SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
2014 Solution Brochure
Meraki
100% Cloud Managed Enterprise Networks
Cisco Meraki cloud managed edge, branch, and campus networking solutions bring simplicity to
enterprise-class networks. With wireless, switching, security, and device management centrally
managed from the cloud, Meraki gives network administrators visibility and control, without the cost
and complexity of traditional architectures.
Trusted by Thousands of Customers Worldwide
Introduction
“Meraki provides incredible visibility and control across
our highly distributed network”
– Steve Shead, Director of IT, Peet’s Coffee and Tea
“I can speak first-hand about Meraki’s effectiveness
at providing a turn-key, cloud-managed solution that
makes managing a network easy.”
– Lee Badman, Network Engineer, Syracuse University
“Meraki provides the security, capacity, and
management we need in a premium retail environment”
– Roger Mueller, Director of IT, Design within Reach
U N IV ERSIT Y
Customer success across all industries:
Education | Retail | Healthcare | Hospitality
Corporate Offices | Industrial / Manufacturing
Government | Carrier Hotspot / Offload
Free trials available at meraki.cisco.com/eval
Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | sales@meraki.com2
Product Families
Cloud Managed Wireless LAN
•	 Indoor & outdoor access point models
•	 802.11ac and 802.11n with ultra-high performance, up to 1.75 Gb/s
•	 Integrated wireless security & guest access
•	 Third radio dedicated to security & RF optimization (indoor models)
•	 Cloud-based management eliminates controller hardware
•	 Ideal for high-density campuses, branches, teleworkers,
and rugged / outdoor environments
Cloud Managed Switches
•	 Gigabit access switches and 10 GbE aggregation switches
•	 Centrally managed with monitoring and alerts
•	 Ultra-reliable, includes lifetime warranty
•	 Optimized for voice and video traffic with PoE available on all ports
Cloud Managed Security Appliances
•	 Complete networking, security and application control
•	 Centrally managed from the cloud
•	 Includes firewall, VPN, WAN optimization, & branch routing
•	 Six models scale from small branches to campuses
Cloud Based Mobile Device Management
•	 Centrally manage mobile devices, Macs and PCs
•	 Push apps to any number of devices
•	 Enforce restrictions and security policies
•	 Monitor device status and inventory
Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | sales@meraki.com3
Cloud Management Architecture
Cloud Based Centralized Management
•	 Network-wide visibility and control
•	 No on-site controller hardware
•	 Automatic monitoring and alerts
•	 Seamless over-the-web upgrades
•	 Scales to networks of all sizes
Intuitive Browser-Based Dashboard
•	 Intuitive interface eliminates specialized training
•	 Network-wide visibility across campus and distributed networks
•	 Wired, wireless, WAN and security under a single pane of glass
Secure, Scalable, and Reliable
•	 Industry-leading cloud technologies
•	 Custom designed database and real-time protocols
•	 Scales to tens of thousands of devices
•	 99.99% uptime SLA
•	 Regular 3rd party security audits and penetration tests
(PCI level 1 certified)
Location
Services
Application
QoS
Real-time
Control
User
Fingerprints
“Meraki has the feature set, and a system that is intuitive and easy to manage.
It’s a great experience for both end users and IT administrators.”
Jack Costanza, Assistant Director, M.I.T.
Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | sales@meraki.com4
Featured Solutions
High Density WiFi
•	 802.11ac and 802.11n, up to 1.75 Gbps
•	 Optimized for 100+ clients per access point
•	 Layer 7 traffic shaping at the edge
•	 Cloud based RF optimization with spectrum analysis
Case study: Massachusetts Institute of Technology (MIT)
Deployed Meraki wireless LAN in university’s largest department,
supporting thousands of users in crowded auditoriums.
Branch Networking
•	 Built-in multi-site management
•	 Auto-configuring site to site VPN
•	 Built-in WAN optimization
•	 Centralized monitoring, alerts, and firmware updates
Case study: Mosaic Healthcare
Deployed Meraki wireless LAN and security appliances across 40
healthcare facilities, supporting 5,000 users in 11 states.
Campus Edge
•	 Centrally manage thousands of wireless APs, switches
•	 Enforce network policies at the edge
•	 Seamlessly scale with distributed packet processing
•	 Deploy, manage, and troubleshoot quickly with cloud based tools
Case study: Alvin Independent School District
Deployed 1,000 APs supporting 19,000 students and faculty, without
dedicated wireless staff.
BYOD
•	 Fully integrated BYOD security and management
•	 Automatic client classification and policy enforcement
•	 Built-in NAC with antivirus scan
•	 Manage mobile devices with Systems Manager
Case study: Foster Pepper PLLC
Deployed Meraki to securely support employee-owned devices and
guest access at large Seattle law firm.
Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | sales@meraki.com5
Scalable cloud managed wireless APs,
security appliances, and switches
•	 Built for rapid campus and distributed deployments
•	 Designed for high capacity environments
•	 Highly scalable, add capacity without bottlenecks
•	 Scales from small branches to tens of thousands
of devices
Deep network-wide visibility
•	 Identify iPads, other devices, and individual users
•	 See bandwidth usage by application
•	 View client location, spectrum analysis, and other
real-time metrics
•	 Access auto-generated reports
Controls applications, users and devices
•	 Create identity and device-based policies
•	 Limit BitTorrent, Netflix, etc.
•	 Manage users and devices
Intuitive, Scalable Management
Key Technologies
Application
Control
Centralized
Management
Auto
VPN
Device
Management
Next Gen
Firewall
WAN
Optimization
Content
Filtering
Enterprise
Security
Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | sales@meraki.com6
Cisco Meraki Solution Brochure 2014
Cisco Meraki Solution Brochure 2014

Contenu connexe

Tendances

VPN security standards - Tareq Hanaysha
VPN security standards - Tareq HanayshaVPN security standards - Tareq Hanaysha
VPN security standards - Tareq HanayshaHanaysha
 
ZyXEL Success Story: Carnegie Telephone helps local hospital go wireless with...
ZyXEL Success Story: Carnegie Telephone helps local hospital go wireless with...ZyXEL Success Story: Carnegie Telephone helps local hospital go wireless with...
ZyXEL Success Story: Carnegie Telephone helps local hospital go wireless with...Zyxel Communications Corp.
 
Best Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change ProcessesBest Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change ProcessesAdi Gazit Blecher
 
241_ATD_TUE_1430_EagleRockEnergy_final
241_ATD_TUE_1430_EagleRockEnergy_final241_ATD_TUE_1430_EagleRockEnergy_final
241_ATD_TUE_1430_EagleRockEnergy_finalAnthony Hopkins
 
Aboutme 12983064135624 Phpapp01
Aboutme 12983064135624 Phpapp01Aboutme 12983064135624 Phpapp01
Aboutme 12983064135624 Phpapp01Irena90
 
Epic Sales Presentation
Epic Sales PresentationEpic Sales Presentation
Epic Sales Presentationdpsmith1968
 
Tying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigationTying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigation Maytal Levi
 
Mobile database security threats
Mobile database security threatsMobile database security threats
Mobile database security threatsAkhil Kumar
 
best practices-managing_security_in_the hybrid cloud
 best practices-managing_security_in_the hybrid cloud best practices-managing_security_in_the hybrid cloud
best practices-managing_security_in_the hybrid cloudAlgoSec
 
Sierra Wireless Developer Day 2013 - 05 - Essential building blocks
Sierra Wireless Developer Day 2013 - 05 - Essential building blocksSierra Wireless Developer Day 2013 - 05 - Essential building blocks
Sierra Wireless Developer Day 2013 - 05 - Essential building blocksThibault Cantegrel
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) MiajackB
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) MiajackB
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) MiajackB
 
Application visibility across the security estate the value and the vision ...
Application visibility across the security estate   the value and the vision ...Application visibility across the security estate   the value and the vision ...
Application visibility across the security estate the value and the vision ...AlgoSec
 
Algosec security policy management for financial institutions
Algosec security policy management for financial institutionsAlgosec security policy management for financial institutions
Algosec security policy management for financial institutionsMaytal Levi
 
Mobile device management v5
Mobile device management v5Mobile device management v5
Mobile device management v5RoyGerritse
 

Tendances (18)

VPN security standards - Tareq Hanaysha
VPN security standards - Tareq HanayshaVPN security standards - Tareq Hanaysha
VPN security standards - Tareq Hanaysha
 
Chandramohan Rajagopal V3
Chandramohan Rajagopal V3Chandramohan Rajagopal V3
Chandramohan Rajagopal V3
 
ZyXEL Success Story: Carnegie Telephone helps local hospital go wireless with...
ZyXEL Success Story: Carnegie Telephone helps local hospital go wireless with...ZyXEL Success Story: Carnegie Telephone helps local hospital go wireless with...
ZyXEL Success Story: Carnegie Telephone helps local hospital go wireless with...
 
Best Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change ProcessesBest Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change Processes
 
241_ATD_TUE_1430_EagleRockEnergy_final
241_ATD_TUE_1430_EagleRockEnergy_final241_ATD_TUE_1430_EagleRockEnergy_final
241_ATD_TUE_1430_EagleRockEnergy_final
 
Aboutme 12983064135624 Phpapp01
Aboutme 12983064135624 Phpapp01Aboutme 12983064135624 Phpapp01
Aboutme 12983064135624 Phpapp01
 
INTERNET PROTOCOL VIDEO SURVEILLANCE
INTERNET PROTOCOL VIDEO SURVEILLANCEINTERNET PROTOCOL VIDEO SURVEILLANCE
INTERNET PROTOCOL VIDEO SURVEILLANCE
 
Epic Sales Presentation
Epic Sales PresentationEpic Sales Presentation
Epic Sales Presentation
 
Tying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigationTying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigation
 
Mobile database security threats
Mobile database security threatsMobile database security threats
Mobile database security threats
 
best practices-managing_security_in_the hybrid cloud
 best practices-managing_security_in_the hybrid cloud best practices-managing_security_in_the hybrid cloud
best practices-managing_security_in_the hybrid cloud
 
Sierra Wireless Developer Day 2013 - 05 - Essential building blocks
Sierra Wireless Developer Day 2013 - 05 - Essential building blocksSierra Wireless Developer Day 2013 - 05 - Essential building blocks
Sierra Wireless Developer Day 2013 - 05 - Essential building blocks
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
 
Application visibility across the security estate the value and the vision ...
Application visibility across the security estate   the value and the vision ...Application visibility across the security estate   the value and the vision ...
Application visibility across the security estate the value and the vision ...
 
Algosec security policy management for financial institutions
Algosec security policy management for financial institutionsAlgosec security policy management for financial institutions
Algosec security policy management for financial institutions
 
Mobile device management v5
Mobile device management v5Mobile device management v5
Mobile device management v5
 

Similaire à Cisco Meraki Solution Brochure 2014

Exhibitor session: Cisco Meraki
Exhibitor session: Cisco MerakiExhibitor session: Cisco Meraki
Exhibitor session: Cisco MerakiJisc
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiRowell Dionicio
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01Sergiy Pitel
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksNTS UK - Part of Capita
 
Cisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideCisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideMaticmind
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bellCisco Canada
 
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...Internetwork Engineering (IE)
 
Past performance presentation
Past performance presentationPast performance presentation
Past performance presentationNAISales2
 
Wi-Fi 6: A New Era of Wireless Networking
Wi-Fi 6: A New Era of Wireless NetworkingWi-Fi 6: A New Era of Wireless Networking
Wi-Fi 6: A New Era of Wireless NetworkingValiant Technology
 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki OverviewSSISG
 
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFEMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFFaleh M.
 
Meraki overview 2011 general (2) (1)
Meraki overview 2011   general (2) (1)Meraki overview 2011   general (2) (1)
Meraki overview 2011 general (2) (1)subtitle
 
Simplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - AerohiveSimplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - AerohiveRodrigo Martini
 
Secure your workloads with microsegmentation
Secure your workloads with microsegmentationSecure your workloads with microsegmentation
Secure your workloads with microsegmentationRasool Irfan
 
Solution_Comparison_Meraki_vs._Ruckus.pdf
Solution_Comparison_Meraki_vs._Ruckus.pdfSolution_Comparison_Meraki_vs._Ruckus.pdf
Solution_Comparison_Meraki_vs._Ruckus.pdfniran10
 
MerakiFor_K-12EduSummit.pptx
MerakiFor_K-12EduSummit.pptxMerakiFor_K-12EduSummit.pptx
MerakiFor_K-12EduSummit.pptxVijayIthape3
 
Resume for James McGarity
Resume for James McGarityResume for James McGarity
Resume for James McGarityJames McGarity
 
Extreme networks - Better Connections. Better Experiences. For Everyone.
Extreme networks - Better Connections. Better Experiences. For Everyone.Extreme networks - Better Connections. Better Experiences. For Everyone.
Extreme networks - Better Connections. Better Experiences. For Everyone.Aruj Thirawat
 
Esc who we are 2016 rev2
Esc who we are 2016 rev2Esc who we are 2016 rev2
Esc who we are 2016 rev2thidisbogus
 

Similaire à Cisco Meraki Solution Brochure 2014 (20)

Exhibitor session: Cisco Meraki
Exhibitor session: Cisco MerakiExhibitor session: Cisco Meraki
Exhibitor session: Cisco Meraki
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by Meraki
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager Networks
 
Cisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideCisco Meraki Portfolio Guide
Cisco Meraki Portfolio Guide
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bell
 
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
 
Past performance presentation
Past performance presentationPast performance presentation
Past performance presentation
 
Wi-Fi 6: A New Era of Wireless Networking
Wi-Fi 6: A New Era of Wireless NetworkingWi-Fi 6: A New Era of Wireless Networking
Wi-Fi 6: A New Era of Wireless Networking
 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki Overview
 
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFEMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
 
Meraki overview 2011 general (2) (1)
Meraki overview 2011   general (2) (1)Meraki overview 2011   general (2) (1)
Meraki overview 2011 general (2) (1)
 
Simplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - AerohiveSimplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - Aerohive
 
Campus Mobility
Campus MobilityCampus Mobility
Campus Mobility
 
Secure your workloads with microsegmentation
Secure your workloads with microsegmentationSecure your workloads with microsegmentation
Secure your workloads with microsegmentation
 
Solution_Comparison_Meraki_vs._Ruckus.pdf
Solution_Comparison_Meraki_vs._Ruckus.pdfSolution_Comparison_Meraki_vs._Ruckus.pdf
Solution_Comparison_Meraki_vs._Ruckus.pdf
 
MerakiFor_K-12EduSummit.pptx
MerakiFor_K-12EduSummit.pptxMerakiFor_K-12EduSummit.pptx
MerakiFor_K-12EduSummit.pptx
 
Resume for James McGarity
Resume for James McGarityResume for James McGarity
Resume for James McGarity
 
Extreme networks - Better Connections. Better Experiences. For Everyone.
Extreme networks - Better Connections. Better Experiences. For Everyone.Extreme networks - Better Connections. Better Experiences. For Everyone.
Extreme networks - Better Connections. Better Experiences. For Everyone.
 
Esc who we are 2016 rev2
Esc who we are 2016 rev2Esc who we are 2016 rev2
Esc who we are 2016 rev2
 

Plus de NTS UK - Part of Capita

ShoreTel UC Solution Brief | Voyager Networks
ShoreTel UC Solution Brief | Voyager NetworksShoreTel UC Solution Brief | Voyager Networks
ShoreTel UC Solution Brief | Voyager NetworksNTS UK - Part of Capita
 
Red Box Recorders Solutions Overview | Voyager Networks
Red Box Recorders Solutions Overview | Voyager NetworksRed Box Recorders Solutions Overview | Voyager Networks
Red Box Recorders Solutions Overview | Voyager NetworksNTS UK - Part of Capita
 
Red Box Recorders Corporate Overview | Voyager Networks
Red Box Recorders Corporate Overview | Voyager NetworksRed Box Recorders Corporate Overview | Voyager Networks
Red Box Recorders Corporate Overview | Voyager NetworksNTS UK - Part of Capita
 
Case Study - Royal Agricultural Society of England
Case Study - Royal Agricultural Society of EnglandCase Study - Royal Agricultural Society of England
Case Study - Royal Agricultural Society of EnglandNTS UK - Part of Capita
 
Case Study - Charter Housing | Voyager Networks
Case Study - Charter Housing | Voyager NetworksCase Study - Charter Housing | Voyager Networks
Case Study - Charter Housing | Voyager NetworksNTS UK - Part of Capita
 

Plus de NTS UK - Part of Capita (7)

ShoreTel UC Solution Brief | Voyager Networks
ShoreTel UC Solution Brief | Voyager NetworksShoreTel UC Solution Brief | Voyager Networks
ShoreTel UC Solution Brief | Voyager Networks
 
Red Box Recorders Solutions Overview | Voyager Networks
Red Box Recorders Solutions Overview | Voyager NetworksRed Box Recorders Solutions Overview | Voyager Networks
Red Box Recorders Solutions Overview | Voyager Networks
 
Red Box Recorders Corporate Overview | Voyager Networks
Red Box Recorders Corporate Overview | Voyager NetworksRed Box Recorders Corporate Overview | Voyager Networks
Red Box Recorders Corporate Overview | Voyager Networks
 
The Connected Workforce
The Connected WorkforceThe Connected Workforce
The Connected Workforce
 
The Rise of Mobile in Business
The Rise of Mobile in BusinessThe Rise of Mobile in Business
The Rise of Mobile in Business
 
Case Study - Royal Agricultural Society of England
Case Study - Royal Agricultural Society of EnglandCase Study - Royal Agricultural Society of England
Case Study - Royal Agricultural Society of England
 
Case Study - Charter Housing | Voyager Networks
Case Study - Charter Housing | Voyager NetworksCase Study - Charter Housing | Voyager Networks
Case Study - Charter Housing | Voyager Networks
 

Dernier

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Dernier (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Cisco Meraki Solution Brochure 2014

  • 2. 100% Cloud Managed Enterprise Networks Cisco Meraki cloud managed edge, branch, and campus networking solutions bring simplicity to enterprise-class networks. With wireless, switching, security, and device management centrally managed from the cloud, Meraki gives network administrators visibility and control, without the cost and complexity of traditional architectures. Trusted by Thousands of Customers Worldwide Introduction “Meraki provides incredible visibility and control across our highly distributed network” – Steve Shead, Director of IT, Peet’s Coffee and Tea “I can speak first-hand about Meraki’s effectiveness at providing a turn-key, cloud-managed solution that makes managing a network easy.” – Lee Badman, Network Engineer, Syracuse University “Meraki provides the security, capacity, and management we need in a premium retail environment” – Roger Mueller, Director of IT, Design within Reach U N IV ERSIT Y Customer success across all industries: Education | Retail | Healthcare | Hospitality Corporate Offices | Industrial / Manufacturing Government | Carrier Hotspot / Offload Free trials available at meraki.cisco.com/eval Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | sales@meraki.com2
  • 3. Product Families Cloud Managed Wireless LAN • Indoor & outdoor access point models • 802.11ac and 802.11n with ultra-high performance, up to 1.75 Gb/s • Integrated wireless security & guest access • Third radio dedicated to security & RF optimization (indoor models) • Cloud-based management eliminates controller hardware • Ideal for high-density campuses, branches, teleworkers, and rugged / outdoor environments Cloud Managed Switches • Gigabit access switches and 10 GbE aggregation switches • Centrally managed with monitoring and alerts • Ultra-reliable, includes lifetime warranty • Optimized for voice and video traffic with PoE available on all ports Cloud Managed Security Appliances • Complete networking, security and application control • Centrally managed from the cloud • Includes firewall, VPN, WAN optimization, & branch routing • Six models scale from small branches to campuses Cloud Based Mobile Device Management • Centrally manage mobile devices, Macs and PCs • Push apps to any number of devices • Enforce restrictions and security policies • Monitor device status and inventory Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | sales@meraki.com3
  • 4. Cloud Management Architecture Cloud Based Centralized Management • Network-wide visibility and control • No on-site controller hardware • Automatic monitoring and alerts • Seamless over-the-web upgrades • Scales to networks of all sizes Intuitive Browser-Based Dashboard • Intuitive interface eliminates specialized training • Network-wide visibility across campus and distributed networks • Wired, wireless, WAN and security under a single pane of glass Secure, Scalable, and Reliable • Industry-leading cloud technologies • Custom designed database and real-time protocols • Scales to tens of thousands of devices • 99.99% uptime SLA • Regular 3rd party security audits and penetration tests (PCI level 1 certified) Location Services Application QoS Real-time Control User Fingerprints “Meraki has the feature set, and a system that is intuitive and easy to manage. It’s a great experience for both end users and IT administrators.” Jack Costanza, Assistant Director, M.I.T. Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | sales@meraki.com4
  • 5. Featured Solutions High Density WiFi • 802.11ac and 802.11n, up to 1.75 Gbps • Optimized for 100+ clients per access point • Layer 7 traffic shaping at the edge • Cloud based RF optimization with spectrum analysis Case study: Massachusetts Institute of Technology (MIT) Deployed Meraki wireless LAN in university’s largest department, supporting thousands of users in crowded auditoriums. Branch Networking • Built-in multi-site management • Auto-configuring site to site VPN • Built-in WAN optimization • Centralized monitoring, alerts, and firmware updates Case study: Mosaic Healthcare Deployed Meraki wireless LAN and security appliances across 40 healthcare facilities, supporting 5,000 users in 11 states. Campus Edge • Centrally manage thousands of wireless APs, switches • Enforce network policies at the edge • Seamlessly scale with distributed packet processing • Deploy, manage, and troubleshoot quickly with cloud based tools Case study: Alvin Independent School District Deployed 1,000 APs supporting 19,000 students and faculty, without dedicated wireless staff. BYOD • Fully integrated BYOD security and management • Automatic client classification and policy enforcement • Built-in NAC with antivirus scan • Manage mobile devices with Systems Manager Case study: Foster Pepper PLLC Deployed Meraki to securely support employee-owned devices and guest access at large Seattle law firm. Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | sales@meraki.com5
  • 6. Scalable cloud managed wireless APs, security appliances, and switches • Built for rapid campus and distributed deployments • Designed for high capacity environments • Highly scalable, add capacity without bottlenecks • Scales from small branches to tens of thousands of devices Deep network-wide visibility • Identify iPads, other devices, and individual users • See bandwidth usage by application • View client location, spectrum analysis, and other real-time metrics • Access auto-generated reports Controls applications, users and devices • Create identity and device-based policies • Limit BitTorrent, Netflix, etc. • Manage users and devices Intuitive, Scalable Management Key Technologies Application Control Centralized Management Auto VPN Device Management Next Gen Firewall WAN Optimization Content Filtering Enterprise Security Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | sales@meraki.com6