The Lighter Side Of The Cloud – Falling Behind
The Lighter Side Of The Cloud – The Weatherman
The Lighter Side Of The Cloud – Data Security

Meraki Releases Cloud-managed Router, Introduces NaaS Program

Meraki Releases Cloud-managed Router

San Francisco-based cloud networking company Meraki unveils the Meraki MX series cloud-managed routers, the company said in a press release. The new models MX50 and MX70 feature cloud-based centralized management, a firewall, internet gateway service, and application traffic shaping. The new routers are a step forward toward an easy-to-use cloud-based environment providing an intuitive browser-based user interface, which does not require trained specialists to operate the system The MX series is designed to offer automatic security, signature and feature upgrades as well as network-wide monitoring.

The key features of the MX series include cloud-based centralized management, layer 7 application firewall and traffic shaper, site to site VPN, routing, DHCP, and a firewall. Additionally, the new hardware devices are able to automatically detect and monitor printers while tracking and showing printer ink levels across remote divisions. At present, Meraki’s cloud management system is implemented in over 17,000 networks worldwide and the new devices are based on the same system. Therefore, MX series routers can be installed in single standalone networks and in large distributed networks alike.

The MX series comes in two editions: Enterprise Edition and Advanced Security Edition. The first one provides cloud-based centralized management, routing, and application traffic shaping. The Advanced SecurityEdition provides additional functionality like site-to-site VPN and next-generation firewall capabilities.

Meanwhile, the company announced the introduction of Networking as a Service, a new pricing model for cloud-managed network infrastructure products. The company offers the NaaS pricing model for all its wired and wireless products.

“Meraki’s Networking as a Service program provides a cost-effective and convenient way for organizations to obtain a Meraki system on a ‘pay as you go’ model. Networking as a Service eliminates upfront capital expense, gives you the option to upgrade your hardware for no cost at any time, and removes the financial risk of owning too much infrastructure,” Hans Robertson, VP of Product Management and Co-Founder at Meraki, said in a company press release.

The MX series routers are also available via Meraki’s new NaaS program, and customers can purchase devices through an annual subscription. The company claims that the all-inclusive price includes the cost of the hardware, software licenses, ongoing, upgrades, maintenance, and support provided by Meraki.

Inevitably, the news will boost company’s financial performance although Meraki boasts partial funding by Google and Sequoia Capital. In January 2008, the company received  USD 20 million in series B funding. Other investors in Meraki, include DAG Ventures and Northgate Capital.

Meraki started as an MIT research project in 2006 and relocated to California once the project turned commercial. Its core business is related to providing wireless networks controlled in the cloud and has 17,000 networks deployed worldwide, according to Meraki. The company offers various products including its flagship Enterprise Cloud Controller, a product allowing wireless access to corporate LAN for offices, industrial firms, retailers, educational institutions, and multi-site locations.

By Kiril Kirilov

Sorry, comments are closed for this post.

Recent

Improving Safety On The Digital Highway

Improving Safety On The Digital Highway

Digital Highway Safety When it comes to transportation, safety is highly consequential. From educational programs to legal penalties, safety is principle to the way that travel is spoken about and acted upon. But what about digital travel? Although user files are hardly as important as users themselves, they often contain sensitive information. As cloud computing’s momentum…

From AOL To Twitch: A Decade Of Big Data Hacks

From AOL To Twitch: A Decade Of Big Data Hacks

A Decade Of Big Data Hacks The idea of hacking has been around forever. Popular in science-fiction films for decades, hacks have now become a reality for many people who engage in basic activities online. Here is a look at a list ten years in the making, a decade of hacks year-to-year. Included is an…

Popular

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations Everyone knows what the cloud is, but does everybody know where the cloud is? We try to answer that as we look at some of the most unusual data centre locations in the world. Under the Eyes of a Deity Deep beneath the famous Uspenski Cathedral in the…

Five Signs The Internet of Things Is About To Explode

Five Signs The Internet of Things Is About To Explode

The Internet of Things Is About To Explode By 2020, Gartner estimates that the Internet of Things (IoT) will generate incremental revenue exceeding $300 billion worldwide. It’s an astoundingly large figure given that the sector barely existed three years ago. We are now rapidly evolving toward a world in which just about everything will become…

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT). According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a…

Cloud Computing and Social Networks

Cloud Computing and Social Networks

Pushing Innovation With Social Networks There was a time when storage space was a precious commodity. A few videos and photographs and the system would be gasping for breath in old PCs’ limited storage space. 10 Years ago, today’s top social networking sites would have broken down under the burden of the heavily visual traffic…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

Sponsored Posts

Moving From Email Into The Cloud

Moving From Email Into The Cloud

Mobile Collaboration In The Cloud Imagine that you, as a manager, are told by the powers that be that you have to find “efficiencies” within your department that will result in one million dollars of savings annually. You struggle with this. You send an email to everyone on your senior team. “Where can we save…

Cloud Logo Sponsors

hp Logo CityCloud-PoweredByOpenstack-Bluesquare_logo_100x100-01
cisco_logo_100x100 vmware citrix100
Site 24x7


Contributor Spotlight

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Branded Content Programs

Advertising