Cisco Meraki Cloud Managed Wireless 2018-03-03T09:10:38+00:00

Cloud Managed Network

Cisco Meraki Cloud Managed Infrastructure

ATCOM has teamed up with Cisco Meraki to provide powerful and intuitive centralized management via the cloud, while eliminating the cost and complexity of traditional on-site wireless controllers. The Cisco Meraki cloud seamlessly manages campus-wide WiFi deployments and distributed multi-site networks with zero-touch access point provisioning, network-wide visibility and control, cloud-based RF optimization, seamless firmware updates and more. With an intuitive browser-based user interface, Meraki WLANs configure in minutes — not days or weeks — without training or dedicated staff.

Meraki Cloud-Management-Architecture

Bring Your Own Device (BYOD)

Cisco Meraki is the first and only solution that provides everything you need for a secure, reliable, headache-free BYOD network — 100% integrated, without added cost or complexity.

Use integrated Layer 7 client fingerprinting to identify devices and measure their impact. Automatically apply device-specific policies to iOS devices, Androids, PCs, and more. Quickly and easily enable BYOD while maintaining a secure environment, for example by using NAC to require PCs to have antivirus software.

Presence Analytics

Cisco Meraki APs detect probing MAC addresses from associated and non-associated devices. Data is exported in real-time to the Cisco Meraki cloud, analyzed, and presented in the Meraki dashboard to show metrics such as user dwell time, repeat visits, and capture rate.

Presence can be used by retailers, hospitality, and enterprises to understand foot traffic and visitor behavior across sites, and optimize opening hours, marketing initiatives, and staffing policies.

The Presence API also allows retailers to integrate with CRM to drive in-store customer engagement via alerts to staff or the delivery of targeted customer offers.

Control Applications, Users and Devices

Apply policies by group or device type, automatically assigning VLAN tags, traffic shaping rules, bandwidth limits, and firewall policies to iPads and other device types. User fingerprinting with Google-like search allows administrators to easily identify and control individual users, iPads, Androids, and other devices.

Low Key IT

Are you are ready to get back to doing what you do best and leave the IT drama behind?

Let’s Get Started