Hi, how can we help you today?

Meraki Systems Manager

Meraki Systems Manager is a cloud-based IT asset management and endpoint security solution that automates device tracking, monitoring, and compliance reporting. It also offers real-time threat detection and response capabilities.

Reviews and Ratings of Meraki Systems Manager

We have gathered all the data so you don't have to.

Making decisions simple and saving your time and money.

G2 Rating

4.3 (192 Reviews)

SaasGuro Rating

Overall 4.6 (835 Reviews)
Value for Money
Ease of Use
Support

Capterra Rating

4.5 (121 Reviews)

What verified reviews from expects say about
Meraki Systems Manager

Insights from field experts about Meraki Systems Manager from first hand

A. Jones

I've used Meraki Systems Manager and I'm thoroughly impressed! Its intuitive interface and robust features made it easy to onboard devices, enforce policies, and troubleshoot issues - my IT workload was significantly reduced.

A. Smith

I've had an incredibly smooth experience with Meraki Systems Manager. The intuitive interface made it easy to onboard devices and configure settings, while the robust reporting and analytics allowed me to quickly identify areas for improvement in my IT infrastructure. The scalability and f...

J. Torres

I've had the pleasure of using Meraki Systems Manager and I must say it's been a game-changer for our IT operations. The intuitive interface made onboarding devices a breeze, while the robust reporting and analytics provided unparalleled visibility into our network. The automated patch man...

B. Collins

I've had a thoroughly disappointing experience with Meraki Systems Manager. The interface is clunky and outdated, making it difficult to navigate even for someone familiar with IT management software. The reporting features are limited and often provide misleading information, which has le...

Alternatives to Meraki Systems Manager you might consider and compare

These are alternatives that you can choose from and compare to best align with your interests and filed of expertise.

ESET Endpoint Security logo

ESET Endpoint Security

ESET Endpoint Security protects endpoints from various threats with advanced AI-powered technology, including anti-malware, firewall, and VPN features. It provides robust protection against ransomware, phishing, and zero-day attacks while minimizing system impact for smooth business operations.

WebTitan

WebTitan is a comprehensive web filtering solution designed to protect users from online threats. It blocks malware, phishing attempts, and unauthorized websites, ensuring a safe browsing experience. The software also offers content control features, allowing administrators to restrict access to specific websites or categories of sites. WebTitan integrates with existing DNS infrastructure, providing seamless protection for networks of all sizes.

MySQL

MySQL is a free and open-source relational database management system (RDBMS) that utilizes Structured Query Language (SQL) to store and retrieve data. It supports multi-threaded, SQL-based architecture and is designed to handle large databases with high scalability and performance. MySQL provides ACID compliant transactions and supports various storage engines for flexible data storage options.

ManageEngine Firewall Analyzer

ManageEngine Firewall Analyzer is a network traffic monitoring and analysis tool that provides real-time visibility into firewall activity, detecting security threats, and optimizing network performance. It offers detailed reporting, alerting, and automated compliance features for improved IT management.

Perimeter 81

Perimeter 81 is a cloud-based network as a service that provides secure internet access and remote connectivity to businesses through a global network of secure access points. It offers scalable, reliable, and easy-to-use solutions for secure networking.

Nessus

Nessus is a comprehensive vulnerability scanner that detects and reports on security weaknesses across various systems, networks, and applications. Its advanced scanning capabilities enable users to identify potential threats, prioritize remediation efforts, and ensure compliance with regulatory requirements. It supports a wide range of platforms and technologies, making it a versatile tool for IT professionals and security teams.

DNSFilter

DNSFilter is a cloud-based web content filtering and security solution that protects users from online threats and unwanted websites. It filters out malicious URLs, blocks phishing sites, and enforces acceptable use policies across devices. With customizable categories and granular control, DNSFilter helps organizations maintain a secure and productive digital environment for employees and students.

GoodAccess

GoodAccess is a cloud-based security platform that provides secure and seamless access to company resources for remote workers. It uses AI-powered zero-trust architecture to verify user identities and control access based on context, ensuring that users have the right level of access to the resources they need without compromising security.

Unified Threat Management

Unified Threat Management (UTM) software provides comprehensive security protection for organizations by combining multiple security features into a single solution. It integrates firewall, intrusion detection and prevention systems, antivirus software, and content filtering to detect and block various types of threats, including malware, viruses, and other cyber-attacks.

Frequently asked questions about Meraki Systems Manager

Find answers to the most relevant queries to be able to make decisions right away.

What is Meraki Systems Manager?

Meraki Systems Manager is a cloud-based IT management platform that helps you discover, monitor, and manage all your company's devices from a single dashboard.


How does Meraki Systems Manager work?

Systems Manager uses a small agent installed on each device to collect data and send it back to the cloud-based console for analysis and management.


What devices can I manage with Meraki Systems Manager?

You can manage laptops, desktops, mobile devices (iOS and Android), and even servers with Meraki Systems Manager.


How do I deploy the Systems Manager agent on my devices?

You can deploy the agent using a variety of methods, including Active Directory GPO, Intune, or manual installation via a .zip file.


What kind of data does Meraki Systems Manager collect?

Systems Manager collects detailed information about each device, including hardware and software details, operating system version, and application usage.


Can I set policies and enforce compliance with Meraki Systems Manager?

Yes, you can set custom policies to enforce password requirements, software updates, and other security measures across all devices under management.


How do I monitor device health and performance with Meraki Systems Manager?

Systems Manager provides real-time monitoring of device performance, alerts for potential issues, and detailed reporting on system resource usage.


Can I integrate Meraki Systems Manager with other IT tools and systems?

Yes, Systems Manager integrates seamlessly with popular IT platforms like JIRA, ServiceNow, and Azure Active Directory.


What kind of support does Meraki offer for Systems Manager?

Meraki provides comprehensive online documentation, phone and email support, and live chat for all customers using Systems Manager.


Is Meraki Systems Manager secure and compliant with industry standards?

Yes, Systems Manager is designed to meet the highest security and compliance standards, including GDPR, HIPAA, and PCI-DSS.



Hi there, what do you need?

We need a reliable project management software for 50 for less than 10$ per user...

Audit platform with integrated learning and inventory management...

I need a dental clinic software to handle, bookings and payments...

Recommend me an easy and fast to implement chatbot for our support...

Our Advanced algorithm will find the best solution for your needs and filter out all the nonsense and marketing buzz for you