Cisco Meraki Mobile Device Management
Centralized Device Management
Unify management and control of thousands of mobile and desktop devices in the secure, browser-based Meraki dashboard.
- Drive your organization’s mobility initiatives
- Seamlessly onboarding new devices
- Automate application of security policies.
- Chrome OS
- Windows Phone
simplifying device management
Pre-enroll devices or dynamically add users as they join your network. Deploy wireless and VPN connectivity settings, push apps and content, or restrict usage—based on user groups.
Locate and track laptops and mobile devices anywhere in the world. Get real time visibility on device health, security posture, and software and hardware inventory for your entire fleet of devices.
Ensure security for your organization from devices all the way through to network policies. Protect devices and their data with encryption enforcement, enterprise remote wipe, and integrated network access control.
Network, Meet Device
Systems Manager keeps the network in the loop about constantly changing devices, automatically tracking device posture and adjusting security policies to match.
Seamless User Enrollment
Gone are the days of manual user-to-device assignment. Tie people to their devices by integrating enrollment with Active Directory. Scale your deployment to thousands and eliminate unknown devices in your environment.
Customize policies for each user group in your organization. Require a passcode on devices before pushing Exchange settings, limit jailbroken devices to the guest network, or revoke privileges if devices violate security policies.
Automated Device Provisioning
Devices are provisioned based on group enrollment, security compliance, and geofence location. Automatically deliver apps, network, and security settings specific to each user.
Separate enterprise data from personal data
Don’t mess with complicated SDKs or modifying application source code. Systems Manager provides secure containerization using native OS tools, allowing secure data sharing among apps without complexity. Whitelist secure apps and blacklist unsupported ones to ensure only approved apps are used.