but understanding how the pieces fit together can be confusing. In our latest blog, we break down the core components of Cisco Secure Access including DNS Defense, Secure Internet Access, Secure Private Access, and Zero Trust Access. The post walks through how users connect, how traffic is inspected, and how policy is applied across hybrid and remote environments. If you are evaluating Cisco Secure Access, this guide provides a clear, practical look at how the platform actually works. Read the full blog here: /blog/cisco-secure-access-explained-components-and-architecture
4 0
3 months ago