Call us FREE on 0800 488 000
X
X

Please Log In Below

Forgotten Password?
Retry
Login
loading Gif
Sorry! You can't edit your cart on this page.
Sorry! This item could not be added to your cart as it is no longer available from Comms Express.
Please check the quantity you are adding and try again.
The following item has been added to your cart.
Product Code:
Options:
Qty:
Unit Price:£
View Cart
Checkout
Your cart is empty.
Subtotal:
£0
Remove all items from cart
Are you sure? Yes No
Learn more about how
to collect Data Points
for free gifts.
Comms Express Finance Options
Request A Quote
View Cart
Checkout
Cookie Policy×

Hi there! Our website may store cookies on your computer in order to give you the best experience, such as remembering the items in your cart so you can continue shopping where you left off.

By continuing to use our site, you give consent for cookies to be used.

Spend £100.00 for
FREE DELIVERY.
Free delivery excludes heavy and bulky products
Browse Categories
In Stock: Next Day
£83.58
£100.30 Inc VAT
Earn 41 Data Points when purchasing this product. More Info

/assets/images/gallery/large/1621870395meraki-go_colour.png

Cisco Meraki Go Security Subscription

Cisco Meraki Go Security Subscription

by Meraki GO
See more product details
Term:
Part No:CM-LIC-GX-UMB-1Y
Manufacturer No:LIC-GX-UMB-1Y
Delivery: In Stock: Next Day

/assets/images/gallery/large/1621870395meraki-go_colour.png

Cisco Meraki Go Security Subscription
More Related Items
Click to change options
Colour:
Apply
£124.00 Ex VAT
Qty:
Click to change options
Length:
Fibre Size:
Apply
£4.77 Ex VAT
Qty:
Email product to a friend
X
  • Scroll to top
    Cisco Meraki Go Security Subscription

    Meraki Go GX Security Gateway offers a Security Subscription powered by Cisco Umbrella. This subsciption allows your Meraki Go GX Security Gateway the ability to use DNS based security measures to block certain types of traffic from your network.

    Benefits and features

    Malware

    Block access to websites and domains known to host malware. Malware is malicious software that is meant to cause harm to your device, such as a virus or worm.


    Phishing

    Block access to websites and domains known to host phishing attacks. Phishing schemes are websites that are designed to steal personal information, often times mimicking a legitimate website


    Content Filtering

    Block access to websites that fall under the following categories:

    Adware, Alcohol, Dating, Drugs, Gambling, German Youth Protection, Hate/Discrimination, Internet Watch Foundation, Lingerie/Bikini, Nudity, Pornography, Proxy/Anonymizer, Sexuality, Tasteless, Terrorism, Weapons


    Command & Control Callbacks

    Prevent infected devices from communicating with attackers' remote commands while the device is using your network. These are websites that are often used to control infected devices that are part of a botnet


    Security Overview


    When security events have occurred, you can see an overview of them on the home screen, showing the total number events for the given time frame, as well as devices on your network that have generated a high number of events.

    Blocked Requests List

    Tapping the number of security events generated will bring you to list of the blocked requests. From here, you can see a list of all of the individual events, as well as which clients generated. Tapping on an event will bring you to it's details.

    Blocked Request Details

    Looking at a security event provides you with information related to the client that generated it, and the event itself. You can view things like which URL was browsed to that subsequently got blocked (and generated this event), what time it occurred, and which device generated the event.

    Guest Network Events

    In some situation, such as if you have a Guest Network configured, and a client connected to that network generates some sort of security event, details of that event will be missing. In a situation like this, the security event will show which Meraki Go Access Point the client was connected to, and what URL generated the event.

    Client Security Events

    You can also view the security events for a specific client device by browsing to it's device details page, and then scrolling own to the Security Events section. This will show you the events just for this specific client.

    Meraki Go GX Security Gateway offers a Security Subscription powered by Cisco Umbrella. This subsciption allows your Meraki Go GX Security Gateway the ability to use DNS based security measures to block certain types of traffic from your network.

    Benefits and features

    Malware

    Block access to websites and domains known to host malware. Malware is malicious software that is meant to cause harm to your device, such as a virus or worm.


    Phishing

    Block access to websites and domains known to host phishing attacks. Phishing schemes are websites that are designed to steal personal information, often times mimicking a legitimate website


    Content Filtering

    Block access to websites that fall under the following categories:

    Adware, Alcohol, Dating, Drugs, Gambling, German Youth Protection, Hate/Discrimination, Internet Watch Foundation, Lingerie/Bikini, Nudity, Pornography, Proxy/Anonymizer, Sexuality, Tasteless, Terrorism, Weapons


    Command & Control Callbacks

    Prevent infected devices from communicating with attackers' remote commands while the device is using your network. These are websites that are often used to control infected devices that are part of a botnet


    Security Overview


    When security events have occurred, you can see an overview of them on the home screen, showing the total number events for the given time frame, as well as devices on your network that have generated a high number of events.

    Blocked Requests List

    Tapping the number of security events generated will bring you to list of the blocked requests. From here, you can see a list of all of the individual events, as well as which clients generated. Tapping on an event will bring you to it's details.

    Blocked Request Details

    Looking at a security event provides you with information related to the client that generated it, and the event itself. You can view things like which URL was browsed to that subsequently got blocked (and generated this event), what time it occurred, and which device generated the event.

    Guest Network Events

    In some situation, such as if you have a Guest Network configured, and a client connected to that network generates some sort of security event, details of that event will be missing. In a situation like this, the security event will show which Meraki Go Access Point the client was connected to, and what URL generated the event.

    Client Security Events

    You can also view the security events for a specific client device by browsing to it's device details page, and then scrolling own to the Security Events section. This will show you the events just for this specific client.

    Email product to a friend
    Print product details
    View Keywording: