Leader in cloud controlled WiFi, routing, and security. Secure and scalable.
Meraki / Cisco.
Every network is a potential target for malicious attack; Cisco Meraki MX Security Appliances provide best-in-class, easily configurable intrusion prevention to protect yours.
Best-in-class Sourcefire Engine
Every Cisco Meraki MX Security Appliance supports unparalleled threat prevention via the integrated Sourcefire Snort engine. Intrusion prevention (IPS) is performed via rulesets: pre-defined security policies that determine the level of protection needed. Sourcefire refreshes rulesets daily to ensure protection against the latest vulnerabilities—including exploits, viruses, rootkits, and more—and these are pushed via the cloud to MX customers within an hour—no manual staging or patching needed.
Easy Error-free Deployment
Human error can bedevil the best attempts to lock down a network if the security tool used is complex. Enabling and deploying IPS on the MX, however, takes mere seconds and involves only two dashboard clicks: enabling IPS, and selecting a Sourcefire ruleset (threat protection level) to enforce. Since vulnerability definitions are automatically pushed to the MX from the cloud, IT admins can enjoy up-to-date, market leading IPS with minimal effort.
Real-time Graphical Reporting
View IPS security reports from any Internet-accessible device in the Meraki dashboard. Data is presented in real time, allowing IT admins to quickly gauge current threat status—as well as view historical trends—for informed decision-making. Use built-in templates to filter data from the last hour, day, week, or month—or create a custom date range view. Granular, by-the-minute details are also available. View specifics about detected threats and learn about about remediation techniques by following links to CVE, TechNet, and other resources intelligently presented within the Meraki dashboard. Finally, choose to view security threats organization-wide, or drill down for detailed reports on specific networks.
Use reports to identify troublesome clients and applications, make informed firewall or traffic-shaping decisions, provide a security synopsis to management, and gauge overall vulnerability over time.