Contact Us

|

Careers

|

Change Locale
close

How Meraki Makes Security Demands Less Demanding

Security | Posted on October 9, 2018 by Jonas

One of the greatest threats to cybersecurity is human error. According to UK consultancy Willis Towers Watson, careless behavior causes 90% of data breaches. The finest threat intelligence in the world won’t matter if your administrator fails to configure your networks properly. Anti-malware solutions won’t matter if they’re not consistently applied. If one phish gets through the net, that’s one too many.

What you can do, however, is work around the problem. You can make your security procedures simpler for people to deal with. If your security solution is easy to implement, your employees won’t have to spend a lot of time fiddling with it. That means there’s less risk your security will suffer from a lapses due to inattention. All things being equal, simplicity equals safety. Which brings us to Cisco Meraki.

Cisco Meraki makes it easy to extend your network to a new branch. You plug in a box from Cisco, turn it on, and set it to your default configuration with a web-based dashboard. If you need to alter that configuration, you can do it from anywhere—even on your phone, if you feel like it.

This convenience also applies to security. When you install a Meraki MX appliance, you instantly leverage all of Cisco’s cybersecurity tools. Cisco has documented the fact that Meraki customers were unaffected by WannaCry – provided they had activated Intrusion Prevention and Advanced Malware Protection.

Given that the average cost of a data breach to an enterprise, according to Kaspersky, is $1.23 million, it’s safe to say that Cisco was a lifesaver for more than a few of its customers.

With Meraki, powerful security is integrated into an SD-WAN in an eminently visible fashion. Rather than maintaining multiple security solutions with different consoles, and manually implementing them throughout a growing network, Meraki customers have it easy. When they open a new branch, they don’t have to think much about configuration, or really think about it at all. Which is great, because too much thinking can create chinks in your security armor. This is a potential big boon to emerging and mid-market companies that simply can’t afford a large IT department, let alone specialized security staff.

Addressing the cybersecurity skills gap

This is especially important at a time when the cybersecurity skills gap only seems to be growing bigger by the day. Among companies surveyed by ESG in 2018, a whopping 51 per cent stated that their organization had a “problematic shortage of cybersecurity skills.” Security teams, in general, aren’t staffed well and have to deal with more threats than ever. This creates more stress and more multitasking, which erodes attention to detail. These circumstances make convenience even more important than it otherwise would be.

When security teams are freed from fiddling with their defenses, they have more time to attend to other important aspects of their work. This could include important tasks like training other employees in security hygiene. Rather than putting out fires, with Meraki, security teams can focus on fireproofing.

In short: simpler is better.

Interested in taking Meraki MX for a test drive? We offer a free demo and a dedicated support team that will have you up running in a matter of minutes. Click here to learn more.

Related Articles

Collaboration | March 26, 2020 by Softchoice Advisor

The situation surrounding COVID-19 has required many organizations to adjust their way of working. Cybercriminals are doing the same.  The need to shift many workforces to all-remote work creates new challenges, complicating an already complex cybersecurity landscape.   Across the globe, malicious actors are leveraging confusion and uncertainty around this unprecedented scenario to target individuals, businesses and their users.  With many or all end users working […]

Cloud | December 20, 2019 by Ryan Demelo

The stakes surrounding data security and risk mitigation rise with each passing year. Data breach costs continue to increase and potential threats grow more sophisticated.  According to IBM, the average total cost of a data breach – after accounting for remediation, reputational damage and regulatory issues – has reached $3.92 million. While smaller organizations may […]

Cloud | December 11, 2019 by Karly Pierce

IT organizations have seen too much of their time consumed by non-strategic tasks. This comes at great cost to their bottom lines and cloud transition strategies.  In fact, a 2018 Stripe survey found that between dealing with bad code, technical debt and various refactors or modifications, most of the typical developer workweek was wasted.   That […]