SlideShare a Scribd company logo
2014 Solution Brochure
Meraki
100% Cloud Managed Enterprise Networks
Cisco Meraki cloud managed edge, branch, and campus networking solutions bring simplicity to
enterprise-class networks. With wireless, switching, security, and device management centrally
managed from the cloud, Meraki gives network administrators visibility and control, without the cost
and complexity of traditional architectures.
Trusted by Thousands of Customers Worldwide
Introduction
“Meraki provides incredible visibility and control across
our highly distributed network”
– Steve Shead, Director of IT, Peet’s Coffee and Tea
“I can speak first-hand about Meraki’s effectiveness
at providing a turn-key, cloud-managed solution that
makes managing a network easy.”
– Lee Badman, Network Engineer, Syracuse University
“Meraki provides the security, capacity, and
management we need in a premium retail environment”
– Roger Mueller, Director of IT, Design within Reach
U N IV ERSIT Y
Customer success across all industries:
Education | Retail | Healthcare | Hospitality
Corporate Offices | Industrial / Manufacturing
Government | Carrier Hotspot / Offload
Free trials available at meraki.cisco.com/eval
Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | sales@meraki.com2
Product Families
Cloud Managed Wireless LAN
•	 Indoor & outdoor access point models
•	 802.11ac and 802.11n with ultra-high performance, up to 1.75 Gb/s
•	 Integrated wireless security & guest access
•	 Third radio dedicated to security & RF optimization (indoor models)
•	 Cloud-based management eliminates controller hardware
•	 Ideal for high-density campuses, branches, teleworkers,
and rugged / outdoor environments
Cloud Managed Switches
•	 Gigabit access switches and 10 GbE aggregation switches
•	 Centrally managed with monitoring and alerts
•	 Ultra-reliable, includes lifetime warranty
•	 Optimized for voice and video traffic with PoE available on all ports
Cloud Managed Security Appliances
•	 Complete networking, security and application control
•	 Centrally managed from the cloud
•	 Includes firewall, VPN, WAN optimization, & branch routing
•	 Six models scale from small branches to campuses
Cloud Based Mobile Device Management
•	 Centrally manage mobile devices, Macs and PCs
•	 Push apps to any number of devices
•	 Enforce restrictions and security policies
•	 Monitor device status and inventory
Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | sales@meraki.com3
Cloud Management Architecture
Cloud Based Centralized Management
•	 Network-wide visibility and control
•	 No on-site controller hardware
•	 Automatic monitoring and alerts
•	 Seamless over-the-web upgrades
•	 Scales to networks of all sizes
Intuitive Browser-Based Dashboard
•	 Intuitive interface eliminates specialized training
•	 Network-wide visibility across campus and distributed networks
•	 Wired, wireless, WAN and security under a single pane of glass
Secure, Scalable, and Reliable
•	 Industry-leading cloud technologies
•	 Custom designed database and real-time protocols
•	 Scales to tens of thousands of devices
•	 99.99% uptime SLA
•	 Regular 3rd party security audits and penetration tests
(PCI level 1 certified)
Location
Services
Application
QoS
Real-time
Control
User
Fingerprints
“Meraki has the feature set, and a system that is intuitive and easy to manage.
It’s a great experience for both end users and IT administrators.”
Jack Costanza, Assistant Director, M.I.T.
Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | sales@meraki.com4
Featured Solutions
High Density WiFi
•	 802.11ac and 802.11n, up to 1.75 Gbps
•	 Optimized for 100+ clients per access point
•	 Layer 7 traffic shaping at the edge
•	 Cloud based RF optimization with spectrum analysis
Case study: Massachusetts Institute of Technology (MIT)
Deployed Meraki wireless LAN in university’s largest department,
supporting thousands of users in crowded auditoriums.
Branch Networking
•	 Built-in multi-site management
•	 Auto-configuring site to site VPN
•	 Built-in WAN optimization
•	 Centralized monitoring, alerts, and firmware updates
Case study: Mosaic Healthcare
Deployed Meraki wireless LAN and security appliances across 40
healthcare facilities, supporting 5,000 users in 11 states.
Campus Edge
•	 Centrally manage thousands of wireless APs, switches
•	 Enforce network policies at the edge
•	 Seamlessly scale with distributed packet processing
•	 Deploy, manage, and troubleshoot quickly with cloud based tools
Case study: Alvin Independent School District
Deployed 1,000 APs supporting 19,000 students and faculty, without
dedicated wireless staff.
BYOD
•	 Fully integrated BYOD security and management
•	 Automatic client classification and policy enforcement
•	 Built-in NAC with antivirus scan
•	 Manage mobile devices with Systems Manager
Case study: Foster Pepper PLLC
Deployed Meraki to securely support employee-owned devices and
guest access at large Seattle law firm.
Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | sales@meraki.com5
Scalable cloud managed wireless APs,
security appliances, and switches
•	 Built for rapid campus and distributed deployments
•	 Designed for high capacity environments
•	 Highly scalable, add capacity without bottlenecks
•	 Scales from small branches to tens of thousands
of devices
Deep network-wide visibility
•	 Identify iPads, other devices, and individual users
•	 See bandwidth usage by application
•	 View client location, spectrum analysis, and other
real-time metrics
•	 Access auto-generated reports
Controls applications, users and devices
•	 Create identity and device-based policies
•	 Limit BitTorrent, Netflix, etc.
•	 Manage users and devices
Intuitive, Scalable Management
Key Technologies
Application
Control
Centralized
Management
Auto
VPN
Device
Management
Next Gen
Firewall
WAN
Optimization
Content
Filtering
Enterprise
Security
Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | sales@meraki.com6
Cisco Meraki Solution Brochure 2014
Cisco Meraki Solution Brochure 2014

More Related Content

What's hot

VPN security standards - Tareq Hanaysha
VPN security standards - Tareq HanayshaVPN security standards - Tareq Hanaysha
VPN security standards - Tareq HanayshaHanaysha
 
ZyXEL Success Story: Carnegie Telephone helps local hospital go wireless with...
ZyXEL Success Story: Carnegie Telephone helps local hospital go wireless with...ZyXEL Success Story: Carnegie Telephone helps local hospital go wireless with...
ZyXEL Success Story: Carnegie Telephone helps local hospital go wireless with...
Zyxel Communications Corp.
 
Best Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change ProcessesBest Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change Processes
Adi Gazit Blecher
 
241_ATD_TUE_1430_EagleRockEnergy_final
241_ATD_TUE_1430_EagleRockEnergy_final241_ATD_TUE_1430_EagleRockEnergy_final
241_ATD_TUE_1430_EagleRockEnergy_finalAnthony Hopkins
 
Aboutme 12983064135624 Phpapp01
Aboutme 12983064135624 Phpapp01Aboutme 12983064135624 Phpapp01
Aboutme 12983064135624 Phpapp01Irena90
 
INTERNET PROTOCOL VIDEO SURVEILLANCE
INTERNET PROTOCOL VIDEO SURVEILLANCEINTERNET PROTOCOL VIDEO SURVEILLANCE
INTERNET PROTOCOL VIDEO SURVEILLANCE
Layer3 Security Services
 
Epic Sales Presentation
Epic Sales PresentationEpic Sales Presentation
Epic Sales Presentation
dpsmith1968
 
Tying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigationTying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigation
Maytal Levi
 
Mobile database security threats
Mobile database security threatsMobile database security threats
Mobile database security threatsAkhil Kumar
 
best practices-managing_security_in_the hybrid cloud
 best practices-managing_security_in_the hybrid cloud best practices-managing_security_in_the hybrid cloud
best practices-managing_security_in_the hybrid cloud
AlgoSec
 
Sierra Wireless Developer Day 2013 - 05 - Essential building blocks
Sierra Wireless Developer Day 2013 - 05 - Essential building blocksSierra Wireless Developer Day 2013 - 05 - Essential building blocks
Sierra Wireless Developer Day 2013 - 05 - Essential building blocks
Thibault Cantegrel
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
MiajackB
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
MiajackB
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
MiajackB
 
Application visibility across the security estate the value and the vision ...
Application visibility across the security estate   the value and the vision ...Application visibility across the security estate   the value and the vision ...
Application visibility across the security estate the value and the vision ...
AlgoSec
 
Algosec security policy management for financial institutions
Algosec security policy management for financial institutionsAlgosec security policy management for financial institutions
Algosec security policy management for financial institutions
Maytal Levi
 
Mobile device management v5
Mobile device management v5Mobile device management v5
Mobile device management v5RoyGerritse
 

What's hot (18)

VPN security standards - Tareq Hanaysha
VPN security standards - Tareq HanayshaVPN security standards - Tareq Hanaysha
VPN security standards - Tareq Hanaysha
 
Chandramohan Rajagopal V3
Chandramohan Rajagopal V3Chandramohan Rajagopal V3
Chandramohan Rajagopal V3
 
ZyXEL Success Story: Carnegie Telephone helps local hospital go wireless with...
ZyXEL Success Story: Carnegie Telephone helps local hospital go wireless with...ZyXEL Success Story: Carnegie Telephone helps local hospital go wireless with...
ZyXEL Success Story: Carnegie Telephone helps local hospital go wireless with...
 
Best Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change ProcessesBest Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change Processes
 
241_ATD_TUE_1430_EagleRockEnergy_final
241_ATD_TUE_1430_EagleRockEnergy_final241_ATD_TUE_1430_EagleRockEnergy_final
241_ATD_TUE_1430_EagleRockEnergy_final
 
Aboutme 12983064135624 Phpapp01
Aboutme 12983064135624 Phpapp01Aboutme 12983064135624 Phpapp01
Aboutme 12983064135624 Phpapp01
 
INTERNET PROTOCOL VIDEO SURVEILLANCE
INTERNET PROTOCOL VIDEO SURVEILLANCEINTERNET PROTOCOL VIDEO SURVEILLANCE
INTERNET PROTOCOL VIDEO SURVEILLANCE
 
Epic Sales Presentation
Epic Sales PresentationEpic Sales Presentation
Epic Sales Presentation
 
Tying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigationTying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigation
 
Mobile database security threats
Mobile database security threatsMobile database security threats
Mobile database security threats
 
best practices-managing_security_in_the hybrid cloud
 best practices-managing_security_in_the hybrid cloud best practices-managing_security_in_the hybrid cloud
best practices-managing_security_in_the hybrid cloud
 
Sierra Wireless Developer Day 2013 - 05 - Essential building blocks
Sierra Wireless Developer Day 2013 - 05 - Essential building blocksSierra Wireless Developer Day 2013 - 05 - Essential building blocks
Sierra Wireless Developer Day 2013 - 05 - Essential building blocks
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
 
Application visibility across the security estate the value and the vision ...
Application visibility across the security estate   the value and the vision ...Application visibility across the security estate   the value and the vision ...
Application visibility across the security estate the value and the vision ...
 
Algosec security policy management for financial institutions
Algosec security policy management for financial institutionsAlgosec security policy management for financial institutions
Algosec security policy management for financial institutions
 
Mobile device management v5
Mobile device management v5Mobile device management v5
Mobile device management v5
 

Similar to Cisco Meraki Solution Brochure 2014

Exhibitor session: Cisco Meraki
Exhibitor session: Cisco MerakiExhibitor session: Cisco Meraki
Exhibitor session: Cisco Meraki
Jisc
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by Meraki
Rowell Dionicio
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager Networks
NTS UK - Part of Capita
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01Sergiy Pitel
 
Cisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideCisco Meraki Portfolio Guide
Cisco Meraki Portfolio Guide
Maticmind
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bell
Cisco Canada
 
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Internetwork Engineering (IE)
 
Past performance presentation
Past performance presentationPast performance presentation
Past performance presentationNAISales2
 
Wi-Fi 6: A New Era of Wireless Networking
Wi-Fi 6: A New Era of Wireless NetworkingWi-Fi 6: A New Era of Wireless Networking
Wi-Fi 6: A New Era of Wireless Networking
Valiant Technology
 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki Overview
SSISG
 
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFEMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFFaleh M.
 
Meraki overview 2011 general (2) (1)
Meraki overview 2011   general (2) (1)Meraki overview 2011   general (2) (1)
Meraki overview 2011 general (2) (1)subtitle
 
Simplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - AerohiveSimplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - AerohiveRodrigo Martini
 
Campus Mobility
Campus MobilityCampus Mobility
Campus Mobility
Mark Boorman
 
Secure your workloads with microsegmentation
Secure your workloads with microsegmentationSecure your workloads with microsegmentation
Secure your workloads with microsegmentation
Rasool Irfan
 
Solution_Comparison_Meraki_vs._Ruckus.pdf
Solution_Comparison_Meraki_vs._Ruckus.pdfSolution_Comparison_Meraki_vs._Ruckus.pdf
Solution_Comparison_Meraki_vs._Ruckus.pdf
niran10
 
MerakiFor_K-12EduSummit.pptx
MerakiFor_K-12EduSummit.pptxMerakiFor_K-12EduSummit.pptx
MerakiFor_K-12EduSummit.pptx
VijayIthape3
 
Resume for James McGarity
Resume for James McGarityResume for James McGarity
Resume for James McGarityJames McGarity
 
Extreme networks - Better Connections. Better Experiences. For Everyone.
Extreme networks - Better Connections. Better Experiences. For Everyone.Extreme networks - Better Connections. Better Experiences. For Everyone.
Extreme networks - Better Connections. Better Experiences. For Everyone.
Aruj Thirawat
 
Esc who we are 2016 rev2
Esc who we are 2016 rev2Esc who we are 2016 rev2
Esc who we are 2016 rev2
thidisbogus
 

Similar to Cisco Meraki Solution Brochure 2014 (20)

Exhibitor session: Cisco Meraki
Exhibitor session: Cisco MerakiExhibitor session: Cisco Meraki
Exhibitor session: Cisco Meraki
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by Meraki
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager Networks
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
 
Cisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideCisco Meraki Portfolio Guide
Cisco Meraki Portfolio Guide
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bell
 
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
 
Past performance presentation
Past performance presentationPast performance presentation
Past performance presentation
 
Wi-Fi 6: A New Era of Wireless Networking
Wi-Fi 6: A New Era of Wireless NetworkingWi-Fi 6: A New Era of Wireless Networking
Wi-Fi 6: A New Era of Wireless Networking
 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki Overview
 
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFEMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
 
Meraki overview 2011 general (2) (1)
Meraki overview 2011   general (2) (1)Meraki overview 2011   general (2) (1)
Meraki overview 2011 general (2) (1)
 
Simplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - AerohiveSimplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - Aerohive
 
Campus Mobility
Campus MobilityCampus Mobility
Campus Mobility
 
Secure your workloads with microsegmentation
Secure your workloads with microsegmentationSecure your workloads with microsegmentation
Secure your workloads with microsegmentation
 
Solution_Comparison_Meraki_vs._Ruckus.pdf
Solution_Comparison_Meraki_vs._Ruckus.pdfSolution_Comparison_Meraki_vs._Ruckus.pdf
Solution_Comparison_Meraki_vs._Ruckus.pdf
 
MerakiFor_K-12EduSummit.pptx
MerakiFor_K-12EduSummit.pptxMerakiFor_K-12EduSummit.pptx
MerakiFor_K-12EduSummit.pptx
 
Resume for James McGarity
Resume for James McGarityResume for James McGarity
Resume for James McGarity
 
Extreme networks - Better Connections. Better Experiences. For Everyone.
Extreme networks - Better Connections. Better Experiences. For Everyone.Extreme networks - Better Connections. Better Experiences. For Everyone.
Extreme networks - Better Connections. Better Experiences. For Everyone.
 
Esc who we are 2016 rev2
Esc who we are 2016 rev2Esc who we are 2016 rev2
Esc who we are 2016 rev2
 

More from NTS UK - Part of Capita

ShoreTel UC Solution Brief | Voyager Networks
ShoreTel UC Solution Brief | Voyager NetworksShoreTel UC Solution Brief | Voyager Networks
ShoreTel UC Solution Brief | Voyager Networks
NTS UK - Part of Capita
 
Red Box Recorders Solutions Overview | Voyager Networks
Red Box Recorders Solutions Overview | Voyager NetworksRed Box Recorders Solutions Overview | Voyager Networks
Red Box Recorders Solutions Overview | Voyager Networks
NTS UK - Part of Capita
 
Red Box Recorders Corporate Overview | Voyager Networks
Red Box Recorders Corporate Overview | Voyager NetworksRed Box Recorders Corporate Overview | Voyager Networks
Red Box Recorders Corporate Overview | Voyager Networks
NTS UK - Part of Capita
 
Case Study - Royal Agricultural Society of England
Case Study - Royal Agricultural Society of EnglandCase Study - Royal Agricultural Society of England
Case Study - Royal Agricultural Society of EnglandNTS UK - Part of Capita
 
Case Study - Charter Housing | Voyager Networks
Case Study - Charter Housing | Voyager NetworksCase Study - Charter Housing | Voyager Networks
Case Study - Charter Housing | Voyager Networks
NTS UK - Part of Capita
 

More from NTS UK - Part of Capita (7)

ShoreTel UC Solution Brief | Voyager Networks
ShoreTel UC Solution Brief | Voyager NetworksShoreTel UC Solution Brief | Voyager Networks
ShoreTel UC Solution Brief | Voyager Networks
 
Red Box Recorders Solutions Overview | Voyager Networks
Red Box Recorders Solutions Overview | Voyager NetworksRed Box Recorders Solutions Overview | Voyager Networks
Red Box Recorders Solutions Overview | Voyager Networks
 
Red Box Recorders Corporate Overview | Voyager Networks
Red Box Recorders Corporate Overview | Voyager NetworksRed Box Recorders Corporate Overview | Voyager Networks
Red Box Recorders Corporate Overview | Voyager Networks
 
The Connected Workforce
The Connected WorkforceThe Connected Workforce
The Connected Workforce
 
The Rise of Mobile in Business
The Rise of Mobile in BusinessThe Rise of Mobile in Business
The Rise of Mobile in Business
 
Case Study - Royal Agricultural Society of England
Case Study - Royal Agricultural Society of EnglandCase Study - Royal Agricultural Society of England
Case Study - Royal Agricultural Society of England
 
Case Study - Charter Housing | Voyager Networks
Case Study - Charter Housing | Voyager NetworksCase Study - Charter Housing | Voyager Networks
Case Study - Charter Housing | Voyager Networks
 

Recently uploaded

"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 

Recently uploaded (20)

"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 

Cisco Meraki Solution Brochure 2014

  • 2. 100% Cloud Managed Enterprise Networks Cisco Meraki cloud managed edge, branch, and campus networking solutions bring simplicity to enterprise-class networks. With wireless, switching, security, and device management centrally managed from the cloud, Meraki gives network administrators visibility and control, without the cost and complexity of traditional architectures. Trusted by Thousands of Customers Worldwide Introduction “Meraki provides incredible visibility and control across our highly distributed network” – Steve Shead, Director of IT, Peet’s Coffee and Tea “I can speak first-hand about Meraki’s effectiveness at providing a turn-key, cloud-managed solution that makes managing a network easy.” – Lee Badman, Network Engineer, Syracuse University “Meraki provides the security, capacity, and management we need in a premium retail environment” – Roger Mueller, Director of IT, Design within Reach U N IV ERSIT Y Customer success across all industries: Education | Retail | Healthcare | Hospitality Corporate Offices | Industrial / Manufacturing Government | Carrier Hotspot / Offload Free trials available at meraki.cisco.com/eval Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | sales@meraki.com2
  • 3. Product Families Cloud Managed Wireless LAN • Indoor & outdoor access point models • 802.11ac and 802.11n with ultra-high performance, up to 1.75 Gb/s • Integrated wireless security & guest access • Third radio dedicated to security & RF optimization (indoor models) • Cloud-based management eliminates controller hardware • Ideal for high-density campuses, branches, teleworkers, and rugged / outdoor environments Cloud Managed Switches • Gigabit access switches and 10 GbE aggregation switches • Centrally managed with monitoring and alerts • Ultra-reliable, includes lifetime warranty • Optimized for voice and video traffic with PoE available on all ports Cloud Managed Security Appliances • Complete networking, security and application control • Centrally managed from the cloud • Includes firewall, VPN, WAN optimization, & branch routing • Six models scale from small branches to campuses Cloud Based Mobile Device Management • Centrally manage mobile devices, Macs and PCs • Push apps to any number of devices • Enforce restrictions and security policies • Monitor device status and inventory Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | sales@meraki.com3
  • 4. Cloud Management Architecture Cloud Based Centralized Management • Network-wide visibility and control • No on-site controller hardware • Automatic monitoring and alerts • Seamless over-the-web upgrades • Scales to networks of all sizes Intuitive Browser-Based Dashboard • Intuitive interface eliminates specialized training • Network-wide visibility across campus and distributed networks • Wired, wireless, WAN and security under a single pane of glass Secure, Scalable, and Reliable • Industry-leading cloud technologies • Custom designed database and real-time protocols • Scales to tens of thousands of devices • 99.99% uptime SLA • Regular 3rd party security audits and penetration tests (PCI level 1 certified) Location Services Application QoS Real-time Control User Fingerprints “Meraki has the feature set, and a system that is intuitive and easy to manage. It’s a great experience for both end users and IT administrators.” Jack Costanza, Assistant Director, M.I.T. Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | sales@meraki.com4
  • 5. Featured Solutions High Density WiFi • 802.11ac and 802.11n, up to 1.75 Gbps • Optimized for 100+ clients per access point • Layer 7 traffic shaping at the edge • Cloud based RF optimization with spectrum analysis Case study: Massachusetts Institute of Technology (MIT) Deployed Meraki wireless LAN in university’s largest department, supporting thousands of users in crowded auditoriums. Branch Networking • Built-in multi-site management • Auto-configuring site to site VPN • Built-in WAN optimization • Centralized monitoring, alerts, and firmware updates Case study: Mosaic Healthcare Deployed Meraki wireless LAN and security appliances across 40 healthcare facilities, supporting 5,000 users in 11 states. Campus Edge • Centrally manage thousands of wireless APs, switches • Enforce network policies at the edge • Seamlessly scale with distributed packet processing • Deploy, manage, and troubleshoot quickly with cloud based tools Case study: Alvin Independent School District Deployed 1,000 APs supporting 19,000 students and faculty, without dedicated wireless staff. BYOD • Fully integrated BYOD security and management • Automatic client classification and policy enforcement • Built-in NAC with antivirus scan • Manage mobile devices with Systems Manager Case study: Foster Pepper PLLC Deployed Meraki to securely support employee-owned devices and guest access at large Seattle law firm. Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | sales@meraki.com5
  • 6. Scalable cloud managed wireless APs, security appliances, and switches • Built for rapid campus and distributed deployments • Designed for high capacity environments • Highly scalable, add capacity without bottlenecks • Scales from small branches to tens of thousands of devices Deep network-wide visibility • Identify iPads, other devices, and individual users • See bandwidth usage by application • View client location, spectrum analysis, and other real-time metrics • Access auto-generated reports Controls applications, users and devices • Create identity and device-based policies • Limit BitTorrent, Netflix, etc. • Manage users and devices Intuitive, Scalable Management Key Technologies Application Control Centralized Management Auto VPN Device Management Next Gen Firewall WAN Optimization Content Filtering Enterprise Security Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | sales@meraki.com6