Security Edge Preferred is delivered as this type of service rather than installed software.
What is a cloud-based service?
Cisco Meraki devices are managed through this centralized interface.
What is the Meraki Cloud Dashboard?
This Meraki feature helps prioritize critical applications like VoIP or video conferencing.
What is traffic shaping?
Meraki devices are known for this “plug-and-play” style of deployment.
What is zero-touch provisioning?
Security Edge Preferred reduces risk by applying security policies to users instead of just devices.
What is user-based security?
This Meraki dashboard feature lets administrators see how much bandwidth each application uses.
What is application visibility?
Security Edge Preferred and Meraki both help protect against this method of stealing user credentials.
What is phishing?
This Meraki dashboard tool allows admins to see which applications are consuming the most bandwidth.
What is application analytics?
These type of attacks are blocked by Security Edge Preferred by preventing users from connecting to known bad sites.
What is phishing or malware-based attacks?
This security approach combines multiple protection functions like firewall, IDS/IPS, and content filtering into a single Meraki solution.
What is UTM (Unified Threat Management)?
This Meraki feature allows multiple WAN connections to be used for performance and resiliency.
What is SD-WAN?
Security Edge Preferred provides visibility into blocked threats using this type of reporting.
What are security reports / threat insights?
Security Edge Preferred is ideal for businesses that want advanced security without managing this on-site hardware.
What is a traditional firewall?
This Meraki security appliance model line combines firewall, SD-WAN, and advanced security.
What is the Meraki MX series?
This Meraki security capability inspects traffic for known attack patterns beyond basic firewall rules.
What is Intrusion Detection and Prevention (IDS/IPS)?
When a customer wants to reduce attack surface, this combined approach using Meraki and Security Edge is recommended.
What is defense in depth?