Cisco Meraki provides a complete cloud-managed networking solution including wireless, switching, security, communications, endpoint management, and security cameras. With over 140,000 customers and 2 million devices online, Meraki simplifies IT using an integrated hardware, software, and cloud services approach. The solution is managed through a centralized cloud-based dashboard that provides turnkey installation, management, security, and scalability benefits.
An introduction to Meraki as a company and a technology. Meraki have just been awarded visionary status is Gartners 2011 magic quadrant for Wireless LAN and have recently announced the MX range of Cloud-Managed Routers, Meraki, Making Branch Networking Easy.
Cassie Vorster delivered a presentation on Extending Security to Every Edge at the Fortinet Breakfast that took place on the 17th of March 2023, at the Hilton Sandton.
An introduction to Meraki as a company and a technology. Meraki have just been awarded visionary status is Gartners 2011 magic quadrant for Wireless LAN and have recently announced the MX range of Cloud-Managed Routers, Meraki, Making Branch Networking Easy.
Cassie Vorster delivered a presentation on Extending Security to Every Edge at the Fortinet Breakfast that took place on the 17th of March 2023, at the Hilton Sandton.
Adapt and change today to the best technology to ease network manageability
call me on 9986013341 to know more or share your feedback with me at haffiz@proactive.co.in
TechWiseTV Workshop: Cisco Stealthwatch and ISERobb Boyd
Replay the live event: http://cs.co/90008z2Ar
Learn how your existing Cisco network can help you to know exactly who is doing what on the network with end-to-end visibility, differentiate anomalies from normal behavior with contextual threat intelligence and stop threats and mitigate risk with one-click containment of users and devices.
It’s time for the network to protect itself. Please make time for this important workshop.
Resources:
Watch the Cisco Stealthwatch and ISE full episode: http://cs.co/90008z24M
Network as a Sensor-Enforcer on CCO:
http://www.cisco.com/c/en/us/solutions/enterprise-networks/enterprise-network-security/net-sensor.html
Cisco ISE Community
http://cs.co/ise-community
SD-WAN is a new and exciting opportunity to transform enterprises costly and rigid MPLS-based wide area networks (WAN). It promises to make the WAN more affordable and agile, boost capacity, and improve resiliency. But, SD-WAN goes far beyond replacing MPLS. It can optimize global connectivity, streamline network security, and seamlessly integrate cloud resources and mobile users into simple coherent network.
SD WAN VS MPLS – Which is better for your Business?Phani Kumar
Multiprotocol Label Switching (MPLS) has long been the standard for wide area network before SD-WAN came along. While most professionals consider SD-WAN to be the latest and more effective in enterprise networking problems, the benefits of MPLS technology cannot be ignored. Choosing between these two will depend on your company’s priorities. This guide will explore the two technologies to help you choose the best for your business.
SD WAN Overview | What is SD WAN | Benefits of SD WAN Ashutosh Kaushik
Small Brief on Next Generation SD-WAN
Dynamic business landscape and uncompromised demands of applications and users have driven dramatic transformation in IT Networking after many years of relative stability. Frequent changes in technologies are shifting networking from static Infrastructure to more agile, secured, future ready and hybrid-cloud infrastructure. This created un-precedented network management complexities that has become a growing concern for the enterprise.
Early Generation of SD-WAN providers were primarily focused on cost reduction via replacing MPLS with low-cost broadband.
Infinxt Next Generation SD-WAN handles data and network security with in-built NGFW, SLA based Application Performance Enhancement, Traffic Shaping, Multi/ Hybrid Cloud App aware routing, in addition to the traditional SD-WAN features
Infinxt Product Variants
1. Infinxt – Next Generation SD-WAN
Infinxt provides you with the best of the SD-WAN features that can address any of your WAN challenges. The device itself being a Zone based firewall, provides application visibility and control. The decoupled Data Plane and Control plane provides you with the needed flexibility and efficiency in addressing Day 0, Day 1 and Day 2 challenges.
The solution is industry and business agnostic whereby it would be able to meet any type of WAN requirements. The offering being indigenously made would be able to address unique requirements for niche industries too through customization
Features
2. Infinxt - Next Generation Firewall Powered by Palo Alto Networks
Legacy firewall security solutions react to new threats. Intelligent network security stays ahead of attackers and increases business agility. Infinxt SD-WAN comes with a pre-hosted Palo Alto Networks VM in the Infinxt iEdge devices. This offering is a boon for customers to convert their branches into next generation secured branches with the NGFW security capability of Palo Alto Networks.
3. Infinxt - Next Generation Secure SD-WAN Powered by Palo Alto Networks
The Secure Next Generation SD-WAN offering from Infinity Labs provides its customers with the best of both Network connectivity and Application security. It’s a unique combination where both the VMs are service chained to leverage their proficiency to provide a secured application experience to the users. Along with SD-WAN features it also gives NGFW features Powered by Palo Alto Networks.
Infinxt SD-WAN Console gives a Single UI for both SD-WAN and NGFW for ease of Network Operation and Management.
This feature gives the enterprises a unique proposition to have Palo Alto NGFW on tried and tested Infinxt Edge Device.
Palo Alto Networks Advantages
Meraki vs. Viptela: Which Cisco SD-WAN Solution Is Right for You?Insight
More organizations are making the shift to Software-Defined Wide Area Networks (SD-WANs), but it can be difficult to decide which solutions are best suited to your business. In this infographic, explore two of the most well-established and widely deployed enterprise-grade Cisco SD-WAN solutions: Meraki MX and Viptela.
Adapt and change today to the best technology to ease network manageability
call me on 9986013341 to know more or share your feedback with me at haffiz@proactive.co.in
TechWiseTV Workshop: Cisco Stealthwatch and ISERobb Boyd
Replay the live event: http://cs.co/90008z2Ar
Learn how your existing Cisco network can help you to know exactly who is doing what on the network with end-to-end visibility, differentiate anomalies from normal behavior with contextual threat intelligence and stop threats and mitigate risk with one-click containment of users and devices.
It’s time for the network to protect itself. Please make time for this important workshop.
Resources:
Watch the Cisco Stealthwatch and ISE full episode: http://cs.co/90008z24M
Network as a Sensor-Enforcer on CCO:
http://www.cisco.com/c/en/us/solutions/enterprise-networks/enterprise-network-security/net-sensor.html
Cisco ISE Community
http://cs.co/ise-community
SD-WAN is a new and exciting opportunity to transform enterprises costly and rigid MPLS-based wide area networks (WAN). It promises to make the WAN more affordable and agile, boost capacity, and improve resiliency. But, SD-WAN goes far beyond replacing MPLS. It can optimize global connectivity, streamline network security, and seamlessly integrate cloud resources and mobile users into simple coherent network.
SD WAN VS MPLS – Which is better for your Business?Phani Kumar
Multiprotocol Label Switching (MPLS) has long been the standard for wide area network before SD-WAN came along. While most professionals consider SD-WAN to be the latest and more effective in enterprise networking problems, the benefits of MPLS technology cannot be ignored. Choosing between these two will depend on your company’s priorities. This guide will explore the two technologies to help you choose the best for your business.
SD WAN Overview | What is SD WAN | Benefits of SD WAN Ashutosh Kaushik
Small Brief on Next Generation SD-WAN
Dynamic business landscape and uncompromised demands of applications and users have driven dramatic transformation in IT Networking after many years of relative stability. Frequent changes in technologies are shifting networking from static Infrastructure to more agile, secured, future ready and hybrid-cloud infrastructure. This created un-precedented network management complexities that has become a growing concern for the enterprise.
Early Generation of SD-WAN providers were primarily focused on cost reduction via replacing MPLS with low-cost broadband.
Infinxt Next Generation SD-WAN handles data and network security with in-built NGFW, SLA based Application Performance Enhancement, Traffic Shaping, Multi/ Hybrid Cloud App aware routing, in addition to the traditional SD-WAN features
Infinxt Product Variants
1. Infinxt – Next Generation SD-WAN
Infinxt provides you with the best of the SD-WAN features that can address any of your WAN challenges. The device itself being a Zone based firewall, provides application visibility and control. The decoupled Data Plane and Control plane provides you with the needed flexibility and efficiency in addressing Day 0, Day 1 and Day 2 challenges.
The solution is industry and business agnostic whereby it would be able to meet any type of WAN requirements. The offering being indigenously made would be able to address unique requirements for niche industries too through customization
Features
2. Infinxt - Next Generation Firewall Powered by Palo Alto Networks
Legacy firewall security solutions react to new threats. Intelligent network security stays ahead of attackers and increases business agility. Infinxt SD-WAN comes with a pre-hosted Palo Alto Networks VM in the Infinxt iEdge devices. This offering is a boon for customers to convert their branches into next generation secured branches with the NGFW security capability of Palo Alto Networks.
3. Infinxt - Next Generation Secure SD-WAN Powered by Palo Alto Networks
The Secure Next Generation SD-WAN offering from Infinity Labs provides its customers with the best of both Network connectivity and Application security. It’s a unique combination where both the VMs are service chained to leverage their proficiency to provide a secured application experience to the users. Along with SD-WAN features it also gives NGFW features Powered by Palo Alto Networks.
Infinxt SD-WAN Console gives a Single UI for both SD-WAN and NGFW for ease of Network Operation and Management.
This feature gives the enterprises a unique proposition to have Palo Alto NGFW on tried and tested Infinxt Edge Device.
Palo Alto Networks Advantages
Meraki vs. Viptela: Which Cisco SD-WAN Solution Is Right for You?Insight
More organizations are making the shift to Software-Defined Wide Area Networks (SD-WANs), but it can be difficult to decide which solutions are best suited to your business. In this infographic, explore two of the most well-established and widely deployed enterprise-grade Cisco SD-WAN solutions: Meraki MX and Viptela.
Digital transformation is reshaping the business landscape faster than any time in history. Organizations that adopt a digital strategy will leapfrog the competition, while those that do not will risk becoming irrelevant within five years. One important step in becoming a digital enterprise is becoming an agile organization—that is, having the ability to take advantage of market opportunities faster than the competition. This shift has become a top initiative for IT and business leaders. Pepe will discuss how to build an agile IT infrastructure to be ready for it.
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...Cohesive Networks
Defense in depth: practical steps to securing your data and achieving compliance
Presented by Chris Purrington, the VP Sales Europe at Cohesive Networks
Perimeter-based security approaches have not evolved to meet the modern application-focused enterprise. The weaknesses of the perimeter-based approach are on display in the east/west attacks on Sony, Target, and Home Depot exploits where hackers gained access to the perimeter, then ransacked the internal networks with minimal resistance. What can modern enterprises do? A “defense in depth” approach to security at the network layer. Enterprises must strengthen existing core networking hardware and virtualization layer security with added application security. In data centres, physical network isolation is not practical, and logical segmentation can be very difficult without using evolved networking approaches. As data centers became wholly virtualized and blur the line between data center and private cloud, we can finally add and control logical segmentation at the virtualization layer. This “Application Segmentation” provides the most comprehensive security model available today. You can apply application segmentation defense in depth using Cohesive Networks’ VNS3:turret. VNS3:turret creates a cryptographically unique micro-perimeter around each application topology. This presentation will examine how an defense in depth at the application layer can stop the next Sony attack.
The value proposition of enabling IP data networks with intelligent unified solutions. ICC Networking as the best software-driven solution to drive down the cost of connectivity while increasing network elasticity and performance.
Cisco Umbrella is the easiest and fastest cloud security platform for provisioning secure and compliant guest Wi-Fi. Our
solution’s simplicity and performance is the reason Fortune 50 retailers, top universities, and some of the largest hospitals in
the US trust Umbrella to protect their Wi-Fi.
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...Amazon Web Services
A hybrid Architecture is one of the easiest ways to securely address new application requirements and cloud-first development initiatives. This approach allows you to start small and expand as your requirements change while maintaining a strong security posture. In this session, you will learn the 5 key steps to building a hybrid architecture using the VM-Series next-generation firewall.
Speaker: Bisham Kishnani, Consulting Engineer (APJC) – DataCenter & Virtualization, Palo Alto Networks
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
2. Simplifying across IT with cloud management
2
A complete cloud managed networking solution
Wireless, switching, security, communications, EMM,
and security cameras
Integrated hardware, software, and cloud services
Leader in cloud-managed networking
Among Cisco’s fastest growing portfolios
Over 140,000 unique customers
Over 2 million Meraki network devices online
Trusted by hundreds of customers across Canada:
3. Technology that simply works
Technology can connect us, empower us, and drive us. At Meraki we believe
by simplifying powerful technology we can free passionate people to focus on
their mission and reach groups previously left in the darkness.
12. An integrated solution for new IT challenges
12
Billions of
mobile devices
A complete solution out-of-the-box:
No extra hardware, software, or complexity
HD video and rich
media
New business
opportunities
Integrated mobility
management
Layer 7
application shaping
Analytics and user
engagement
13. The cloud increases IT efficiency
13
Manageability Scalability Cost Savings
Turnkey installation and
management
Secure out-of-bound
management—no user
traffic flows through the
cloud
Scales from small
branches to large networks
Reliable: the network stays
up, even if connection to
the cloud is lost
Reduces operational
costs
Integrated, always up-to-
date features
16. Trends @ the Branch and WAN
Source: Gartner: How to Cost-Justify WAN Optimization
Branch
Office
Remote
Experts
Guest Wi-Fi
Cloud/SaaS
Apps
Thin Client
Apps
Mobility
HD Video/
Training
IoT
Digital
Displays
Omni-channel
Experience
*Tech Target, Branch Office Growth Demands New Devices, 2013 | **US The Census Bureau of the Department
of Commerce, 2015
80%
30%
20-50%
More
Users
More
Apps
More Risk
Of employees and
customers are served in branch
offices*
Increase in Enterprise
bandwidth per year
through 2018**
Of advanced threats will
target branch offices by 2016
(up from 5%) **
73%More
Devices Growth in in mobile devices
from 2014 - 2018**
17. Intro to Meraki SD-WAN
OpEx savings:
• Use low-cost Internet
• Maintain MPLS-like reliability
Improved bandwidth:
•“Internet as WAN” offers cheaper bandwidth
•Application control
•Uplinks intelligently assigned
Ease of deployment, ease of use:
• Deep visibility and control
• Highly scalable architecture
• Secure connectivity
Apps
Internet
Branch edge
• Increasing WAN costs over MPLS
• Bandwidth congestion
• Complexity
• 17
The value of a software defined WAN
18. Save money Improve reliability
Internet
Auto VPN
Data Center
Internet Internet
Auto VPN Auto VPN
Data Center
Increase bandwidth
Internet MPLS
Auto VPN Auto VPN
Data Center
Branch Branch Branch
MX 400 MX 400
Internet
Auto VPN
19. Intro to Meraki SD-WAN
OpEx savings:
• Use low-cost Internet
• Maintain MPLS-like reliability
Improved bandwidth:
•“Internet as WAN” offers cheaper bandwidth
•Application control
•Uplinks intelligently assigned
Ease of deployment, ease of use:
• Deep visibility and control
• Highly scalable architecture
• Secure connectivity
Apps
Internet
Branch edge
• Increasing WAN costs over MPLS
• Bandwidth congestion
• Complexity
• 19
Meraki SDWAN Customers
24. The MV Product Philosophy
The goal: apply Meraki’s expertise in cloud, distributed computational
systems, and UX design to video surveillance.
Meraki MV
Solving problems, not building features
25. Meraki MV
Additional on-premise hardware
Ex. Network Video Recorder (NVR)
DVDs, thumb drives, VHS, and
other outdated sharing options
Standalone software packages,
drivers, plug-ins, and IP
configuration
WITH MV, SAY GOODBYE TO
Current Video Surveillance Solutions
26. Meraki MV
Optimized Video Retention
Scheduled Recording
Motion-Based Retention
72 hours of continuous, 24/7 recording
After that, intelligent trimming of footage that contains no motion
Retention based on each individual camera’s usage, with real-time estimates
provided
Schedule templates for groups of cameras
Flexible privacy: limit cameras to live footage only, with no recording
28. MX250 & MX450,
Z3 & vMX for Azure
Cisco Security Connector,
Apple TV, and Do Not Disturb
September 2017
PoE and 802.11ac Wave 2 for
teleworkers
Flexible interface and virtual
options
High Throughput
New compact options and price
points
Static routing capabilities
1G with and without stacking
November 2017
MS120 & MS210
October 2017
Cisco Security Connector for
iOS
Support for Apple TV
3 Do Not Disturb for mission
critical devices
More Power, More Choice, More Protection
30. More Power, More Choice, More Protection
Control rollouts for App
Updates and Kiosk Mode
Pause updates for
Mission critical endpoints
Do Not Disturb
September 2017
Provision WiFi
Out-of-the-box enrollment
Manage Apple TV
Fall 2017
Apple TV SupportCisco Security
Connector
Expected Fall 2017
Insight into activity during incidents
Privacy with encrypted DNS
Protection from malicious sites
31. Next phase of the Apple Cisco partnership
• New app that can be deployed on supervised iOS devices
• Enable multiple Cisco security entitlements in a single app
• Expected in the fall of 2017
• Beta available now: http://cs.co/security-connector-beta
32. The only all Cisco solution for..
Network & unified endpoint management
Mobile & endpoint security management
Mobile device management & collaboration
& Cisco Security Connector
33. Use cases
Visibility Control Privacy
•Gain insight into activity on iOS
devices during incident
investigations
•Build audit reports of user,
device, and app traffic
•Quickly identify the impact and
degree of risk exposure
• Protect users from connecting to
malicious destinations
• Defend against phishing attacks and
accidental browsing of bad sites
• Coverage on corporate networks,
public Wi-Fi, and cellular networks
• Ensure DNS requests are encrypted
on public Wi-Fi networks
• Protect requests from being
intercepted and scanned
• Prevent communications from being
intercepted and redirected
34. Basic Requirements
ü Supervised iOS device
ü Subscription to Cisco Meraki Systems Manager
(licensed per device)
ü Subscription to Cisco Umbrella (licensed per
number of internet-connected users)
ü Subscription to Cisco Clarity (AMP for Endpoints –
licensed per device)
Enable Clarity and Umbrella on iOS
devices
Ensure devices are under management
and actively share device information
with Clarity and Umbrella
Share device posture with Clarity and
Umbrella
Licensed per device
Systems Manager
35. Technology Behind the App
Ensure all DNS requests are sent to
Umbrella
Adds protection when iOS users are
off-network; on public Wi-FI and
cellular networks
Simplest, most user friendly solution
in the market
Licensed by number of user seats
Enable audit of iOS device users
and their applications
Visibility into usage and network
resources accessed by mobile apps
First vendor to get this level of
access to iOS
Licensed by number of devices
Umbrella
Clarity
(AMP for Endpoints)
39. Fast Start Programs – Fuel the Fire
Double Firewall Commissions Aug 27 – Oct 21
40. 40
- CISCO READY use refresh opportunity to
discuss simplify IT message. Demo Meraki.
- Lock out Competition
- Grow product stack
Call to Action
41. 41
- SDWAN – Do you have Customers w many
sites? Ask about high bandwidth costs?
- K-12 ? Provincial Bandwidth initiative, they
have funding. Meraki certified
Call to Action - 2
42. 42
- API’s – Use as differentiate vs other Cloud
players
- Share developers site. Talk about vertical
solutions already certified with Meraki.
- Engage the various partners to see if you
can work together (Yelp for ex.)
Call to Action – 3
43. 43
- MV – Camera play.
- Datacenters to guard?
- Office locations?
- Understand OPEX benefit
- Leverage Free trials.
Call to Action - 4