Cloud Managed Network with Cisco Meraki

Ironshare offers a cloud managed network infrastructure solution powered by Cisco Meraki. Based on a cloud subscription model, Cisco Meraki delivers enterprise class Wireless, Network and Security infrastructure through its simple cloud management platform.


  • Cloud Managed
  • Simple deployment through a single cloud dashboard
  • Real time analysis and reporting
  • Zero-touch cloud provisioning
  • Enterprise level scaling for small, medium and large companies


  • Easy to deploy and manage
  • Builtin troubleshooting
  • Rapid deployment times
  • High performance
  • Comprehensive Security


£0 a unit a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

2 1 7 4 9 2 1 1 0 5 8 9 1 9 4


Ironshare Stuart Hare
Telephone: +441217690475

Service scope

Service constraints
Depends on the hardware and license selected.
System requirements
Internet connectivity to the Meraki Cloud

User support

Email or online ticketing support
Email or online ticketing
Support response times
Support response times
8 x 5 Next Business Day
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
Cisco Meraki provides 24×7 telephone support based out of San Francisco, London, and Sydney technical assistance centers.

The SLA for hardware replacements is Next Business Day shipment.
Support available to third parties

Onboarding and offboarding

Getting started
Once purchased you have multiple options.
Your experienced IT staff can handle the design, implementation and support of your new infrastructure.
Or Ironshare can engage and do all of the design, necessary back-end configuration and then advise directly on how best to support your Cisco Meraki network. This is achieved by direct consultation followed by a documented process. Our consulting service means that we take the strain away from the customer providing online training and documentation.
Service documentation
Documentation formats
End-of-contract data extraction
Data is provided upon request once the contract has come to an end and will be deleted following sign-off from the customer.
End-of-contract process
When the contract comes to an end all off - boarding tasks will be included in our standard service.

Using the service

Web browser interface
What users can and can't do using the API
The API contains a set of tools known as endpoints for building software and applications that communicate with the Meraki Dashboard for use cases such as provisioning, bulk configuration changes, monitoring, and role-based access controls.
API automation tools
  • Ansible
  • Chef
  • Puppet
API documentation
API documentation formats
  • HTML
  • PDF
Command line interface


Scaling available
Scaling type
Independence of resources
Cisco Meraki uses an out of band management architecture, meaning that only management data flows through the Meraki cloud infrastructure. No user traffic passes through Meraki's datacenters, and your data stays on your network.
Usage notifications
Usage reporting
  • API
  • Email


Infrastructure or application metrics
Metrics types
  • HTTP request and response status
  • Network
  • Number of active instances
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Reseller providing extra features and support
Organisation whose services are being resold

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
99.99% uptime service level agreement (that's under one hour per year)
24x7 automated failure detection — all servers are tested every five minutes from multiple locations
Rapid escalation procedures across multiple operations teams
Independent outage alert system with 3x redundancy
Approach to resilience
Globally distributed datacenters
Customer network configuration data and statistical data replicated across independent data centers with no common point of failure
Real-time replication of data between datacenters (within 60 seconds)
Nightly archival backups for customer network configuration data and statistical data
Outage reporting
All service outages will be notified via e-mail, and on the Meraki Dashboard portal, all outages are reported in the local time of the effected devices.

Identity and authentication

User authentication
  • 2-factor authentication
  • Username or password
  • Other
Other user authentication
SAML Single Sign On to Customer Identity Provider
Access restrictions in management interfaces and support channels
Access is defined within the cloud dashboard and is based on role based access, configured by the cloud administrator.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device over multiple services or networks

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
Other security governance standards
Cyber Essentials
Information security policies and processes
Cyber Essentials as standard, as well as key processes and procedures from ISO 27001, NIST and NCSC standards.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Changes and configuration management processes are derived from ITIL V3 standards.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Meraki's vulnerability management process follows good practice inline with our industry standard accreditations. They are regularly updated by Cisco Meraki to counter the latest vulnerabilities and threats.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Cisco Meraki is committed to data protection, privacy, security, and compliance with applicable regulatory frameworks in the US and abroad. The Meraki cloud-based architecture is designed from the ground up with data protection, privacy, and security in mind.
Incident management type
Supplier-defined controls
Incident management approach
All incidents and issues can be reported directly from the cloud dashboard or by using telephone support, based on incident priority levels.

Secure development

Approach to secure software development best practice
Supplier-defined process

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart

Energy efficiency

Energy-efficient datacentres


£0 a unit a year
Discount for educational organisations
Free trial available
Description of free trial
Cisco Meraki has multiple options for free trials of their network infrastructure solutions, including Wireless, Network and Security devices.
Link to free trial

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.