SlideShare a Scribd company logo
1 of 24
Download to read offline
Oct 2017
Why Cloud Managed Networking?
2
An integrated solution for new IT challenges
3
Billions of
mobile devices
A complete solution out-of-the-box:
No extra hardware, software, or complexity
HD video and rich
media
New business
opportunities
Integrated mobility
management
Layer 7
application shaping
Analytics and user
engagement
The cloud increases IT efficiency
4
Manageability Scalability Cost Savings
Turnkey installation and
management
Secure out-of-bound
managementā€”no user
traffic flows through the
cloud
Scales from small
branches to large
networks
Reliable: the network
stays up, even if
connection to the cloud is
lost
Reduces operational
costs
Integrated, always up-to-
date features
Bringing the cloud to enterprise IT
5
MR
Wireless LAN
Systems Manager
Mobility Management
MS
Ethernet Switches
MX
Security Appliances
MC
Communications
MV
Security Cameras
6Ā© 2015 Cisco and/or its affiliates. All rights reserved.
Meraki Overview
6
Simplifying across IT with cloud management
7
A complete cloud managed networking solution
Wireless, switching, security, communications,
EMM, and security cameras
Integrated hardware, software, and cloud services
Leader in cloud-managed networking
Among Ciscoā€™s fastest growing portfolios
Over 140,000 unique customers
Over 2 million Meraki network devices online
Trusted by thousands of customers worldwide:
Ā© 2016 Cisco and/or its affiliates. All rights reserved.
80,000 active Orgs
260,000 Networks
870,000 Nodes
ā€¦ 200M page views per day
ā€¦ 1.5B clients detected
ā€¦ 740M connected
Intuitive web-based dashboard
9
Sitewide
search
Client
location
Application
QoS
Real-time
control
Client
fingerprints
Single pane
of glass
management
SaaS feature delivery, quarterly updates
10
User/device fingerprinting
Application firewall
Content filtering
Network access control Location Analytics
Mobile application deployment
Demo
11
Distributed networks
12
Centralized cloud
management scales to
thousands of sites
Multi-site visibility and
control
Map-based dashboard; configuration sync; remote diagnostics; automatic monitoring
and alerts
Zero-touch provisioning Devices easily provisioned from the cloud, no staging required
Traffic acceleration Web caching reduces bandwidth usage; application-aware QoS and SD-WAN
capabilities prioritize business critical apps
High capacity edge networks
13
RF optimization and
application-aware QoS for
high-throughput, high
density WLAN
Layer 7 application and
traffic shaping
Throttle, block, or prioritize application traffic with DPI-based fingerprinting; set user and
group-based traffic shaping rules
Cloud-based RF
optimization
Dynamically avoid interference, optimizing channel selection and power levels
Density-optimized
WLAN
RF platform tuned for airtime fairness and performance in dense performance-critical
environments
Mobility management
14
Security, management, and
capacity for BYOD-ready
deployments right out of
the box
Device-aware security Device-aware firewall and access control; antivirus scan; LAN isolation; Bonjour
Gateway; content and security filtering
Integrated EMM Enforce encryption, passcodes, and device restrictions; deploy enterprise applications;
remotely lock or wipe devices
Simplified onboarding Flexible authentication with Active Directory integration, SMS authentication, hosted
splash pages, and automatic EMM enrollment
User analytics and engagement
15
Built-in location analytics
dashboard
Optimize marketing and
business operations
Analyze capture rate, dwell time, and new/repeat visitors to measure the impact of
advertising, promotions, site utilization, etc.
Built-in location
analytics
Integrated in the WLAN; no extra sensors, appliances, or software
Extensible API Integrate location data with CRM, loyalty programs, and custom applications for targeted
real-time offers
Flexible authentication and access control
16
Flexible built-in
authentication mechanism
Flexible authentication Secure 802.1x and Active Directory authentication; Facebook Authentication for
branding and targeted social marketing; SMS self-service authentication; and hosted
sign-on splash pages
Dynamic access control Assign clients layer 3 / 7 firewall rules, VLANs, and application-aware quality of service
by identity, group, location, or device type
Simplified enterprise security
17
Enterprise-class security
features for security-
conscious environments
Air Marshal
WIDS/WIPS
Detect wireless attacks; contain rogue APs; cloud-based alerting and diagnostics
User and device aware
security
User, device, and group-based firewall rules (layer 3 / 7) with Active Directory integration
UTM and content
security
Application firewall; content filtering matching 1B+ URLs; antivirus/anti-malware filtering;
Google safe-search
Bonus
18
Ā© 2010 Cisco and/or its affiliates. All rights reserved. 19
Detect Engage Drive
19
Cisco Cloud
Networking Presence
Shopper Presence
(associated or non-associated)
Deep Analytics & Engagement
ā€¢ Targeted Offers
ā€¢ CRM Correlation
ā€¢ Location Services
ā€¢ Omni-channel Selling
ā€¢ Online Cannibalization
Cisco Cloud Networking: Out of Box Analytics
Engage
Shoppers
Location Tracking Approaches
ā€¢ Real-time location tracking and positioning systems can be classified by the
measurement techniques they employ to determine mobile device location
ā€¢ Approaches differ in terms of the specific technique used to sense and
measure the position of the mobile device in the target environment
ā€¢ Real-Time Location Systems (RTLS) can be grouped into four basic
categories of systems that determine position on the basis of the following:
20
Cell of origin (nearest cell) Distance based (lateration) Angle based (Angulation) Location patterning
BRKEWN-2650
Cell of Origin
ā€¢ One of the simplest mechanisms of estimating approximate location in any
system based on RF cells is the concept of ā€˜cell of originā€™ (or ā€˜associated
access pointā€™ in Wi-Fi 802.11 systems)
ā€¢ When receiving cells, provide received signal strength indication (RSSI)
for mobile devices; the use of the highest signal strength technique can
improve
location granularity over the cell of origin.
21BRKEWN-2650
Distance-Based (Trilateration) Techniques
ā€¢ Trilateration can be performed by using received signal strength (RSS)
ā€¢ Measured by either the mobile device or the receiving sensor
22
10dB
The closer the distance the greater
the rate of change in RSS in
relationship to distance
The change in RSS in
relationship to distance flattens
out at greater distances
BRKEWN-2650
Angle-Based (Angulation) Techniques
ā€¢ The AoA locates the mobile station by
determining the angle of incidence at which
signals arrive at the receiving sensor
ā€¢ Requires two receiving sensors for location
estimation, with improved accuracy coming
from at least three or more receiving sensors
(triangulation)
23BRKEWN-2650
Location Patterning (Fingerprinting)
ā€¢ Location patterning is based on the sampling
and recording of radio signal behaviour
patterns in specific environments
ā€¢ Each potential device location ideally
possesses a distinctly unique RF "signatureā€
24
Because of fading and other phenomena, the observed signal
strength of a mobile device at a particular location is not static but
is seen to vary over time. As a result, calibration phase software
typically records many samples of signal strength for a mobile
device during the actual sampling process.
BRKEWN-2650

More Related Content

What's hot

cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01Sergiy Pitel
Ā 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksNTS UK - Part of Capita
Ā 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureMaliha Ali
Ā 
Isf 2015 continuous diagnostics monitoring may 2015
Isf 2015 continuous diagnostics monitoring  may 2015Isf 2015 continuous diagnostics monitoring  may 2015
Isf 2015 continuous diagnostics monitoring may 2015abhi75
Ā 
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_diveNur Shiqim Chok
Ā 
Secure Access Architecture
Secure Access ArchitectureSecure Access Architecture
Secure Access ArchitectureLan & Wan Solutions
Ā 
What You Cant See Can Hurt You
What You Cant See Can Hurt You What You Cant See Can Hurt You
What You Cant See Can Hurt You Castleforce
Ā 
Protect your guest wifi - NOW
Protect your guest wifi - NOWProtect your guest wifi - NOW
Protect your guest wifi - NOWJoshua Sibaja
Ā 
Cisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideCisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideMaticmind
Ā 
Cisco Meraki Product Launch Q1 2017
Cisco Meraki Product Launch Q1 2017Cisco Meraki Product Launch Q1 2017
Cisco Meraki Product Launch Q1 2017Maticmind
Ā 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
Ā 
Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Sean Xie
Ā 
S5068 Presentation Live
S5068 Presentation LiveS5068 Presentation Live
S5068 Presentation LiveInsight24
Ā 
Palo alto-review
Palo alto-reviewPalo alto-review
Palo alto-reviewRayan Darine
Ā 

What's hot (18)

cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
Ā 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager Networks
Ā 
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
Ā 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
Ā 
Isf 2015 continuous diagnostics monitoring may 2015
Isf 2015 continuous diagnostics monitoring  may 2015Isf 2015 continuous diagnostics monitoring  may 2015
Isf 2015 continuous diagnostics monitoring may 2015
Ā 
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
Ā 
Vpn rsvp
Vpn rsvpVpn rsvp
Vpn rsvp
Ā 
Secure Access Architecture
Secure Access ArchitectureSecure Access Architecture
Secure Access Architecture
Ā 
What You Cant See Can Hurt You
What You Cant See Can Hurt You What You Cant See Can Hurt You
What You Cant See Can Hurt You
Ā 
Protect your guest wifi - NOW
Protect your guest wifi - NOWProtect your guest wifi - NOW
Protect your guest wifi - NOW
Ā 
Cisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideCisco Meraki Portfolio Guide
Cisco Meraki Portfolio Guide
Ā 
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Ā 
Cisco Meraki Product Launch Q1 2017
Cisco Meraki Product Launch Q1 2017Cisco Meraki Product Launch Q1 2017
Cisco Meraki Product Launch Q1 2017
Ā 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
Ā 
Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019
Ā 
S5068 Presentation Live
S5068 Presentation LiveS5068 Presentation Live
S5068 Presentation Live
Ā 
Meraki Cloud Controller
Meraki Cloud ControllerMeraki Cloud Controller
Meraki Cloud Controller
Ā 
Palo alto-review
Palo alto-reviewPalo alto-review
Palo alto-review
Ā 

Similar to Cloud Managed Networking Benefits

Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bellCisco Canada
Ā 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki OverviewSSISG
Ā 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiRowell Dionicio
Ā 
Motorola Wing 5.6 specification sheet
Motorola  Wing 5.6 specification sheetMotorola  Wing 5.6 specification sheet
Motorola Wing 5.6 specification sheetAdvantec Distribution
Ā 
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXCustomer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXssuser5824cf
Ā 
Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & ComplianceAmazon Web Services
Ā 
AOS - Wireless Solutions
AOS - Wireless SolutionsAOS - Wireless Solutions
AOS - Wireless SolutionsNGINX at F5
Ā 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5Sen Nathan
Ā 
This is only a test preso using online contentpptx
This is only a test preso using online contentpptxThis is only a test preso using online contentpptx
This is only a test preso using online contentpptxjeffzeichick1
Ā 
Gigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX DeploymentsGigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX DeploymentsAngel Villar Garea
Ā 
Meru Presentation
Meru PresentationMeru Presentation
Meru Presentationmacmillant
Ā 
Zero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptxZero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptxkkhhusshi
Ā 
Aerohive BR100 Branch Router
Aerohive BR100 Branch RouterAerohive BR100 Branch Router
Aerohive BR100 Branch RouterAerohive Networks
Ā 
Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009MobileWorxs
Ā 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO
Ā 
Wireless World
Wireless World Wireless World
Wireless World bhattsipl
Ā 
E2 E Solution 4 Wind Park 1st Draft
E2 E Solution 4 Wind Park 1st DraftE2 E Solution 4 Wind Park 1st Draft
E2 E Solution 4 Wind Park 1st Draftenergyvijay
Ā 
Cisco dna for mobility introduction
Cisco dna for mobility introductionCisco dna for mobility introduction
Cisco dna for mobility introductionIT Tech
Ā 
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...BGA Cyber Security
Ā 

Similar to Cloud Managed Networking Benefits (20)

Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bell
Ā 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki Overview
Ā 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by Meraki
Ā 
Motorola Wing 5.6 specification sheet
Motorola  Wing 5.6 specification sheetMotorola  Wing 5.6 specification sheet
Motorola Wing 5.6 specification sheet
Ā 
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXCustomer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Ā 
Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & Compliance
Ā 
AOS - Wireless Solutions
AOS - Wireless SolutionsAOS - Wireless Solutions
AOS - Wireless Solutions
Ā 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5
Ā 
This is only a test preso using online contentpptx
This is only a test preso using online contentpptxThis is only a test preso using online contentpptx
This is only a test preso using online contentpptx
Ā 
Gigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX DeploymentsGigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX Deployments
Ā 
Meru Presentation
Meru PresentationMeru Presentation
Meru Presentation
Ā 
Zero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptxZero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptx
Ā 
Aerohive BR100 Branch Router
Aerohive BR100 Branch RouterAerohive BR100 Branch Router
Aerohive BR100 Branch Router
Ā 
Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009
Ā 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
Ā 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - Presentaciones
Ā 
Wireless World
Wireless World Wireless World
Wireless World
Ā 
E2 E Solution 4 Wind Park 1st Draft
E2 E Solution 4 Wind Park 1st DraftE2 E Solution 4 Wind Park 1st Draft
E2 E Solution 4 Wind Park 1st Draft
Ā 
Cisco dna for mobility introduction
Cisco dna for mobility introductionCisco dna for mobility introduction
Cisco dna for mobility introduction
Ā 
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
Ā 

More from Telematika Open Session

Learning netconf yang from scratch
Learning netconf yang from scratchLearning netconf yang from scratch
Learning netconf yang from scratchTelematika Open Session
Ā 
SDN Onboarding: Open vSwitch CLIs, OpenDaylight
SDN Onboarding: Open vSwitch CLIs, OpenDaylightSDN Onboarding: Open vSwitch CLIs, OpenDaylight
SDN Onboarding: Open vSwitch CLIs, OpenDaylightTelematika Open Session
Ā 
Learning OpenFlow with OVS on BPI R1 and Zodiac FX
Learning OpenFlow with OVS on BPI R1 and Zodiac FXLearning OpenFlow with OVS on BPI R1 and Zodiac FX
Learning OpenFlow with OVS on BPI R1 and Zodiac FXTelematika Open Session
Ā 
DevOps Introduction - Why Network Engineer Should Learn Programming
DevOps Introduction - Why Network Engineer Should Learn ProgrammingDevOps Introduction - Why Network Engineer Should Learn Programming
DevOps Introduction - Why Network Engineer Should Learn ProgrammingTelematika Open Session
Ā 
From network beginner to network programmer.v2
From network beginner to network programmer.v2From network beginner to network programmer.v2
From network beginner to network programmer.v2Telematika Open Session
Ā 
Paving your way to become a network engineer
Paving your way to become a network engineerPaving your way to become a network engineer
Paving your way to become a network engineerTelematika Open Session
Ā 

More from Telematika Open Session (9)

Learning netconf yang from scratch
Learning netconf yang from scratchLearning netconf yang from scratch
Learning netconf yang from scratch
Ā 
Netconf yang
Netconf yangNetconf yang
Netconf yang
Ā 
ceph software defined storage
ceph software defined storageceph software defined storage
ceph software defined storage
Ā 
SDN Onboarding: Open vSwitch CLIs, OpenDaylight
SDN Onboarding: Open vSwitch CLIs, OpenDaylightSDN Onboarding: Open vSwitch CLIs, OpenDaylight
SDN Onboarding: Open vSwitch CLIs, OpenDaylight
Ā 
Learning OpenFlow with OVS on BPI R1 and Zodiac FX
Learning OpenFlow with OVS on BPI R1 and Zodiac FXLearning OpenFlow with OVS on BPI R1 and Zodiac FX
Learning OpenFlow with OVS on BPI R1 and Zodiac FX
Ā 
Network security
Network securityNetwork security
Network security
Ā 
DevOps Introduction - Why Network Engineer Should Learn Programming
DevOps Introduction - Why Network Engineer Should Learn ProgrammingDevOps Introduction - Why Network Engineer Should Learn Programming
DevOps Introduction - Why Network Engineer Should Learn Programming
Ā 
From network beginner to network programmer.v2
From network beginner to network programmer.v2From network beginner to network programmer.v2
From network beginner to network programmer.v2
Ā 
Paving your way to become a network engineer
Paving your way to become a network engineerPaving your way to become a network engineer
Paving your way to become a network engineer
Ā 

Recently uploaded

(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
Ā 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
Ā 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
Ā 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
Ā 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
Ā 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
Ā 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
Ā 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
Ā 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
Ā 
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”soniya singh
Ā 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
Ā 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
Ā 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
Ā 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
Ā 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
Ā 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
Ā 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
Ā 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
Ā 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
Ā 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
Ā 

Recently uploaded (20)

(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Ā 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Ā 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Ā 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
Ā 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
Ā 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Ā 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Ā 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Ā 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Ā 
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Ā 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Ā 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
Ā 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Ā 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
Ā 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
Ā 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
Ā 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
Ā 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
Ā 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Ā 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
Ā 

Cloud Managed Networking Benefits

  • 2. Why Cloud Managed Networking? 2
  • 3. An integrated solution for new IT challenges 3 Billions of mobile devices A complete solution out-of-the-box: No extra hardware, software, or complexity HD video and rich media New business opportunities Integrated mobility management Layer 7 application shaping Analytics and user engagement
  • 4. The cloud increases IT efficiency 4 Manageability Scalability Cost Savings Turnkey installation and management Secure out-of-bound managementā€”no user traffic flows through the cloud Scales from small branches to large networks Reliable: the network stays up, even if connection to the cloud is lost Reduces operational costs Integrated, always up-to- date features
  • 5. Bringing the cloud to enterprise IT 5 MR Wireless LAN Systems Manager Mobility Management MS Ethernet Switches MX Security Appliances MC Communications MV Security Cameras
  • 6. 6Ā© 2015 Cisco and/or its affiliates. All rights reserved. Meraki Overview 6
  • 7. Simplifying across IT with cloud management 7 A complete cloud managed networking solution Wireless, switching, security, communications, EMM, and security cameras Integrated hardware, software, and cloud services Leader in cloud-managed networking Among Ciscoā€™s fastest growing portfolios Over 140,000 unique customers Over 2 million Meraki network devices online Trusted by thousands of customers worldwide:
  • 8. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 80,000 active Orgs 260,000 Networks 870,000 Nodes ā€¦ 200M page views per day ā€¦ 1.5B clients detected ā€¦ 740M connected
  • 10. SaaS feature delivery, quarterly updates 10 User/device fingerprinting Application firewall Content filtering Network access control Location Analytics Mobile application deployment
  • 12. Distributed networks 12 Centralized cloud management scales to thousands of sites Multi-site visibility and control Map-based dashboard; configuration sync; remote diagnostics; automatic monitoring and alerts Zero-touch provisioning Devices easily provisioned from the cloud, no staging required Traffic acceleration Web caching reduces bandwidth usage; application-aware QoS and SD-WAN capabilities prioritize business critical apps
  • 13. High capacity edge networks 13 RF optimization and application-aware QoS for high-throughput, high density WLAN Layer 7 application and traffic shaping Throttle, block, or prioritize application traffic with DPI-based fingerprinting; set user and group-based traffic shaping rules Cloud-based RF optimization Dynamically avoid interference, optimizing channel selection and power levels Density-optimized WLAN RF platform tuned for airtime fairness and performance in dense performance-critical environments
  • 14. Mobility management 14 Security, management, and capacity for BYOD-ready deployments right out of the box Device-aware security Device-aware firewall and access control; antivirus scan; LAN isolation; Bonjour Gateway; content and security filtering Integrated EMM Enforce encryption, passcodes, and device restrictions; deploy enterprise applications; remotely lock or wipe devices Simplified onboarding Flexible authentication with Active Directory integration, SMS authentication, hosted splash pages, and automatic EMM enrollment
  • 15. User analytics and engagement 15 Built-in location analytics dashboard Optimize marketing and business operations Analyze capture rate, dwell time, and new/repeat visitors to measure the impact of advertising, promotions, site utilization, etc. Built-in location analytics Integrated in the WLAN; no extra sensors, appliances, or software Extensible API Integrate location data with CRM, loyalty programs, and custom applications for targeted real-time offers
  • 16. Flexible authentication and access control 16 Flexible built-in authentication mechanism Flexible authentication Secure 802.1x and Active Directory authentication; Facebook Authentication for branding and targeted social marketing; SMS self-service authentication; and hosted sign-on splash pages Dynamic access control Assign clients layer 3 / 7 firewall rules, VLANs, and application-aware quality of service by identity, group, location, or device type
  • 17. Simplified enterprise security 17 Enterprise-class security features for security- conscious environments Air Marshal WIDS/WIPS Detect wireless attacks; contain rogue APs; cloud-based alerting and diagnostics User and device aware security User, device, and group-based firewall rules (layer 3 / 7) with Active Directory integration UTM and content security Application firewall; content filtering matching 1B+ URLs; antivirus/anti-malware filtering; Google safe-search
  • 19. Ā© 2010 Cisco and/or its affiliates. All rights reserved. 19 Detect Engage Drive 19 Cisco Cloud Networking Presence Shopper Presence (associated or non-associated) Deep Analytics & Engagement ā€¢ Targeted Offers ā€¢ CRM Correlation ā€¢ Location Services ā€¢ Omni-channel Selling ā€¢ Online Cannibalization Cisco Cloud Networking: Out of Box Analytics Engage Shoppers
  • 20. Location Tracking Approaches ā€¢ Real-time location tracking and positioning systems can be classified by the measurement techniques they employ to determine mobile device location ā€¢ Approaches differ in terms of the specific technique used to sense and measure the position of the mobile device in the target environment ā€¢ Real-Time Location Systems (RTLS) can be grouped into four basic categories of systems that determine position on the basis of the following: 20 Cell of origin (nearest cell) Distance based (lateration) Angle based (Angulation) Location patterning BRKEWN-2650
  • 21. Cell of Origin ā€¢ One of the simplest mechanisms of estimating approximate location in any system based on RF cells is the concept of ā€˜cell of originā€™ (or ā€˜associated access pointā€™ in Wi-Fi 802.11 systems) ā€¢ When receiving cells, provide received signal strength indication (RSSI) for mobile devices; the use of the highest signal strength technique can improve location granularity over the cell of origin. 21BRKEWN-2650
  • 22. Distance-Based (Trilateration) Techniques ā€¢ Trilateration can be performed by using received signal strength (RSS) ā€¢ Measured by either the mobile device or the receiving sensor 22 10dB The closer the distance the greater the rate of change in RSS in relationship to distance The change in RSS in relationship to distance flattens out at greater distances BRKEWN-2650
  • 23. Angle-Based (Angulation) Techniques ā€¢ The AoA locates the mobile station by determining the angle of incidence at which signals arrive at the receiving sensor ā€¢ Requires two receiving sensors for location estimation, with improved accuracy coming from at least three or more receiving sensors (triangulation) 23BRKEWN-2650
  • 24. Location Patterning (Fingerprinting) ā€¢ Location patterning is based on the sampling and recording of radio signal behaviour patterns in specific environments ā€¢ Each potential device location ideally possesses a distinctly unique RF "signatureā€ 24 Because of fading and other phenomena, the observed signal strength of a mobile device at a particular location is not static but is seen to vary over time. As a result, calibration phase software typically records many samples of signal strength for a mobile device during the actual sampling process. BRKEWN-2650