Developers: | Cisco Systems, Cisco Meraki |
Date of the premiere of the system: | 2013/06/12 |
Last Release Date: | 2015/12/12 |
Technology: | ITSM - Management systems for IT service, Network Health Monitoring - Monitoring of network or management of health performance of IT Infrastructure, SaaS - the Software as service |
Content |
Cisco Meraki MX - the unified solution of control of threats managed from a cloud (unified threat management, UTM). Provides protection of branches of the companies against the malware by means of verification of files according to the cloud database for identification of harmful content and blocking of files before their loading by users.
About the products Meraki
The equipment Meraki is installed at head office or remote branch. Cisco Meraki devices automatically join a cloud through the protocol of enciphering of SSL, are registered in network and load a configuration.
The IT service receives complete visualization and control over network via the Internet.
Properties
- Simplicity
- adding of devices in a few minutes
- automatic loading of configurations and firmwares
- built-in system of monitoring and notifications
- simultaneous management of thousands of devices and clients
- Reliability
- high availability of a cloud from several data-centers
- network functioning is continued at loss of communication with a cloud
- built-in system of technical support of the producer
- Security
- communication with a cloud via the encoded channel
- client traffic does not pass through a cloud
- two-factor authentication at connection to a cloud
- Economy
- there is no need for hardware wireless controllers and expensive management systems
- additional personnel and training of specialists are not required
- technical support and service, a lifelong guarantee Is included
Representation of Meraki MX Security Appliance Auto VPN, (2013)
Product number of Cisco Meraki Access points: from budget 802.11n, 300Mbps to highly productive 802.11ac, 1.75Gbps Switches: from L2 on 8 ports 1 Gbps to L3 on 48 ports 10 Gbps Safety controls: from small offices (up to 25 users) to the large organizations (up to 10 thousand users)
Mobile device management Control of computers (Win, Mac)
- Detailed information on devices
- Display on the card
- Command line
- Remote desktop
- Sending messages for the screen
- Management of programs and processes
- Mass installation of programs
- Geographical binding of devices
Control of smartphones (IOS, Android)
- Detailed information on devices
- Display on the card
- Sending messages for the screen
- Management of applications
- Installation of restrictions and parameters of security
Properties
- 100% are free
- The protected data transmission tunnel
- Centralized operation
- Log of events
- Detailed analytics
- Control and protection of devices
- Protection of corporate information
- Remote configuring and fault recovery
- Automated system of monitoring
- Automated system of the notification on e-mail
- Large number of functions and opportunities for iOS
History
2017: Data loss of clients
In August, 2017 Cisco admitted the fact of loss of a large number of client data. It became result of an error in settings of a cloud service Cisco Meraki.
On August 3 the personnel of Cisco servicing Meraki loaded incorrectly created file of settings into a storage system of Meraki North American. Thereof some part of the data loaded till 11:20 a.m. in the morning on the Pacific time on August 3 was deleted.[1]
This part is how big, it is unknown, but judging from the fact that history reached public level, it is rather essential. According to Cisco, such data as schemes of placement of access points Wi-Fi, graphic design and logos, reports and files of inline tunings disappeared. Some of 140 thousand corporate clients of Cisco Meraki it is necessary to recover the settings.
Representatives of Cisco in return promise to render comprehensive assistance on maintenance of the client systems.
This situation repeats earlier story with a cloud service of Amazon S3 when the programmer entered the wrong command in a miniature and "destroyed" several trunk servers of service. The fifth part of all websites on the Internet then "lay down", - Georgy Lagoda, the CEO of SEC Consult Services company notes. - Similar services need additional error protection of personnel - it is desirable in the form of automatic system which at least would check validity of the entered data. |