100% centralized cloud management for security, networking, and application control.
Safety, Fast.

Cisco Meraki Security Appliances can be remotely deployed in minutes using zero-touch cloud provisioning. Security settings are simple to synchronize across thousands of sites using templates.

  • Auto VPN technology securely connects branches in 3 clicks, through an intuitive, web-based dashboard.
  • Secure a Site in Minutes
  • Add Meraki Security Appliance to dashboard.
  • Enable intrusion prevention.

Comprehensive Security in a Single Box

 

Every Meraki Security Appliance supports several features, like a stateful firewall and integrated Sourcefire intrusion prevention (IPS) engine, to keep networks secure. Threat definitions and filter lists are seamlessly updated, ensuring every site has bleeding-edge protection from the latest vulnerabilities and troublesome websites.

 

  • Next-gen firewall
  • Intrusion prevention
  • Cloud-brokered VPN
  • Content filtering
  • Malware protection
  • High availability
The Meraki Network: Cloud Managed Security Appliances
Z

Built-in SD-WAN

Software-defined WAN capabilities in every security appliance reduce operational costs and improve resource usage for multi-site deployments, allowing network administrators to use available bandwidth more efficiently and ensure the highest possible level of performance for critical applications without sacrificing security or data privacy.
Z

Fault Tolerance

Redundancy is built in to Meraki Security Appliances: from dual WAN and cellular uplinks to maintain connection to the Internet, to warm spare failover that ensures service integrity, to self-healing site-to-site VPN that keeps branches and public cloud IT services securely connected.
The Meraki MX includes a complete, robust feature set right out of the box. No additional purchase required.

Intuitive Centralized Management

The Meraki dashboard enables network administrators to view networked clients, bandwidth consumption, and application usage across all sites—and push policies to block, shape, or whitelist activity to optimize performance and user experience. Deep visibility and control provides real insight from any Internet-accessible device, anytime, anywhere.
FEATURES

Identity-Based Firewall

Automatically assigns firewall and traffic shaping rules, VLAN tags, and bandwidth limits to enforce the right policies for each class of users.

Intrusion Prevention

Protects critical network resources from the latest security threats and vulnerabilities.

Auto VPN

Securely connects branch locations using mesh or hub-and-spoke topologies. Provides simple VPN access into Amazon Web Services.

Content Filtering

Block undesirable web content across 70+ categories, and leverage cloud lookups to filter billions of URLs.

Advanced Malware Protection

Protect your network against malware using the latest threat intelligence, and identify previously unknown malicious files with retrospective detection.

High Availability & Failover

Provides device and connection integrity through multiple uplinks, warm spare failover, and self-healing VPN.
T

Application Visibility & Control

Identify which applications are being used, and then prioritize critical apps while limiting recreational apps.

Centralized Management

Seamlessly manage campus-wide WiFi deployments and distributed multi-site networks from a single pane-of-glass.
Resources
Cisco Meraki
57 downloads 1.0 Dennis Gorya 18-06-2017 20:43 Download
Cisco Meraki for Retail
59 downloads 1.0 Dennis Gorya 18-06-2017 20:43 Download
Cisco Meraki for Higher Education
63 downloads 1.0 Dennis Gorya 18-06-2017 20:42 Download
Cisco Meraki for K-12
53 downloads 1.0 Dennis Gorya 18-06-2017 20:42 Download
Cisco Meraki for Healthcare
56 downloads 1.0 Dennis Gorya 18-06-2017 20:41 Download
51 downloads 1.0 Dennis Gorya 18-06-2017 20:41 Download
74 downloads 1.0 Dennis Gorya 18-06-2017 20:40 Download
99 downloads 1.0 Dennis Gorya 18-06-2017 20:39 Download