Security Edge Preferred
Cisco Meraki
Networking & Security Features
Deployment, Monitoring & Troubleshooting
1

Security Edge Preferred is delivered as this type of service rather than installed software.

What is a cloud-based service?

1

Cisco Meraki devices are managed through this centralized interface.

 What is the Meraki Cloud Dashboard?

1

This Meraki feature helps prioritize critical applications like VoIP or video conferencing.

What is traffic shaping?

1

 Meraki devices are known for this “plug-and-play” style of deployment.

What is zero-touch provisioning?

2

Security Edge Preferred reduces risk by applying security policies to users instead of just devices.

What is user-based security?

2

This Meraki dashboard feature lets administrators see how much bandwidth each application uses.

 What is application visibility?

2

 Security Edge Preferred and Meraki both help protect against this method of stealing user credentials.

What is phishing?

2

This Meraki dashboard tool allows admins to see which applications are consuming the most bandwidth.

What is application analytics?

3

These type of attacks are blocked by Security Edge Preferred by preventing users from connecting to known bad sites.

What is phishing or malware-based attacks?

3

This security approach combines multiple protection functions like firewall, IDS/IPS, and content filtering into a single Meraki solution.

What is UTM (Unified Threat Management)?

3

This Meraki feature allows multiple WAN connections to be used for performance and resiliency.

What is SD-WAN?

3

Security Edge Preferred provides visibility into blocked threats using this type of reporting.

What are security reports / threat insights?

4

Security Edge Preferred is ideal for businesses that want advanced security without managing this on-site hardware.

What is a traditional firewall?

4

This Meraki security appliance model line combines firewall, SD-WAN, and advanced security.

What is the Meraki MX series?

4

This Meraki security capability inspects traffic for known attack patterns beyond basic firewall rules.

What is Intrusion Detection and Prevention (IDS/IPS)?

4

When a customer wants to reduce attack surface, this combined approach using Meraki and Security Edge is recommended.

What is defense in depth?

M
e
n
u