New access control features: $0. More flexible policy enforcement: $0. Not having to read a thick configuration manual: Priceless.

Here at Meraki, we like to take the traditional network experience (read: complex and expensive) and turn it on its head by making it easier to use and manage while keeping it affordable.  Recently, our engineers have been working on identity-based policy enforcement, a feature set that is typically found in only the most complex and expensive wireless LAN solutions. Meraki’s new Identity Policy Manager (IPM) offers identity-based policy controls, such as per-user VLAN tagging and per-user access control lists, coupled with the easy-to-use graphical interface that our customers have come to know and love.  We see a lot of higher education organizations use this feature set to create different access policies for the various students, faculty, and guests that are accessing the wireless network.  We also have seen larger businesses use these features to enforce granular access control over multiple sites.
With Meraki, these schools and businesses can implement these same access policies without having to pay dearly for them.  And, if you’re used to having to read bulky administrator manuals to configure features like these, we’re sorry to report that you may have to find some new bedtime reading material: A Meraki wireless network is so easy to configure that you won’t have to read a single configuration guide.  (Feel free to contact us for some good book recommendations.)
Please see our press release about our new IPM product <link>here</link>.  As you’ll see, MIT’s Computer Science and Artificial Intelligence Laboratory is currently using IPM successfully today.  Others can look for it in a few weeks when it becomes generally available, at no additional cost to Enterprise customers.

Here at Meraki, we like to take the traditional network experience (read: complex and expensive) and turn it on its head by making it easier to use and manage while keeping it affordable.  Recently, our engineers have been working on identity-based policy enforcement, a feature set that is typically found in only the most complex and expensive wireless LAN solutions.  Meraki’s new Identity Policy Manager (IPM) offers identity-based policy controls, such as per-user VLAN tagging and per-user access control lists, coupled with the easy-to-use graphical interface that our customers have come to know and love.  We see a lot of higher education organizations use this feature set to create different access policies for the various students, faculty, and guests that access the wireless network.  We also have seen larger businesses use these features to enforce granular access control over multiple sites.

With Meraki, these schools and businesses can implement these same access policies without having to pay dearly for them.  And, if you’re used to having to read bulky administrator manuals to configure features like these, we’re sorry to report that you may have to find some new bedtime reading material: A Meraki wireless network is so easy to configure that you won’t have to read a single configuration guide.  (Feel free to contact us for some good book recommendations.)

Please see our press release about our new IPM product. As you’ll see, MIT’s Computer Science and Artificial Intelligence Laboratory is currently using IPM successfully today.  Others can look for it in a few weeks when it becomes generally available, at no additional cost to Enterprise customers.

– Posted by Jed Lau