SlideShare a Scribd company logo
1 of 31
Vunene Mathebula
Regional IT Coordinator
South and East Africa
Meraki - PATH Case Study
o Plug and play wireless access points, switches and Security appliances:
MX 100
MX220: 24/48
MR32
ISP
Here are the features allows in the network :
• Unified event monitoring for all devices
• Centralized alerts and administration
• Centralized reporting of clients on the network
• Network-wide configuration
 Optimized for both construction sites and office locations.
 Single window of glass visibility and control over WLAN, LAN,
Security, Guest WIFI and Mobile devices.
 Cost-effective Internet connection, reliable and very easy to manage.
 In-built cloud-based management dashboard, very easy to use
and can be deployed in minutes without training or not-site staff.
 Site-to-Site secure connections between distributed construction
sites
Meraki MX100:
Centralized cloud management for security, networking,
and application control
Switch optimized: A: MS220
Capacity: 128Gbps(24-port models), 175Gbps(48-port models)
 It’s 802.3 PoE
 Ports can be configured and monitored instantly, over the web
MX32: Access Point
 Easy to configure, plug-and-play deployment
 It can be secured (configured on the dashboard)
Dashboard comprised of the following:
Network-wide
This is the place to perform configuration and
reporting for all the devices in the entire network
Security Appliance
Switch
Wireless
Organization
Can able to see a list of all networks within an organization
Help
Summary Report
Firewall rules
• Content filtering
• Prioritization
• Client control
Meraki - PATH Case Study
Seydou Belemvire
Systems Engineer
June 6th 2017
PATH/Eric Becker
A few years ago …
• Configuration (VPN etc …)
• Network monitoring and Alerting
• Bandwidth
• Traffic Shaping
• Mobile Device Management
• Threats Analysis and reporting
• Connectivity
GLOBAL NETWORK STATUS
Global VPN Status (Mesh topology)
1 Click VPN configuration
LOCATION HEATMAP
Location Analytics
SECURITY CENTER
Load Balancing
Mobile Device Management
MDM - Phones
MDM - Laptop
Geofencing
EXCELLENT CUSTOMER SERVICE
THANK YOU

More Related Content

What's hot

Dmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a TelecomDmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a Telecom
Positive Hack Days
 
STATE OF ALABAMA Information Technology Guideline
STATE OF ALABAMA Information Technology GuidelineSTATE OF ALABAMA Information Technology Guideline
STATE OF ALABAMA Information Technology Guideline
Videoguy
 

What's hot (20)

Genian NAC Overview
Genian NAC Overview Genian NAC Overview
Genian NAC Overview
 
SICAM Disto substation automation
SICAM Disto substation automationSICAM Disto substation automation
SICAM Disto substation automation
 
Small Control Center System SICAM 230
Small Control Center System SICAM 230Small Control Center System SICAM 230
Small Control Center System SICAM 230
 
What we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecWhat we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 Infosec
 
Classification cyber security threats of modern substation
Classification cyber security threats of modern substationClassification cyber security threats of modern substation
Classification cyber security threats of modern substation
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor Presentation
 
Management F
Management FManagement F
Management F
 
Dmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a TelecomDmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a Telecom
 
Building Information Modelling (BIM) and Integrated buliding management syste...
Building Information Modelling (BIM) and Integrated buliding management syste...Building Information Modelling (BIM) and Integrated buliding management syste...
Building Information Modelling (BIM) and Integrated buliding management syste...
 
Powerful email protection
Powerful email protectionPowerful email protection
Powerful email protection
 
Identify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilitiesIdentify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilities
 
Ntcip Device Tester
Ntcip Device TesterNtcip Device Tester
Ntcip Device Tester
 
Virtual Firewall Management
Virtual Firewall ManagementVirtual Firewall Management
Virtual Firewall Management
 
Protection Service for Business
Protection Service for BusinessProtection Service for Business
Protection Service for Business
 
STATE OF ALABAMA Information Technology Guideline
STATE OF ALABAMA Information Technology GuidelineSTATE OF ALABAMA Information Technology Guideline
STATE OF ALABAMA Information Technology Guideline
 
Solution note-cryptoflow-lan
Solution note-cryptoflow-lanSolution note-cryptoflow-lan
Solution note-cryptoflow-lan
 
Taking a closer look at level 0 and level 1 security
Taking a closer look at level 0 and level 1 securityTaking a closer look at level 0 and level 1 security
Taking a closer look at level 0 and level 1 security
 
DEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellamDEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellam
 
ManageEngine Firewall Analyzer training
ManageEngine Firewall Analyzer trainingManageEngine Firewall Analyzer training
ManageEngine Firewall Analyzer training
 
운영체제론 Ch19
운영체제론 Ch19운영체제론 Ch19
운영체제론 Ch19
 

Similar to Meraki - Case Study, PATH International

2. Explain the use of cloud management for centralized control of a .pdf
2. Explain the use of cloud management for centralized control of a .pdf2. Explain the use of cloud management for centralized control of a .pdf
2. Explain the use of cloud management for centralized control of a .pdf
sales96
 
cloudblanket_nms_ds_revb
cloudblanket_nms_ds_revbcloudblanket_nms_ds_revb
cloudblanket_nms_ds_revb
Ori Guez
 
CloudRuckus ZoneManager-Datasheet-v3.4
CloudRuckus ZoneManager-Datasheet-v3.4CloudRuckus ZoneManager-Datasheet-v3.4
CloudRuckus ZoneManager-Datasheet-v3.4
Mark Julier
 
Cisco Meraki.pptx
Cisco Meraki.pptxCisco Meraki.pptx
Cisco Meraki.pptx
AslinBaro
 
Meraki 2012 Corporate Brochure
Meraki 2012 Corporate BrochureMeraki 2012 Corporate Brochure
Meraki 2012 Corporate Brochure
guillaumepays
 

Similar to Meraki - Case Study, PATH International (20)

Cisco Connect Halifax 2018 Cisco Meraki -let simple work for you
Cisco Connect Halifax 2018   Cisco Meraki -let simple work for youCisco Connect Halifax 2018   Cisco Meraki -let simple work for you
Cisco Connect Halifax 2018 Cisco Meraki -let simple work for you
 
2. Explain the use of cloud management for centralized control of a .pdf
2. Explain the use of cloud management for centralized control of a .pdf2. Explain the use of cloud management for centralized control of a .pdf
2. Explain the use of cloud management for centralized control of a .pdf
 
Exhibitor session: Cisco Meraki
Exhibitor session: Cisco MerakiExhibitor session: Cisco Meraki
Exhibitor session: Cisco Meraki
 
cloudblanket_nms_ds_revb
cloudblanket_nms_ds_revbcloudblanket_nms_ds_revb
cloudblanket_nms_ds_revb
 
CloudRuckus ZoneManager-Datasheet-v3.4
CloudRuckus ZoneManager-Datasheet-v3.4CloudRuckus ZoneManager-Datasheet-v3.4
CloudRuckus ZoneManager-Datasheet-v3.4
 
MR-family-datasheet-english.pdf
MR-family-datasheet-english.pdfMR-family-datasheet-english.pdf
MR-family-datasheet-english.pdf
 
Cisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideCisco Meraki Portfolio Guide
Cisco Meraki Portfolio Guide
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bell
 
Meraki Cloud Controller
Meraki Cloud ControllerMeraki Cloud Controller
Meraki Cloud Controller
 
Token Ring Hubs from Madge Networks
Token Ring Hubs from Madge NetworksToken Ring Hubs from Madge Networks
Token Ring Hubs from Madge Networks
 
Cisco Meraki.pptx
Cisco Meraki.pptxCisco Meraki.pptx
Cisco Meraki.pptx
 
M2M-Brochure (3)
M2M-Brochure (3)M2M-Brochure (3)
M2M-Brochure (3)
 
Datasheet EnGenius EWS5912FP
Datasheet EnGenius EWS5912FPDatasheet EnGenius EWS5912FP
Datasheet EnGenius EWS5912FP
 
How IoT transforms the market for Building Automation in support of sustainab...
How IoT transforms the market for Building Automation in support of sustainab...How IoT transforms the market for Building Automation in support of sustainab...
How IoT transforms the market for Building Automation in support of sustainab...
 
Meraki 2012 Corporate Brochure
Meraki 2012 Corporate BrochureMeraki 2012 Corporate Brochure
Meraki 2012 Corporate Brochure
 
This is only a test preso using online contentpptx
This is only a test preso using online contentpptxThis is only a test preso using online contentpptx
This is only a test preso using online contentpptx
 
Meraki Overview
Meraki OverviewMeraki Overview
Meraki Overview
 
Strix nms
Strix nmsStrix nms
Strix nms
 
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
 
Industrial Wireless Networking Solutions
Industrial Wireless Networking SolutionsIndustrial Wireless Networking Solutions
Industrial Wireless Networking Solutions
 

More from nicholas njoroge

More from nicholas njoroge (15)

Sustainable Connectivity after the Emergency Response Phase
Sustainable Connectivity after the Emergency Response PhaseSustainable Connectivity after the Emergency Response Phase
Sustainable Connectivity after the Emergency Response Phase
 
Humanitarian ICT Road-Map and Standardisation
Humanitarian ICT Road-Map and StandardisationHumanitarian ICT Road-Map and Standardisation
Humanitarian ICT Road-Map and Standardisation
 
Business Relationship Management in IRC
Business Relationship Management in IRCBusiness Relationship Management in IRC
Business Relationship Management in IRC
 
Best practices for data centers
Best practices for data centersBest practices for data centers
Best practices for data centers
 
Best practices in networks and infrastructure
Best practices in networks and infrastructureBest practices in networks and infrastructure
Best practices in networks and infrastructure
 
Women and ICT - UNOCHA (ROSEA)
Women and ICT - UNOCHA (ROSEA)Women and ICT - UNOCHA (ROSEA)
Women and ICT - UNOCHA (ROSEA)
 
Meraki - Case Study, PATH International - Part 2
Meraki - Case Study, PATH International - Part 2Meraki - Case Study, PATH International - Part 2
Meraki - Case Study, PATH International - Part 2
 
ICT for Development (ICT4D) in Plan International
ICT for Development (ICT4D) in Plan InternationalICT for Development (ICT4D) in Plan International
ICT for Development (ICT4D) in Plan International
 
ICT4D in Catholic Relief Services (CRS)
ICT4D in Catholic Relief Services (CRS)  ICT4D in Catholic Relief Services (CRS)
ICT4D in Catholic Relief Services (CRS)
 
Fortinet Network Security Appliance - Case Study, CARE USA
Fortinet Network Security Appliance - Case Study, CARE USAFortinet Network Security Appliance - Case Study, CARE USA
Fortinet Network Security Appliance - Case Study, CARE USA
 
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case Study
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case StudyCisco Standard Network Platform (SNP) - Catholic Relief Services Case Study
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case Study
 
ICT in Emergencies - Nethope
ICT in Emergencies - Nethope ICT in Emergencies - Nethope
ICT in Emergencies - Nethope
 
Cloud adoption strategies for non profits - DAI
Cloud adoption strategies for non profits - DAICloud adoption strategies for non profits - DAI
Cloud adoption strategies for non profits - DAI
 
Business Relations and Engage - Save the Children
Business Relations and Engage - Save the ChildrenBusiness Relations and Engage - Save the Children
Business Relations and Engage - Save the Children
 
IT Strategy and Governance - SOS Children's Villages
IT Strategy and Governance - SOS Children's VillagesIT Strategy and Governance - SOS Children's Villages
IT Strategy and Governance - SOS Children's Villages
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Meraki - Case Study, PATH International