Meraki Releases Cloud-managed Router, Introduces NaaS Program

Meraki Releases Cloud-managed Router

San Francisco-based cloud networking company Meraki unveils the Meraki MX series cloud-managed routers, the company said in a press release. The new models MX50 and MX70 feature cloud-based centralized management, a firewall, internet gateway service, and application traffic shaping. The new routers are a step forward toward an easy-to-use cloud-based environment providing an intuitive browser-based user interface, which does not require trained specialists to operate the system The MX series is designed to offer automatic security, signature and feature upgrades as well as network-wide monitoring.

The key features of the MX series include cloud-based centralized management, layer 7 application firewall and traffic shaper, site to site VPN, routing, DHCP, and a firewall. Additionally, the new hardware devices are able to automatically detect and monitor printers while tracking and showing printer ink levels across remote divisions. At present, Meraki’s cloud management system is implemented in over 17,000 networks worldwide and the new devices are based on the same system. Therefore, MX series routers can be installed in single standalone networks and in large distributed networks alike.

The MX series comes in two editions: Enterprise Edition and Advanced Security Edition. The first one provides cloud-based centralized management, routing, and application traffic shaping. The Advanced SecurityEdition provides additional functionality like site-to-site VPN and next-generation firewall capabilities.

Meanwhile, the company announced the introduction of Networking as a Service, a new pricing model for cloud-managed network infrastructure products. The company offers the NaaS pricing model for all its wired and wireless products.

“Meraki’s Networking as a Service program provides a cost-effective and convenient way for organizations to obtain a Meraki system on a ‘pay as you go’ model. Networking as a Service eliminates upfront capital expense, gives you the option to upgrade your hardware for no cost at any time, and removes the financial risk of owning too much infrastructure,” Hans Robertson, VP of Product Management and Co-Founder at Meraki, said in a company press release.

The MX series routers are also available via Meraki’s new NaaS program, and customers can purchase devices through an annual subscription. The company claims that the all-inclusive price includes the cost of the hardware, software licenses, ongoing, upgrades, maintenance, and support provided by Meraki.

Inevitably, the news will boost company’s financial performance although Meraki boasts partial funding by Google and Sequoia Capital. In January 2008, the company received  USD 20 million in series B funding. Other investors in Meraki, include DAG Ventures and Northgate Capital.

Meraki started as an MIT research project in 2006 and relocated to California once the project turned commercial. Its core business is related to providing wireless networks controlled in the cloud and has 17,000 networks deployed worldwide, according to Meraki. The company offers various products including its flagship Enterprise Cloud Controller, a product allowing wireless access to corporate LAN for offices, industrial firms, retailers, educational institutions, and multi-site locations.

By Kiril Kirilov

Sorry, comments are closed for this post.

Comic
The Lighter Side Of The Cloud – Data Merge

The Lighter Side Of The Cloud – Data Merge

By Christian Mirra Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

The Rise Of Threat Intelligence Sharing

The Rise Of Threat Intelligence Sharing

Threat Intelligence Sharing  Security has been discussed often on CloudTweaks and for good reason. It is one of the most sought after topics of information in the technology industry.  It is virtually impossible to wake up and not read a headline that involves the words “Breached, Hacked, Compromised or Extorted (Ransomware)“. Included (below) is an…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Higher Education Institutions Increasing Cloud Use In Next 5 Years

Higher Education Institutions Increasing Cloud Use In Next 5 Years

Cloud Computing Advancing Edtech In a new research study by ResearchMoz it’s predicted that the global cloud computing market in higher education will grow steadily at a CAGR of 24.57% over the period 2016 to 2020. Making use of computing resources connected by either public or private networks provides the benefits of scalable infrastructure, greater…

Big Data and AI Hold Greatest Promise For Healthcare Technologies

Big Data and AI Hold Greatest Promise For Healthcare Technologies

Digital Healthcare Executives and Investors Addressed Opportunities and Challenges Facing the Industry New York City – September 21, 2016 – According to a survey of 122 founders, executives and investors in health-tech companies released today by Silicon Valley Bank, big data and artificial intelligence will have the greatest impact on the industry in the year ahead. Healthcare…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

What You Need To Know About Choosing A Cloud Service Provider

What You Need To Know About Choosing A Cloud Service Provider

Selecting The Right Cloud Services Provider How to find the right partner for cloud adoption on an enterprise scale The cloud is capable of delivering many benefits, enabling greater collaboration, business agility, and speed to market. Cloud adoption in the enterprise has been growing fast. Worldwide spending on public cloud services will grow at a…

5 THINGS TO CONSIDER ABOUT YOUR NEXT ENTERPRISE FILE SHARING SOLUTION

5 THINGS TO CONSIDER ABOUT YOUR NEXT ENTERPRISE FILE SHARING SOLUTION

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Cloud-based GRC Intelligence Supports Better Business Performance

Cloud-based GRC Intelligence Supports Better Business Performance

Cloud-based GRC Intelligence All businesses need a strategy and processes for governance, risk and compliance (GRC). Many still view GRC activity as a burdensome ‘must-do,’ approaching it reactively and managing it with non-specialized tools. GRC is a necessary business endeavor but it can be elevated from a cost drain to a value-add activity. By integrating…

The Future Of Cybersecurity

The Future Of Cybersecurity

The Future of Cybersecurity In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the Senate Intelligence Committee voted to approve the Cybersecurity Information Sharing Act (CISA), moving it one…

Low Cost Cloud Computing Gives Rise To Startups

Low Cost Cloud Computing Gives Rise To Startups

Balancing The Playing Field For Startups According to a Goldman Sachs report, cloud infrastructure and platform spending could reach $43 billion by 2018, which is up $16 billion from last year, representing a growth of around 30% from 2013 said the analyst. This phenomenal growth is laying the foundation for a new breed of startup…

Fintech Investments Are Seeing Consistent Growth

Fintech Investments Are Seeing Consistent Growth

The Financial Services Cloud Fintech investment has been seeing consistent growth in 2015, with some large moves being made this year. The infographic (Courtesy of Venturescanner) below shows the top Fintech investors and the amount of companies they’re currently funding: Just this week, a financial data startup known as Orchard Platform raised $30 million in…

Is The Fintech Industry The Next Tech Bubble?

Is The Fintech Industry The Next Tech Bubble?

The Fintech Industry Banks offered a wide variety of services such as payments, money transfers, wealth management, selling insurance, etc. over the years. While banks have expanded the number of services they offer, their core still remains credit and interest. Many experts believe that since banks offered such a wide multitude of services, they have…

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus Shadow IT, a phenomenon defined as building internal IT systems without the official organizational approval has been a growing concern for CIOs over the last few years. In 2015, it climbed to the top of the list of the emerging IT threats, with as much as 83% CIOs reporting…