How Meraki Makes Security Demands Less Demanding