Centrally Managed from the Cloud
ATCOM has teamed up with Cisco Meraki to provide powerful and intuitive centralized management via the cloud, while eliminating the cost and complexity of traditional on-site wireless controllers. The Cisco Meraki cloud seamlessly manages campus-wide WiFi deployments and distributed multi-site networks with zero-touch access point provisioning, network-wide visibility and control, cloud-based RF optimization, seamless firmware updates and more. With an intuitive browser-based user interface, Meraki WLANs configure in minutes — not days or weeks — without training or dedicated staff.
Bring Your Own Device (BYOD)
Cisco Meraki is the first and only solution that provides everything you need for a secure, reliable, headache-free BYOD network — 100% integrated, without added cost or complexity.
Use integrated Layer 7 client fingerprinting to identify devices and measure their impact. Automatically apply device-specific policies to iOS devices, Androids, PCs, and more. Quickly and easily enable BYOD while maintaining a secure environment, for example by using NAC to require PCs to have antivirus software.
Cisco Meraki APs detect probing MAC addresses from associated and non-associated devices. Data is exported in real-time to the Cisco Meraki cloud, analyzed, and presented in the Meraki dashboard to show metrics such as user dwell time, repeat visits, and capture rate.
Presence can be used by retailers, hospitality, and enterprises to understand foot traffic and visitor behavior across sites, and optimize opening hours, marketing initiatives, and staffing policies.
The Presence API also allows retailers to integrate with CRM to drive in-store customer engagement via alerts to staff or the delivery of targeted customer offers.
Control Applications, Users and Devices
Cisco Meraki is the only wireless LAN to include Layer 7 fingerprinting and application QoS. Identify hundreds of applications, from business apps to BitTorrent and YouTube. Prioritize critical apps like VoIP, and limit or block wasteful bandwidth consumption such as P2P file sharing.
Apply policies by group or device type, automatically assigning VLAN tags, traffic shaping rules, bandwidth limits, and firewall policies to iPads and other device types. User fingerprinting with Google-like search allows administrators to easily identify and control individual users, iPads, Androids, and other devices.