In these turbulent times, it has never been more important to help our customers provide simple, secure, and reliable internet access from anywhere. As working conditions have changed for many organizations, new solutions are needed to help our customers adapt and optimize their services.
In this two-day event, participants reviewed sample use cases in retail and hospitality, smart spaces, healthcare and manufacturing, and IT operations. Participants then submitted an app, API integration, or tool to help address these challenges. We were thrilled to see a variety of creative solutions across these industries and use cases!
This hackathon further demonstrates our platform strategy at Meraki: providing open and extensible API services that enable custom solutions and integrations to be built on top of Meraki technologies. From the developers using these services to build, to the customers adopting open source and turnkey solutions, we are thrilled to see the pace of innovation on the Meraki portfolio!
“The Meraki platform is agile and can be integrated into solutions much quicker and offers better insights than other networking providers in this space. The design and API access is accessible for networking novices, or even non-network people such as software developers.” – Insight
We’d like to congratulate the following winners across six unique categories:
This solution enabled contactless order pick up for restaurant patrons. Using the Meraki MV API and Purple Wi-Fi login screen (to capture personal details from drivers), the team built a dashboard that shows snapshots of vehicles in parking spaces and easily allows restaurant admins to assign orders to appropriate drivers. The solution also integrates with Webex Teams to provide notifications when parking spots are occupied, drivers are waiting, and when those spaces are then vacated (order was completed).
In the era of COVID-19, Impact has rolled out more Umbrella+Meraki networks than ever before to keep clients safe while working on their home networks (outside of the office firewall). Their submission to this hackathon was focused on answering the simple question, “Can I push our existing Cisco Meraki configuration (for blacklists, whitelists, filtered categories) to Cisco Umbrella?”
Using the Meraki API and Umbrella API, the team at Impact developed a solution to sync configurations between different Meraki networks in one organization, between different Meraki organizations, and between Meraki and Umbrella organizations.
COVID-19 has changed the retail space drastically, prompting the need to ensure the safety of employees and customers by tracking occupancy. A second team at NTT built this solution to allow clients to keep an accurate count of people entering and exiting their store/location and feed that information into a web UI. This UI shows the store’s capacity, current count of people, and customers waiting in line for service.
The solution also ties in with Webex Teams to notify employees as they approach, meet, or exceed capacity. On top of that, the team also developed a feature to allow customers to scan a QR code to put themselves into a queue if they prefer not to wait outside in a line.
The team at Insight focused on a problem that impacts every industry – how to safely reopen businesses. Their solution addresses what they see as the first step to reopening: providing screening and detection solutions for staff and guests. To meet this need, the team focused on hacking a solution for their Citizen Care Pods, which are portable virus testing centers to aid in detection and screening wherever you have a large group of people (ie: construction sites, retail, or entertainment venues).
The Citizen Care Pod is outfitted with a variety of Cisco Meraki technologies, including MV Cameras for people counting, networking gear to stay connected, and Webex Teams for private conversations about results. All of this technology is tracked through the Insight Connected Platform for easy management of the pod. Through this solution, admins can receive alerts if people are gathering at pod locations and easily communicate with onsite and relevant stakeholders to address the situation.
Malware and ransomware are becoming all too common. Left unchecked, these threats can devastate corporate networks. The team at WWT built this solution to easily integrate Cisco Stealthwatch for Meraki networks. This integration allows admins to identify where clients are, how badly they are infected, and quickly isolate them with Meraki MX or MR firewall rules. This powerful, “single button quarantine” of malicious clients automates the changing of VLANS and firewall rules to isolate infected devices from the rest of the network until a technician can be dispatched to resolve the situation.
Deploying sites rapidly and securely is a challenge for healthcare organizations. To address this, the team at CAE used the Meraki Dashboard API to create a single step deployment tool to set up an entire suite of Meraki solutions.
To kick off a Meraki deployment, the admin simply enters the hospital ID number and serial numbers of the Meraki devices into the app. From there, all of the configuration is completed automatically, including configuration of hostnames, network tags, IP schemas, VLAN assignment, switchport assignment, and more. This will save hours of configuration time and money!
Furthermore, this application integrates into the Webex Teams API to automatically create a new Space for the new Meraki network and adds in the on-demand CAE NOC (Network Operations Centre) support group. This will get new healthcare sites set up, running, and supported quicker than ever.
Congratulations to all of the winners above, and thank you to all participants for being a part of this special event. We were so encouraged by the rapid development, creativity, and positivity shown by all teams throughout this process. We can’t wait to see what our partners and customers come up with next!
Are you managing your team, a contact center, or office clients remotely? You’re not alone. Thousands of IT teams around the world deployed, shipped, and installed networks overnight, enabling hundreds to thousands of remote workers to work from home. Meraki has been working from home since March, including our customer support team. That is three months of 24/7 technical customer service for over 2.6 million active networks, supported completely from the homes of remote work employees. Ben Cho, Manager of the EMEA Support Center, knows how to manage a remote contact center and has talked to many IT teams worldwide in the past weeks. In this post, Ben shares his personal experience and biggest learnings from other companies.
When Ben first heard about the plan for Meraki to move the entire team to remote work in the beginning of March 2020, he didn’t know that three months later, his team would still not be back in the office. Ben manages a team of 75 support engineers at Meraki in London. Worldwide, 450 people work on this team and take care of Meraki 24/7 customer support in San Francisco, London, Sydney, Shanghai, and Tokyo. Different sub-departments correspond with customers via phone or email. The team is supported by a network of operations, internal software teams, and product specialists who work very closely with engineering. On a normal day, customer requests can vary from maintenance questions to project deployments or help with troubleshooting across all Meraki product lines.
In the early weeks of this year, that ‘normal’ IT world changed within a few days. Companies around the globe shut down on-site operations and services, and apart from essential workers, transitioned their entire workforce to working remotely. Ben’s team experienced a 200-300% increase in support inquiries regarding the Meraki teleworker solution, the MerakiZ3, and security-related questions. Some companies had not used teleworker solutions in such high volumes before and were new to setting up clients for secure networking. Oftentimes, they simply didn’t have a plan for a scenario like this. Many companies needed guidance to set up VPN or client VPN access.
“Some companies didn’t use VPN or client VPN connections that much in ‘normal times,’ therefore, many companies were not prepared for this scenario, didn’t have much experience with setting up VPNs, or hadn’t used it at all and gave us a call,” observed Ben.
At the same time, questions about optimizing security configurations moved to the top of companies’ priorities, regardless of how big their network was. Most of the cases could be solved in no time, thanks to the Meraki cloud solution, which is designed from the ground up for remote management. However, some long-term projects were paused and parked, as companies and organizations shifted their attention to fixing gaps in their IT infrastructure.
So, what was the experience of the Meraki support team, delivering customer service from home? When talking to Ben about his team and remote work, he exudes confidence, like a pilot who just navigated his airplane safely through a thunderstorm. Surprisingly, remote work caused no major disruptions to his team. Ben embraced the situation and saw the positive in it:
“Not everyone dislikes working from home, especially in IT. I’m an introvert at heart, so when someone tells me to sit behind the computer all day, the first thing I think is: that’s great,” says a smiling Ben.
There’s more to it, of course. The trick is, you need to have a plan, provide the right tools, and make sure everyone is on board. While more and more organizations look into expanding their remote work situation to a permanent policy, it’s important to get it right with a bit more planning time.
1. Make a plan
Ben’s team usually provides customer service from our office, in the heart of London. The global pandemic forced the team to work from home, but it’s not the first time: power outages, bush fires, or office building renovation work have required Meraki teams to work from home in the past. Cases like that are pretty rare, but they require disaster recovery plans that enable the team to flow into remote work easily and quickly. Meraki provides 24/7 customer support and needs to guarantee that teams are connected at all times. Our disaster recovery plan covers the most important elements and the steps each team should follow. In the world of technical support, that can start with regulations that require each team member to take their laptop home after work each day. It defines which IT equipment each team member needs in order to do their job properly. It doesn’t matter if your business wants to be prepared for uncertainty or starts to play with the idea of permanent remote work—a good plan is needed. Many companies didn’t have that plan at the start of the pandemic, but can learn from the past few months and get prepared with guidelines that cover many different unforeseeable scenarios.
2. The right tools for less disruption and better customer service
True customer service can be one of the most important experience points customers have with your brand or product, and should, therefore, always be a high priority. Especially in times of uncertainty, customers may need more or different support from a contact center. It is important to ensure your team is sensitive to these realities and equipped with the right tools. It’s best to avoid unnecessary disruption for your team where possible. A poor connection, background noise, or a delayed answer can damage your customer experience. Therefore:
The best remote work solution provides an in-office experience: provide noise cancelling earphones and standard IT equipment, like keyboards or another monitor.
Ensure your company has a good VPN infrastructure so your staff can access all company resources or sensitive data securely remotely. That may mean a hardware VPN for certain professionals that requires added security and functional benefits over software VPNs.
If the team you manage needs telephony access, consider software-based telephony. “All calls are routed via VPN so you don’t need to worry about ISPs or landlines,” says Ben.
In the IT world, many teams work with physicallabs so they can simulate their customers’ scenarios in real time. “We made sure to set up our lab to be accessible remotely and equipped our team with test devices to use at home to play around with for different scenarios,” shares Ben. Providing these tools protects you from having to troubleshoot the troubleshooting.
Do you have a team that works with company-owned devices? Make sure that hardware is updated and ready to use. Ideally, you use mobile device management software to identify what it’s running or access the device by remote desktop to troubleshoot remotely.
Sometimes troubleshooting goes beyond the access to physical hardware or management tools. Your team may want to reach out to a colleague to get advice or simply get a second opinion on a case. In the office, your subject matter expert or manager may sit just a few steps away. Working remotely, conversations like that still need to be enabled in real-time by chat applications. Don’t forget to train your team on a communication policy and provide collaboration tools that allow them to engage and communicate, even when the customer is on the line.
3. Everybody in
Only happy teams that are fully brought into their team’s vision can function well in unusual work environments. Ben has worked with his team on plans that allow them to swap shifts flexibly when needed. “Sometimes your team needs flexibility. Unexpected issues can come up.” Personal relationships and trust in each other plays a big role. Ben made some changes to accommodate personal challenges for parents or tricky apartment share environments, and staffed around that. The team continues to communicate often to be flexible in emergencies and cover for each other.
All in all, remote work comes with many benefits, including more flexibility and less commute and transport time for employees. At the same time, it allows companies to source from a broader and more diverse workforce, without geographic boundaries.
“This experience has definitely opened my eyes to the viability of a permanent remote workforce; some people do want this as part of their work-life balance,” says Ben.
Having a plan, the right tools, and enabling a motivated team can help you navigate towards a permanent remote work policy. However, it is important to find the right balance and ensure there are still opportunities to maintain team spirit and company culture, especially for people who didn’t have the opportunity to build relationships with colleagues in real life.
In response to the COVID-19 pandemic, many organizations around the globe rapidly took health and safety precautions by supporting a remote workforce. Over the last several months, the conversation around moving towards a remote workforce more permanently, beyond COVID-19, has been considered by some organizations. Gartner’s recent CFO study revealed that 74% of those surveyed will move at least 5% of their previously on-site workforce to permanently remote positions post-COVID-19 . While it is imperative to adapt to these current trends of remote work, protecting against cyberattacks is more important than ever. Here are three security trends IT teams should be aware of when it comes to security threats in a remote workforce.
Connecting the workforce securely
Being able to stay connected at all times from anywhere in the world is a necessity now that organizations operate with and support a remote workforce. Organizations don’t always have a way to gather live reporting on security events or have solutions that can aid in active management and protection of their users, devices, and applications. With the use of a VPN, employees can securely connect to their office’s network regardless of where they’re located. However, VPNs are highly vulnerable to cyber threats. In an evaluation of VPNs, Forbes concluded that “18% of the VPNs tested contained potential malware or viruses, 85% featured excessive permission or functions that could put a user’s privacy at risk, and 25% exposed a user’s traffic to leaks” . It is essential that IT teams have a way to monitor all security events while also having remediation processes in place if a threat does occur.
Protecting against increased security vulnerabilities
With a physically scattered workforce, online attackers have more opportunities to invade and harm an organization’s users and internal network. Cyber attackers are taking advantage of the COVID-19 crisis and have found new ways of infiltrating an entity’s infrastructure. As a result of the remote workforce, there has been an increase in email and voice traffic. According to Netscout, there was an instant 25% to 35% increase in internet traffic since the start of COVID-19 . With this in mind, cyber attackers are using creatively titled COVID-19 emails that seem to be coming from legitimate health sources or pandemic reports. Similarly, voice and SMS phishing attacks are also on the rise as remote workers use personal devices to hold conference calls or confirm multifactor authentication. It is a natural tendency for users to open an email or accept a call or text that seems harmless because indications of dangerous content are not obvious. Additionally, some IT teams may not have the resources or established processes to combat these challenges at the scale currently seen.
Safeguarding business applications and sensitive data
Currently, there is an increase in dependency on remote work applications and services. Traffic from communication and collaboration applications like Office 365, WebEx, Zoom, and Slack (just to name a few) has skyrocketed. This leaves an organization’s assets to be more vulnerable. This also means there are more ways for cybercriminals to attack and jeopardize sensitive data, such as credit card data for financial institutions or patient information for healthcare entities. As evidence, T-Mobile took the action of moving 12,000 call-center employees to a remote work set-up. Employers like T-Mobile worked hard to ensure their call-center workers were provided with the relevant tools to provide their customers with the same level of service while working remotely. Many organizations’ trustworthiness and success rely on being compliant with standard regulations like HIPAA or PCI, and so it is no surprise that security is in need of immediate attention. It is therefore imperative that organizations implement more security solutions to protect all applications used to process customer transactions, such as billing and returns, which now happens in the homes of remote employees.
With remote work, employees are now working from anywhere in the world, and IT teams face a greater security challenge to protect and keep their users, infrastructure, and customer data safe from malicious threats. Everyone expects to stay connected at all times, and have secure access to services and tools in order to be productive and successful while working remotely. Behind the scenes, IT teams have the challenge of ensuring security at every point in the network and with every customer interaction. Being cognizant of where potential threats could be coming from is the first step to a more secure remote work environment.
To learn more about how you can manage security vulnerabilities and explore solutions, visit our remote work page for additional resources.
In 2001, I started a job as a systems engineer at a small technology startup based in Santa Barbara, CA. It was the first time in my relatively young career that I would be expected to travel regularly, and work—when not traveling—from a small home office in Denver, CO. Little did I know that this would mark the beginning of a 19-year journey that would put me in a position to fully appreciate the differences between remote work and work from home.
As we all know, there are countless benefits to working in a centralized office environment. Over the years, me and many of my ‘work-from-home’ colleagues would regularly drop in at corporate offices to maintain relationships, tap into office culture, and engage in necessary company activities. But the recent global pandemic has vividly illustrated that working from home is not the same thing as remote work.
Yes, it’s a nuance that requires a bit of explanation. As I’ve shared, working from home is something I’ve been doing for 19 years, but it was only recently, in the last three years, that I’ve begun a transition to remote work. My transition started with the personal preference of working on Apple products, and my employer providing security for devices like personal laptops, tablets, and smartphones. It is this focus on device security from IT leaders that shows the gaps in typical work-from-home situations.
The home is assumed to be a predictable environment that is free from typical issues found in open, shared environments like airports, retail shops, and office environments. Homes often have relatively small numbers of devices attached to wired and wireless networks competing for bandwidth on a consumer-grade, best-effort connection. In fact, home Wi-Fi devices are typically designed for rapid set-up, enabling consumers to easily connect devices and stream content, like Netflix eliminating the complex configuration of device or network security to protect against cyber criminals. What might be most unique about home environments is that it’s typically assumed those devices and content are to be trusted. Evidence? When was the last time you updated your home Wi-Fi password or malware protection application? Enterprises run regular updates—sometimes daily—to security and management policies.
The traditional enterprise office is much more complex, with literally hundreds or thousands of employees, devices, and shared productivity tools (printers, IP phones, etc.) competing for airtime. But what truly makes the two environments different is the IT decision maker’s focus on security, application-level performance, and predictable connectivity.
To give you a sense of what motivates an IT planner’s thinking, consider the following in reference to small- and medium-sized businesses. According to Safety Detectives, over 60% of cyber attacks target small businesses (<1,000 employees), and when they do get attacked, 61% are out of business within six months. How’s that for motivation? Before the global pandemic, <5% of the U.S. workforce worked from home regularly. Arguably, one of the many reasons is because CIOs and IT managers believe they can administer and enforce device and network security policies easier in a traditional office environment.
Conventional wisdom says it is easier to manage one environment of 1,000 employees, their devices, security, and performance needs than it is to manage 1,000 remote work environments. But it doesn’t have to be that way. In fact, cloud IT technologies and the Meraki way of simplifying connectivity, security, device, and application performance management, makes scaling remote work possible for any number of work environments, irrespective of whether employees are in conventional offices or remote locations, even if that happens to be someone’s home.
Browse the Meraki Remote Work web page and you’ll learn why remote work solutions provide greater business application performance, enterprise class security, mobility, device management, and reliable, assured connectivity that is not possible in typical work-from-home environments.
Organizations are preparing for a digital future faster than ever before. More than half a million customers, including a majority of the Fortune 100, have now modernized their networks with Cisco Meraki. Cloud-management has created a fundamental shift away from on-site controllers, time-consuming troubleshooting, and complex security to a model that can be operated 100% remotely. To help organizations on this journey, we are doubling the size of our Wi-Fi CERTIFIED 6™ family by releasing three new Wi-Fi 6 access points, adding enhanced troubleshooting capabilities, and additional security features.
The new Meraki Wi-Fi 6 Family
New Wi-Fi 6 access points
Organizations are experiencing increases in the use of bandwidth-hungry mobile video conferencing, Wi-Fi calling, and mobile device use. Wi-Fi 6 helps to deliver these mobile experiences seamlessly, and now Meraki can deliver Wi-Fi 6 both indoors and outdoors.
We are happy to announce three new Wi-Fi CERTIFIED 6™ ruggedized and external antenna access points to deliver the newest Wi-Fi 6 standard to outdoor areas, and focused coverage areas. The MR46E, MR76, and MR86 join the MR36, MR46, and MR56 to offer screaming fast, high-performance Wi-Fi 6 everywhere.
MR46E, MR76, and MR86 Highlights
All three models are Wi-Fi CERTIFIED 6™, supporting high-density features such as MU-MIMO, OFDMA, and power saving features such as target wake time (TWT). They all feature a quad-radio architecture with 2.4 GHz, 5GHz, security scanning, and IoT radios.
MR86 is an IP67 rated, rugged 4×4:4 Multigigabit access point, with a 3.5 Gbps max data rate for high-density outdoor environments
MR76 is an IP67 rated, rugged outdoor 2×2:2 access point with 1.7 Gbps max data rate
The MR46E is a 4×4:4 Multigigabit access point, 3.5 Gbps max data rate, with automatically-detectable external antennas. MR46E can re-use the same external antennas as MR53E.
The new outdoor access points enable organizations to extend Wi-Fi beyond current dense indoor areas. Retail shops or schools may be wanting to offer more Wi-Fi outdoors to accommodate social distancing. MR46E is able to offer focused wireless coverage, using directional antennas, for warehouses or manufacturing plants with high ceilings, or hospitals and schools with long hallways.
Simplifying wireless troubleshooting
As discussed in a recent blog post, Meraki dramatically simplifies the ability to troubleshoot a network from end-to-end. We are now excited to release deeper insights and analytics into wireless performance metrics. With historical color-coded performance metrics for signal quality and wireless latency, identifying and correlating problems has never been easier.
Want to know how your CEO’s Wi-Fi was performing today, yesterday, or even weeks ago? Want to know the impact a configuration change had on wireless latency or signal quality at one of your remote locations? It’s now all at your fingertips with expanded Meraki Health statistics.
Client Health Signal Quality
By deliveringCisco security technologies from the cloud, Meraki helps organizations get back to what they do best. The newest wireless firmware release includes security capabilities to help secure their networks.
Adaptive Policy is now available on Wi-Fi 5 and Wi-Fi 6 access points, to help simplify policy administration using SGTs (Secure Group Tags). Profiling users, devices, services, and setting time of access has never been easier.
Identity PSK is now available without the need for a RADIUS server. IoT devices can be authenticated using the Meraki cloud.
WPA3 is now available across Wi-Fi 5 and Wi-Fi 6 access points, which enables higher levels of encryption and more robust password-based authentication. This will be a welcome upgrade for organizations with sensitive data such as financial services and healthcare organizations.
New firmware upgrade option
To help simplify firmware upgrades, Meraki has released a new upgrade strategy to minimize client downtime. The network never has to go offline during a firmware upgrade, minimizing impact on end-users and devices are minimized during the upgrade. This new upgrade strategy option helps minimize disruption to mission critical wireless networks such as manufacturing, healthcare, warehouses, and airports.
One of the fundamental tenets of a cloud offering is the ability to access the cloud from anywhere, at any time. When you put network management in the cloud, like Meraki has, the benefits of “anywhere, anytime” become even more apparent. From deploying new gear, to troubleshooting an offline MX Security Appliance, to applying group policies – being able to solve problems on the network anywhere, anytime has helped our customers respond quicker, and be more effective at their jobs. Enabling remote admins has been especially critical as we navigate through these difficult times!
But there’s been a catch: while you can manage Meraki from anywhere, your choices have been to use your laptop/desktop, or to access the dashboard from a mobile browser (or a previous version of our initial, more limited Meraki app). Most prefer to dive into the dashboard from a fullscreen, high resolution, computer or laptop experience. However, we’ve pulled the dataand we see about 200,000 page views coming from mobile devices per week. This tells us that at some point, you’re likely to pull out your phone to try to fix or check something on the network. We believe you deserve a best in class mobile experience for that!
We are really excited for folks to try these new features and experience, including:
A complete UX / navigation redesign
Biometric authentication (Face ID, Touch ID)
Easily update switch port configurations
Call for Feedback
We’re looking for feedback on the updated experience and ideas for future features. If you have a specific use case you are hoping to be able to handle from your mobile device, or a feature that’s missing that would unlock a new workflow for you, let us know!
Please submit a wish from directly in the app via Settings > Make a wish. We really do read each and every one!
Whether you’re working from home, or the office, the use of Wi-Fi continues to expand. Internet traffic is rising, with 50% increases seen in global regions, cities, as well as 228% growth of VoIP and video use, with much of that traffic going over Wi-Fi. Our connected world and economy is clearly relying heavily on Wi-Fi technology. Prior to the coronavirus pandemic, Wi-Fi was already becoming bogged-down with the increase of mobile devices, IoT, new applications like 4K video and VR/AR. Wi-Fi 6 was released to help satisfy the needs of the hungry Wi-Fi ecosystem, but the growth of wireless always continues to outpace whatever is capacity gains are invented.
Source: Cisco Annual Internet Report, 2018–2023
Thank you to the FCC
Today, on April 23rd, the FCC Commission voted to approve 1,200MHz of additional spectrum to Wi-Fi. The information superhighway is getting supercharged with a whole host of additional high-speed lanes. As Ajit Pai, Chairman of the FCC, mentions:
“[The 6GHz band] would effectively increase the amount of spectrum available for Wi-Fi almost by a factor of five”
With these new approvals, Cisco Meraki is excited to help build the internet of the future. In fact, when I was interviewing for the role that I currently hold, our SVP & GM Todd Nightingale asked me what got me excited about Wi-Fi. I told him: ‘6 Ghz’. This was back in Nov 2018 and Ajit Pai had just announced his commitment to 6GHz. Fast forward and here we are, it is real!
Wi-Fi 6’s growth into the 6 GHz spectrum is a game-changer for two reasons – the availability of the additional channels and the ability to finally use 160Mhz for high bandwidth applications like AR and VR. 6GHz provides enormous opportunities to build new applications and experiences for both consumers and businesses.
In addition to new applications, newly available channels will translate to less RF issues and simplicity of maintenance. At Meraki, we look forward to supporting networks as they see significant increases in IoT, wearables, industrial sensors, 4K/8K video, critical telehealth, and remote learning in the coming years.
For more information about our Wi-Fi CERTIFIED 6™ access points, read more here.
To say that times are challenging hardly captures the severity of circumstances many are facing today. First and foremost, we want to express our deepest gratitude to healthcare providers, essential workers, and the IT staff who are laboring tirelessly to ensure that hospitals, businesses, and educators continue to operate and connect in ways that keep our modern life moored.
If you manage (or partner with) IT at a healthcare facility, you’re probably facing acute challenges: you are being asked to rapidly deploy tens or hundreds of COVID-19 testing sites, triage centers, and field hospitals in unconventional locations that may not even be equipped for Wi-Fi. Many are overseeing an unprecedented, wide scale telemedicine rollout so that doctors and nurses can deliver care from their homes. There may also be uncharted ways in which you are trying to use technology to reduce staff exposure to infection, as well as preserve personal protective equipment (PPE) for front-line staff.
Cisco Meraki wants to help. Here’s how we can:
90-Day Free Trials for all Healthcare Customers and Next-Day Delivery
In an effort to help our global community respond to this pandemic, we are offering 90-day free trials of up to 20 pieces of Meraki equipment to healthcare organizations. This is a global offer, and we hope that getting our gear where it’s needed most with minimal red tape will provide some relief and significant time savings.
For healthcare organizations in the United States, we can also provide next-day delivery for in-stock gear. This rapid fulfillment can mean the difference between successfully managing an emergency expansion of medical services and missing a critical time window to prevent bottlenecks and delays.
Rapid deployment of testing sites, field hospitals, and triage centers.
If you are trying to get one, ten, hundreds, or even thousands of remote sites securely online in minutes, our MX Security & SD-WAN Appliances can help. Using a feature called configuration templates, the time it takes to configure one MX appliance is nearly the same as the time needed to configure one thousand. This means you can deploy and configure network and security settings for thousands of remote sites with minimal effort or time spent.
Deploying thousands of MX Appliances is simple using configuration templates.
Our MX Appliances can also deliver:
Zero-touch provisioning out of the box, meaning the gear can be remotely pre-configured through your dashboard before ever arriving onsite
Comprehensive, enterprise-grade security
Failover links (including cellular LTE), to maximize uptime in locations experiencing spotty wired connectivity
Secure VPN to extend resources from permanent to temporary locations in only 3 clicks
Integrated Wi-Fi, which allows remote staff to connect to the same wireless network using the same authentication they’re accustomed to at permanent locations
All of this means you can have a single-box solution for Wi-Fi, security, and secure tunneling back to campus hospitals or main offices. Meraki gear can be brought online in minutes, with minimal staff who do not need any formal training — they only need access to power and Ethernet.
If you need to support more than 50 wireless clients, our auto-meshing MR Access Points (APs) can work with our MX Appliances. And to ensure availability in the absence of a wired uplink, our MG Cellular Gateways seamlessly transpose a wireless cellular signal to wired Ethernet for primary or failover connectivity. This means you can maintain a connection to the internet anywhere there is a cellular signal, so long as your Meraki equipment can connect to power.
Wide scale delivery of telemedicine
Allowing doctors and nurses to securely conduct virtual appointments — possibly from their homes — is another key challenge that IT teams are being asked to solve. Once again, Meraki MX Appliances can be drafted for duty here, as well as their more compact cousins: the Z3 and Z3C teleworker appliances. The Z3 and Z3C are designed for home office use, and are also configurable at scale in only a few steps using our configuration template feature.
Our Z3 and Z3Cs are also notable because:
Zero onsite IT support is required to bring these devices online — someone simply needs to plug them in and they’ll automatically come online
The same easy, intuitive VPN found in our MX Appliances can be leveraged to establish secure remote connectivity to patient health records and other hospital resources
With integrated wireless, these devices enable telemedics to connect to their organization’s Wi-Fi networks using the same authentication they are accustomed to in their hospital or clinic settings
They allow plug-in accessories, such as VoIP telephones often used in hospitals, to extend home office functionality
Proactive monitoring and prioritization of critical applications, like videoconferencing, can easily be configured to help ensure quality of service
Remote Visual Patient Monitoring with MV Smart Cameras
Technology is being deployed in new, sometimes uncharted ways to support efforts to reduce staff exposure to infection and to preserve protective equipment like masks. Meraki MV Smart Cameras offer a scalable, remote visual patient monitoring solutionthat enables clinicians to continuously monitor up to 16 patients at a time on one video wall. This helps scale resources, and protects staff, without sacrificing patient care. Reducing the number of in-person, patient room entries by nurses also preserves critical PPE. Secure and simple to deploy, Meraki Smart Cameras can be installed in minutes with no additional infrastructure needed beyond the camera. A wireless deployment option eliminates the need to run Ethernet cabling, and two-way communication can be added when coupled with a Cisco collaboration solution, like an IP phone.
Meraki MV Smart Camera video walls are highly customizable and allow continuous monitoring.
How to reach us
These are only a few examples of how Meraki can assist with today’s challenging healthcare scenarios. We want to help you enable your organization to focus on delivering the highest level of care and treatment possible to those in need. Please check out our 45-minute Healthcare webinar to learn more about our special offers for healthcare customers and how we can provide support for these challenging scenarios. Or contact us if you have immediate deployment needs—we’re here to help.
Yes, you read that correctly. MV smart cameras now support RTSP. RTSP (Real Time Streaming Protocol) is a protocol that allows a third party system to access the video stream directly from the camera. Now, you may be thinking, “But why? MV smart cameras already have so many great features that make it easy for me to do what I need to do!” If you are, thank you! We think you’re right.
A Focus on Solving Business Problems
Almost three years ago, we published a blog post called “APIs for Meraki MV Cameras” in response to the many requests for camera APIs. An overwhelming number were driven not by a desire for APIs, but by the need to solve a business problem. These needs fell into a few categories:
Off camera storage for longer retention or offsite backup
Integration to provide context into business systems, or other physical security solutions
In the months following, we released new functionality that addresses many of these needs without sacrificing simplicity, or ease of use. To meet the need for longer retention or offsite backup, we introduced Cloud Archive with simple, one-click provisioning. The Snapshot and Video Link APIs let customers easily integrate into access control systems like Kisi, shown below, or point of sale platforms to provide visual context to events.
The Snapshot API helps integrate MV Smart Cameras with Kisi Access Control.
The third category, analytics, is one of the most exciting areas of video. Analytics provide insight into processes and help organizations better understand what is happening within their space. MV cameras have always analyzed motion, and this was the basis of our first analytics, motion heatmaps. The second generation of cameras introduced machine learning based computer vision for object detection, specifically for detection of people and vehicles.
This was followed by the launch of the MV Sense API, which provides access to all this detection data in real time. When these various MV APIs are combined, it enables custom or advanced analytics capabilities that range from other types of object detection, to text recognition, and sentiment analysis (emotions or demographics).
Person Detection on MV Smart Cameras
The Best of Both Worlds
By building solutions to solve customer problems, and keeping video within the Meraki ecosystem, we are helping to ensure they are not held back by their video data. It means that users do not have to watch countless hours of footage to investigate an incident, or need to be data scientists to gain insight from video analytics. While we have come a long way since launch, there are a few unique use cases that call for solutions outside of the Meraki ecosystem.
An example of this are customers with large-scale deployments of legacy cameras. Previously, these customers would have no choice but to operate two viewing systems (a legacy VMS and the Meraki dashboard) in tandem as they worked to replace their old cameras with Meraki cameras. Now, RTSP lets them view video from Meraki MV cameras in their old VMS platform until all legacy cameras are replaced, and they can switch over to viewing everything in the Meraki dashboard. Another example is a public viewing monitor, or PVM, placed at a store entrance. With a PVM, there is no need to interact with the video in any manner other than static, live viewing, and RTSP fills this need.
Enabling RTSP on a Meraki MV Smart Camera
Finally, RTSP will enable access to the video stream for particularly niche analytics that simply cannot be met using the MV Sense and Snapshot APIs. This could be an organization with an existing analytics solution that relies on a traditional camera architecture.
By enabling access to RTSP, MV smart cameras are now available to customers who previously had no path forward with MV. These customers can benefit from the core value of MV smart cameras – simple architecture and cloud management through the Meraki dashboard – and use RTSP when needed to meet their other needs.
What Do You Think About RTSP?
RTSP is available now, for all second generation MV smart cameras (models ending in 2). For more information on how it works, check out the documentation. Or, head on over to the Meraki Community to join the discussion. We’d love to hear your thoughts on RTSP, and if it may be beneficial to your use case. Let us know what you think!
As we enter the middle of 2020, the year is shaping up to be an interesting one for Wi-Fi. With the explosion in remote work, we have seen increases in both video collaboration and Wi-Fi calling. On April 1st, AT&T saw an increase of 105% above average Wi-Fi calling. WPA3, the next generation of Wi-Fi security, is rolling out to deliver better encryption for sensitive data. Wi-Fi 6 continues to proliferate as new Wi-Fi 6 clients, such as the 2020 iPad Pro, enter the market.
To take full advantage of the new Wi-Fi trends and new clients in 2020, a Wi-Fi 6 network infrastructure needs to be in place. Deploying Wi-Fi 6 access points will ensure 802.11ax clients experience high-quality and low-latency performance.
Official Wi-Fi 6 certification
The MR36, MR46, and MR56 have now received official certification status for Wi-Fi 6 from the Wi-Fi Alliance.
Whether you are on a call or video conference, Wi-Fi 6 can help enable high levels of efficiency and low latency. OFDMA and MU-MIMO in both the uplink and downlink direction help support a multitude of devices with up to 75% lower latency. While working from home over a secure Meraki Wi-Fi 6 access point, you can experience seamless video conferencing or VoIP calls, while your family watches Netflix in the next room. Hospitals and financial services organizations can offer critical connectivity while supporting the highest security standards, with WPA3.
To hear more about recent Meraki Wi-Fi updates, listen in to episode 22 of Meraki Unboxed, which discusses:
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.