Archive for the ‘Company Blog’ Category

Get off on the right foot with Systems Manager Training

We’ve all been there. We purchase a new solution, begin setting it up and doubt sets in – does my approach scale? Is this the right configuration? Will one wrong decision now cost me weeks of work later? If only there was a simple and affordable way to get off on the right foot.

Good news! Cisco Meraki is introducing a free training program for  all customers who purchase a minimum of 200 Meraki Systems Manager licenses. This program gives customers the opportunity to get the most out of Systems Manager right from the start with the help of expert Meraki Systems Manager trainers.

This expert team has seen it all – from questions about integrating Apple’s DEP program to Android Enterprise deployments, supervising devices that are already in the field, protecting point of sale devices, and best practices around securing a mobile workforce or student/staff environment. Take advantage of this team’s knowledge and experience working with with all sizes of organizations across global industries!

Both new and existing Meraki customers that complete a new purchase of a minimum of 200 Systems Manager licenses (per purchase) as of March 1st, 2018 will be contacted by a Systems Manager expert within 30 days of the purchase to schedule a training appointment. This will provide an opportunity for customers to describe their individual needs and deployment considerations and enjoy customized training.

Please reach out to your Meraki sales rep to learn more, or contact us to get started!

Posted in Company Blog | Comments Off on Get off on the right foot with Systems Manager Training

All About AutoVPN

By Steve Harrison

Virtual Private Networks (VPN) have been a mainstay in corporations for the past 20 years. They allow companies, government agencies, and departments to make potentially sensitive communications over an untrusted network. In the last few years, they have become the transport independent overlays of most SD-WAN solutions.

The problem is that the configuration of these technologies and the plethora of phases, modes, and encryption algorithms means that getting and staying secure can be a laborious task. This is where AutoVPN from Meraki offers a quick and easy way to become—and automatically stay—secure via the cloud.

At Cisco Meraki, we’ve been talking about VPN for a long time. However, up until now, we haven’t described what makes our AutoVPN different from everyone else’s “normal” VPN.  In this blog post, we’ll show how our technology takes the hassle out of designing, configuring, and maintaining VPNs.

It started with Punch!

First, before we even think about VPN-ing from one MX to another, we need to know where and, more importantly, how they talk to one another. In order to do this, we leverage a service we call “punch”—we use this because our MX security appliances aren’t necessarily directly connected to the internet. They could be behind another public firewall or deployed in VPN concentrator mode in either a DMZ or data center core network.  

The punch process automatically tries to “punch” its way out to the internet/public IP space through any Network Address Translation (NAT) device. To do this, a technique called UDP hole punching is used (if your Meraki MX is behind an older “NAT-unfriendly” firewall, then we can use a technique called manual port forwarding to get around it). The MXs also use punch (or manual port forwarding) when it comes to tunnel establishment.

After Punch comes registration

The punch process is actually the “client” in a client-server relationship, with the server portion being the “Cisco Meraki VPN Registry.”  The VPN Registry is a service independent of the Meraki dashboard, used to register each MX’s public and interface IP addresses. The Registry then uses some simple logic to understand how to route between the various MXs in an organization (in order to create VPN tunnels). Namely:

  1. Check for match – If the MX’s public IP and the interface IP match, then the MX in question is directly connected to the internet on that WAN interface
  2. No Match – MX WAN circuits with different public IP addresses should route between those public IP addresses directly
  3. Route Initiated – If the two MX’s public IP addresses match, then the MXs in question are in the same private network. As such, they should route to one another via their interface IP addresses

The VPN registry then passes this information to the dashboard.

Then the (Meraki) magic

Not only does the dashboard now know how to route between all the MXs in the organization, it also knows how many WAN paths each MX has, as well as the desired VPN topology. All of this together means that the dashboard magically knows:

  • Who to build tunnels to and, more importantly, how to route
  • Which IP subnets are accessible via which remote MX
  • How to route to an indirectly connected (i.e., one without a direct tunnel) MX
  • That both sides of the communication are entirely trusted and authenticated, as they are both authenticated, authorized, and managed by the dashboard

The above traditionally took days or weeks of careful planning and the provisioning of static IP addresses, route-maps, and tunnel parameters. Then, this would have to be configured into all the routers that form part of the organization (usually outside of working hours), eating up time and money. Also, routers normally have to do a special secure handshake with one another to ensure that they are who they claim to be and that the medium over which they are communicating is insecure.  

The AutoVPN on the MX has two key benefits over the technologies traditionally used:

First, on the MX all of the above “magic” happens within the first 30 seconds of an MX powering up, or is there by default as both sides are managed “automagically.”

…but before continuing, we have a little myth-busting to do, as there is no such thing as a completely secure encryption algorithm, as Alan Turing and company at Bletchley Park proved. In order to stop people from seeing your information, you need to regularly change the keying material the encryption algorithm is using.

The only way to do this effectively is to continually update the keying material you use with your encryption algorithm to encode your information (text) into ciphertext. This means that periodically you should change the keying data on every router. This keying material should be unique on a per virtual path basis; you can understand this is a massive task fraught with many misconfiguration dangers.  

This is the primary reason a lot of organizations with such setups simply “set and forget” their configurations and don’t realize how dangerous this can be.

(Now back to our originally scheduled programming!)

Second, and by far the most important advantage of Meraki and the dashboard, is that all MXs regularly check-in for an updated configuration file. This way, the dashboard can automatically refresh such keying material succinctly, thus maintaining tunnel security effectively and effortlessly.

All you need to do now is sprinkle a little patented Meraki magic dust and you have an enterprise-class, industry-leading SD-WAN solution.

Conclusion

Meraki AutoVPN takes a traditionally complex technology and transforms it with 100% cloud-based technology to make it simply work. Oh, and it’s so easy to configure that even your salesperson can do it. It’s also the baseline for SD-WAN and being able to save your business a lot of money. If you want to learn more and get free Meraki kit, then sign up for one of our webinars or contact a Meraki sales rep for a demo and trial.

References

https://meraki.cisco.com/lib/pdf/meraki_whitepaper_autovpn.pdf
https://documentation.meraki.com/MX-Z/Site-to-site_VPN/Troubleshooting_VPN_Registration_for_Meraki_Auto_VPN
https://documentation.meraki.com/MX-Z/Site-to-site_VPN/Automatic_NAT_Traversal_for_IPsec_Tunneling_between_Cisco_Meraki_Peers

Posted in Company Blog | Comments Off on All About AutoVPN

The Next Big Thing In College Sports: Video Games

Your parents probably urged you not to spend all of your time playing video games or you likely limit the amount of time your kids can spend with a controller in hand. But what if I told you that kids nowadays get into college, even with a scholarship, for playing video games?

eSports has taken the college sports scene by a storm, with more and more colleges and universities offering eSports teams every year. The National Association of Collegiate Esports (NACE) was formed to support this growing program, and ESPN broadcasts video game competitions. Different video games have specific competitive seasons, making this an exciting year-round sport. Games include Dota 2, Counter-Strike, League of Legends, Halo, and many others. Believe it or not, more people watch eSports competitions in a year than the NBA finals.

Different capabilities are needed to support an eSports team than for a more traditional sport like baseball or football. Ditch the large stadiums and bleacher seats; complex computer labs are required to support the high-quality computers and accessories needed to play the games, with viewers tuning in online to watch the matches take place. To support this, a high-density, reliable, and secure network is necessary to ensure eSports games can go on without hitting the network client limit, experiencing bad latency issues, or having the network go down altogether. And a strong Internet connection is imperative to making sure eSports competitions can go on without a hitch.

The IT team at Illinois College knows this all too well. When deciding to launch their eSports program in the summer of 2017, they knew they needed a robust network to support a room full of gamers eager to win League of Legends championships. But first, they had to build a brand-new facility in the middle of campus, stocked with several computer and console gaming stations. Equipped with Cisco Meraki MR access points, MS switches, and MX security appliances, the Meraki Gaming Center was born. Students can now receive full-ride scholarships to join the Illinois College eSports team, a part of the school’s overall athletics program.  

Think you can go back to college for your Mario Kart skills? Probably not. But when incoming students start pressuring your college or university to provide an eSports team, will you have the network to support it?

Join us on Thursday, June 21st for a live webinar with Illinois College CIO and Assistant CIO, Marc Benner and Patrick Brown, to hear how they are supporting their eSports program with Meraki. They also have a full-stack Meraki solution that supports all students and teachers on-campus, complete with access points, switches, security appliances, security cameras, and endpoint management, for a robust network for all students. You will even see a live demo of their Meraki dashboard and have the opportunity to ask questions. Plus, eligible webinar attendees will receive a free access point, so you can test Meraki out for yourself! Register here.

Bringing the Meraki Magic to Cisco Live US 2018

The arrival of summer in the United States means a few things: sunny weather, celebrations of dads and grads, and Cisco Live US. The networking world is already abuzz about Cisco’s biggest event of the year, which for 2018 will focus on how technology leaders can digitally transform their organizations.

Meraki has been hard at work for the last few months on creating innovative new experiences for attendees at this year’s conference. Here’s a sneak peek at what we’ve got up our sleeves:

1. Digital Workplace

The centerpiece of Meraki’s presence at Cisco Live US 2018 is a brand new, experiential center called Digital Workplace. Rather than merely showing off our products at different booths, we decided to showcase our vision of the workplace of the future.

What does that mean? Of course, you’ll be able to interact with the latest and greatest Meraki gear, from our cloud-managed networking solutions to our new line of intelligent cameras. But more importantly, the Digital Workplace will let you see how all of Meraki’s solutions can create an environment where workplace management is drastically simplified and systems like lighting, heating, and security can be made more efficient based on network data.

For a preview of our approach to the Digital Workplace concept, check out this blog post.

2. Innovation Showcase: Unlocking Digital Innovations with Meraki

Always a popular draw, Todd Nightingale, SVP and GM of Meraki, will once again take the stage for a session at this year’s Innovation Showcase. We’ve been up to a lot recently, from launching MV12 to unveiling new products that make the network more intelligent and extensible. Todd will discuss how innovations like these will help IT admins everywhere build simple yet powerful solutions that can impact every aspect of the workplace for the better.

Todd will speak on Wednesday, June 13 at 4:30 PM. You won’t want to miss it!

3. DevNet Zone

For the third consecutive year, Meraki will be part of the DevNet Zone in the World of Solutions. Our Solutions Architecture team has created exciting solutions using Meraki’s cloud-based APIs. Take a look for yourself to find out what’s possible with APIs, from location-based services to asset tracking and more.

To get a free Meraki switch, complete our exclusive learning lab in the DevNet Zone at Cisco Live! Learn more here.

4. #MerakiMission

To make Cisco Live even more fun, we’re giving attendees opportunities to win awesome Meraki swag. #MerakiMission is a new experience that guides attendees through a series of challenges ranging from demos to fun selfies with the Meraki team. As a thank you for participating in #MerakiMission, we’re giving away some awesome, limited edition Meraki swag!

Learn more about #MerakiMission here.

Visit our new CLUS website for all the details. See you in Orlando!

Posted in Company Blog | Comments Off on Bringing the Meraki Magic to Cisco Live US 2018

Meraki and the GDPR

The growing prevalence of digital technology is rapidly transforming our lives for the better. Just think back over the innovations that have come along since the Internet took off in the 1990s. It’s hard to imagine what life was like before our modern-day conveniences came along: smartphones, online maps, on-demand services… the list goes on.

The advent of cloud technology has significantly enhanced the services we use, making our data available everywhere, and helping applications learn how to serve us better. Every smartphone user knows that the more information they’re prepared to share with their apps, the more useful those apps can become.

The flip side of welcoming all this technology into our lives is the growing body of information about us held on servers belonging to the companies we choose to communicate with. The depth of this information runs a wide gamut from simple web browsing data captured in a website cookie, to highly accurate and detailed location records gathered by apps on our mobile devices.

Overwhelmingly, this data collection is benign in nature, designed to enable tools — often free — that make our lives easier, incentivized by new business opportunities for a more targeted approach to marketing and advertising. Some users consider this a fair exchange while others are less comfortable. For all kinds of reasons, some individuals have strongly protested against data related to them being held by companies, particularly those offering social networking.

In Europe, specifically those countries who are members of the European Union, concerns over data held by third parties and how that data may be used have ultimately led to the General Data Protection Regulation (GDPR). This detailed document constitutes a comprehensive approach to data protection and sets out new mandatory requirements for organizations established in the EU, or that offer goods or services to people located in the EU, giving people present in the EU control over data that’s collected about them.

Like many cloud-based technology companies, Cisco Meraki uses a limited set of data to enable use of our services by our customers. For example, we’re able to monitor the use of different applications by end users, which helps IT admins configure their networks to work efficiently, and to plan for growth. Meraki access points collect anonymized data about the location of devices seen on the network in order to assist network or retail store planners with optimizing their environments. In every case, the goal is a better experience for both Meraki customers, as well as their own customers.

Starting today, May 25th 2018, Cisco Meraki is introducing tools that respect the spirit and intent of the GDPR, ensuring that for everyone affected by this regulation — both our customers and our customers’ customers — control over data is simplified, Meraki style. Please visit the new dedicated page we’ve created to learn more about the changes we’re introducing in connection with the GDPR. We’re listening on the Meraki Community: the perfect place to discuss this or any other topic relating to our work.

Posted in Company Blog | Comments Off on Meraki and the GDPR

Ensure you’re secure from VPNFilter

The newest blog post from the Cisco Talos intelligence team, one of the largest commercial threat intelligence teams in the world, highlights VPNFilter, the newest malware threat spreading across the Internet. This attack can lead to stolen website credentials, IoT device vulnerabilities, Internet connection cut-offs, and devices potentially rendered completely unusable.

At this point in time, no Meraki devices are known to be affected. Meraki and Talos are conducting ongoing investigations into this threat and its signatures. Meraki MX users who use the Advanced Security license have the capability to protect their network from security vulnerabilities such as VPNFilter.

MX Ensures Security

The Meraki MX makes it very easy to implement powerful Cisco security technologies like Snort and Advanced Malware Protection (AMP). In addition to AMP and Snort, Meraki MX allows for intuitive URL blocking, as well as Layer 3 firewall rules to ban nefarious IP addresses. These capabilities play an integral role in keeping networks safe from malware.

With Cisco Snort technologies enabled, the MX performs real-time traffic analysis and can generate alerts or take actions based on a constantly updated database of threat signatures. For example, Snort has already updated and pushed out rulesets to allow identification and prevention of VPNFilter malware for Meraki MX users who have IPS enabled. IPS rulesets are updated every 24 hours and pushed out to the MX, constantly keeping you safe from new threats. The Meraki cloud also delivers firmware, bug, and feature updates to the MX.

Example of Meraki MX blocking VPNFilter exploit with Intrusion Prevention

In addition to IDS/IPS, the MX’s integrated AMP technology can detect malware and block it from being downloaded on the network. AMP can also retroactively detect files that have been downloaded on the network that have malicious markers. VPNFilter is known to infect networks by downloading files to the network from specific URLs. Fortunately, Cisco AMP has already updated its malware database for file hashes associated with VPNFilter and pushed these updates over the cloud to Meraki MX users with AMP enabled. The Meraki MX is helping protect your network by delivering these technologies via the cloud directly to your doorstep.

Blocking Threats in 3 Steps with Meraki MX

As highlighted in the detailed post from Talos, action can be taken on a list of identified URLs, IP addresses, Snort signatures, and AMP file identifiers related to VPNFilter. All of these threats can be easily neutralized within the Meraki dashboard. To enable AMP, Snort, and URL blocking features on the MX, an Advanced Security license is required. The Layer 3 firewall rules are incorporated in both MX licenses (Enterprise License and the Advanced Security License).

Following Step 1 is most important, and only takes 15 seconds, while Steps 2 & 3 take less than one minute each. Being able to secure your network easily is the hallmark of Meraki MX.

1. Enabling AMP & Snort

Visit the Security appliance > Configure > Threat protection section. A few simple clicks allow you to enable AMP and set Snort IPS to ‘Prevention’ mode with the ‘Security’ ruleset.

2. URL Blocking

Go to Security appliance > Content filtering to block the URLs listed in the Cisco Talos blog post.

3. Blocking nefarious IP addresses

Under Security appliance > Firewall you have the ability to deny traffic to all known IP addresses associated with VPNFilter malware, as listed by Cisco Talos.

For more detailed information on VPNFilter, please refer to this post from Cisco Talos. We will continue to monitor the threat landscape and work with our Talos team to provide you updates on VPNFilter and other security vulnerabilities as they develop. To learn more about the many capabilities of the Meraki MX, including SD-WAN and Security, visit the Meraki website or sign up for one of our webinars.

Meraki Wireless Health now available!

In  January we announced an exciting new wireless assurance feature: Meraki Wireless Health. At its core, Wireless Health is a powerful heuristics engine that rapidly identifies anomalies impacting end users’ experience across every stage of client connectivity — association, authentication, IP addressing, and DNS availability — for rapid root cause analysis and response.

Using Wireless Health, an IT administrator can immediately see whether users are (or aren’t) able to successfully access the wireless network and can easily identify problematic access points, clients, and failing connection stages that are causing a poor end user experience.

Rapid root cause analysis through network-wide view of connectivity stages

Network-wide failures across each stage of client connectivity can be viewed, allowing rapid root cause identification of poor network performance.

 

This visibility across all access points (APs) in a given network is critical for rapidly identifying and fixing problems, and successful issue resolution means a successful end user experience. As more organizations look to their wireless infrastructure to glean insights and deliver differentiating services, they can ill afford lengthy, inopportune downtime or latency. 

It’s within this context that we’re thrilled to announce that Meraki Wireless Health is now available to all of our MR customers — at no additional cost or charge — as a generally available beta feature. To access Wireless Health, simply navigate to Wireless > Wireless health in the Meraki dashboard.

 

Wireless Health measures packet latency by traffic type, highlighting any performance degradation.

 

We’d also encourage you to take a quick peek at our live demo video for how to use this new feature or dive deep with our Wireless Health whitepaper.

As this is still a beta feature, we are especially keen to hear from you, our customers, on what additional functionality you’d like to see built into this tool, what’s working for you and what’s not, and what your overall experience has been like. If you use Wireless Health to solve a problem, we’d love to hear your story — we love hearing from you!

Posted in Company Blog | Comments Off on Meraki Wireless Health now available!

Más allá de Wi-Fi gratuito

Ya la fecha está muy cerca y se siente en todas partes la emoción del mundial. Este gran evento une a millones de personas alrededor del mundo, lo que resulta en usuarios conectados a internet compartiendo videos, imágenes y por supuesto consumiendo todo el ancho de banda disponible en la red. Es por esto que durante mayo y junio te estaremos compartiendo nuestras mejores prácticas para que estés listo, y así el mundial no se convierta en un dolor de cabeza.

                                                       Webinar especial para retail muy pronto..

 

 

 

Hoy en dia proporcionar Wi-Fi gratuito para invitados ya no es un beneficio; es un costo básico de hacer negocios. Los clientes esperan poder iniciar sesión en Wi-Fi gratuito dentro de las tiendas, estadios y restaurantes para navegar en sus teléfonos inteligentes y hacer videollamadas con sus amigos mientras ven el partido.

Aunque la mayoría de los comercios y espacios de entretenimiento ofrecen Wi-Fi gratuito a sus huéspedes, es posible que muchos no aprovechen esta infraestructura a su máximo potencial. Aprovechar la infraestructura inalámbrica para obtener más información sobre sus clientes, modernizar sus tiendas y brindar experiencias de primera clase a los clientes es algo que todo gerente de TI debe hacer.

1. Obtenga más información acerca de los clientes a través de análisis de ubicación

Hoy en día, casi todos los compradores llevan teléfonos inteligentes mientras pasean por comercios y espacios de entretenimiento. De hecho, en el informe Deliotte de 2017 se observó que el 93% de los propietarios de teléfonos inteligentes en los Estados Unidos usan su teléfono mientras salen de compras, cifra similar para mercados hispanos. Esta tecnología brinda a los clientes una capacidad sin precedentes para buscar cualquier cosa y comunicarse con cualquier persona. También puede ayudar a los minoristas con configuraciones inalámbricas avanzadas a rastrear cómo los clientes navegan dentro de una tienda, y utilizar este conocimiento para comercializar según sea necesario.

Cuando la radio Wi-Fi de un teléfono está encendida, envía sondas a los puntos de acceso inalámbrico. Esto sucede tanto si el teléfono está conectado a Wi-Fi como si no, ya que los teléfonos inteligentes buscan constantemente nuevas redes Wi-Fi para completar la lista de redes disponibles cercanas. Usando estas sondas como puntos de datos, los sistemas inalámbricos pueden triangular las ubicaciones de los compradores a pocos metros. Las balizas Bluetooth de baja energía (BLE), popularizadas como iBeacons por Apple, pueden llevar esto aún más lejos y rastrear a los compradores a pocos centímetros de sus ubicaciones. Por ejemplo, un minorista de mejoras para el hogar podría saber si un cliente está mirando lavabos o inodoros según su ubicación.

Los sistemas avanzados, como Cisco Meraki Location Analytics, pueden presentar esta información de ubicación precisa de varias maneras, beneficiando a los minoristas. Por ejemplo, los minoristas pueden usar los mapas de calor de ubicación para ver dónde están caminando sus clientes dentro de la tienda y organizar adecuadamente las pantallas o el personal de ciertas áreas según el compromiso actual del cliente. Obtenga más información sobre las posibilidades de Location Analytics al leer esta publicación de blog.

2. Apoyar una infraestructura más moderna

Una experiencia inalámbrica mejorada puede servir como catalizador para mayores actualizaciones de infraestructura que reducen los costos y mejoran la experiencia del cliente. Dos áreas de tecnología que han experimentado una rápida evolución en la última década, y que importan mucho en el espacio minorista, son las cámaras de seguridad y mPOS (punto de venta móvil). A propósito, tanto las cámaras IP como mPOS dependen de implementaciones inalámbricas robustas en la tienda.

Las cámaras de seguridad han pasado de grabar secuencias limitadas y granuladas a sistemas de gestión de video analógico para grabar videos de alta definición que se pueden transmitir en línea desde cualquier lugar. Como resultado de estos rápidos avances tecnológicos, los minoristas están adoptando cada vez más los modelos de cámara más nuevos, que vienen completamente equipados con conectividad inalámbrica, para monitorear la actividad en la tienda. Estas cámaras, a menudo implementadas en lugares donde los cables Ethernet no pueden alcanzar fácilmente, requieren una conexión de red inalámbrica para enviar video capturado al servidor.

Del mismo modo, la mayoría de los dispositivos mPOS de hoy no usan Ethernet para la conectividad, lo que requiere el uso de una red inalámbrica rápida para procesar y completar transacciones rápidamente. mPOS ha florecido recientemente en gran parte gracias a la explosión de teléfonos inteligentes: empresas como Square se han modernizado y, para algunos minoristas, han erradicado la necesidad de tener cajas registradoras tradicionales.

Los minoristas con redes inalámbricas actualizadas y completamente seguras están listas para admitir estas tecnologías en la mayor medida posible.

3. Habilite experiencias omnicanal excepcionales

Como Amazon ha sacudido el mundo minorista durante la última década, las experiencias de compra omnicanal – experiencias que son consistentes tanto si un comprador compra en la tienda como en línea – se han convertido en parte del espíritu de la vida minorista. Al llegar a una experiencia omnicanal integral, los minoristas deben recopilar y combinar información sobre los hábitos de compra en línea y en la tienda de los clientes.

Los minoristas con implementaciones inalámbricas robustas se encuentran en una posición privilegiada para construir un sistema sofisticado que los ayude a obtener más información sobre las actividades de compra de sus clientes. Once cuando un comprador inicia sesión en la red Wi-Fi de una tienda, se abren una gran cantidad de posibilidades, especialmente si ya son conocidas (para repetir el visitante) o su identidad se conoce gracias a la integración de una página emergente, como Facebook Login. A partir de ese momento, las actividades de los clientes que se integran con la red pueden ser rastreados y sus experiencias personalizadas.

Por ejemplo, cuando un comprador que compra un par de tacones en el sitio web de un minorista entra al pasillo de vestimenta de esa tienda, se le puede presentar un anuncio en su teléfono inteligente para un vestido que combine con los zapatos. Además, en función del ancho de banda de red consumido por diferentes terminales mPOS, las tiendas pueden determinar qué mostradores de pago son los menos o más populares y realizar los ajustes de personal en consecuencia. Las soluciones que incorporan API en la mezcla pueden llevar esto un paso más allá integrando la actividad en la red con programas de lealtad minorista o sistemas CRM. Las posibilidades son infinitas para los administradores de TI que buscan crear soluciones personalizadas que ayuden a los minoristas a garantizar experiencias de compra consistentes en todos los canales.

Simplifying Apple Device Management with Systems Manager

When Denis Guerrero joined Moreland School District as the Director of Technology, he knew it was time to find a better way to manage the school district’s 1,400 iPads. Throughout the district many iPads were locked, unusable, associated with different Apple IDs, and loaded with apps purchased through various gift cards, personal accounts, and vouchers. Managing this fleet of devices was becoming an impossible task and it was time to set some processes and tools in place for district-wide iPad visibility, app distribution, and device management.

After investigating different options, Denis and the team chose Cisco Meraki Systems Manager to accomplish these goals. To take full advantage of Systems Manager, the team worked to unify the district under one Device Enrollment Program (DEP) account with Apple, consolidate app license purchases, and register with Apple School Manager.

Systems Manager allows schools to easily provision Apple devices (out of the box) through DEP, install apps, apply custom configurations, and limit classroom distractions such as games and web surfing. Furthermore, schools and organizations can leverage Meraki’s free trial program for expert assistance throughout the trial process, access the open Community forum for peer insight and advice on the solution, and reference video and instructional content to help them get oriented in the dashboard.

Today students and teachers at Moreland School District can easily log into iPads, find the right apps, and start their digital lessons — without wasting instruction time on iPad lockouts or mitigating student access to distracting website and apps.

In an upcoming webinar on May 16th, 2018, Denis will share his favorite features and how Systems Manager helped his team streamline student learning throughout the district. Register now to learn more!

Smarter Cameras for Safer Schools: Exclusive Education Pricing for Meraki MV

Imagine managing your school’s security cameras from an intuitive, web-based dashboard with no NVR, no software downloads, and secure remote access to video footage from anywhere. Sound too good to be true?

Cisco Meraki MV security cameras are changing the way schools think about video surveillance. With Meraki MV, schools can keep students safer by proactively helping with threat detection and security and IT teams can make informed decisions with integrated analytics, which require no servers. MV is easy to deploy and manage, and specifically built with lean IT teams in mind. Here are five reasons why you should consider Meraki MV security cameras for your school or campus’ next deployment:

  • Simple Deployment: With zero-touch deployment, using just serial numbers an administrator can add devices to the Meraki dashboard and begin configuration before the hardware even arrives on campus. Ship cameras directly to each school site and have them up and running quickly.
  • No NVR: All of the video footage is locally stored and encrypted on the camera, removing the need for expensive and complicated NVRs or DVRs. This not only adds additional security, but allows for simple camera deployment and management. It also means districts can easily scale from one school deployment to 50, without breaking a sweat.
  • Web-Based Monitoring: Manage your security cameras from the same intuitive, web-based dashboard where you manage the rest of your Meraki products. MV removes the need for a security monitoring room or complex VPN configuration; all you need is a web-browser to watch and monitor video footage. Easily make custom video walls and find important events with Motion Search all from the dashboard. Plus, the dashboard cuts down on training time for the administrators and staff interfacing with the system.
  • Granular Access Controls: It’s not just the security guard who needs access anymore. From the principal or president down to the teacher or custodian, give different people customizable levels of access to all of the school’s cameras, or select cameras by tag, in just a few clicks.  
  • Built-in Analytics: MV goes beyond just security; it utilizes a powerful onboard processor to analyze video and provide valuable insights without the need to send those video files to the cloud or a local server. Easily see where students are congregating or walking with motion heat maps. Detect how many people are in a classroom or hallway with people detection.

Schools across the world are deploying Meraki MV to simplify security camera management and keep their students safer. At Reading School District, CR Hiestand and his team use the Motion Search tool to isolate incidents and find what they are looking for in under 20 minutes, rather than searching through hours of video footage. Plus, security guards, principals and school administrators can view footage from a tablet or PC, without having to go to the video monitoring room. At Sweet Briar College, Aaron Mahler has indoor and outdoor MV security cameras deployed across the campus to keep students safe, while providing network admins with an easy to manage solution through an intuitive web-based interface they can access from anywhere.

From May 9th until October 27th, 2018, Meraki is offering exclusive pricing for MV security cameras for education in the United States. Just contact your Meraki sales rep to get started!

To learn more about Meraki MV for Education, attend an upcoming live webinar.

For more information about Meraki MV, read our Meraki MV for K-12 Solution Guide or Meraki MV for Higher Education Solution Guide.