Dimension Data Network Services Limited

Dimension Data Meraki Cloud Security Service

Cloud Managed Security Services from Cisco Meraki. Providing high performance Next Generation Firewalls with industry leading Web based Management.


  • High Capacity, Faster Connections, greater user capacity, more coverage
  • Unmatched Visibility, Device visibilty, rich analytics, access and application control
  • Entire Network under a single pane of glass
  • Make a wish - button to suggest new services
  • Ease of deployment
  • URL Filtering, Intrusion Prevention, Malware Protection
  • Intelligent Software Defined WAN
  • High availability


  • Simplifies daily operations with powerful tools for network administrators
  • Managed online, or via a mobile application (Android and iOS)
  • Future-Proof, over-the-web upgrades of new features and fixes
  • 24x7 Technical Support
  • Direct access to technical resource
  • New visibility, analytics, and troubleshooting tools added to the dashboard
  • Automatically pull configurations from the cloud
  • Network topology diagram that is always up to date


£235.00 to £34000.00 per unit per year

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 9


Dimension Data Network Services Limited

Julie Fraser

+44 12 5277 9632


Service scope

Service scope
Service constraints Scheduled upgrades may cause outages, all upgrades are performed out of hours and notice is always provided.
System requirements
  • Hardware and Licensing provided to client in an Opex Model
  • Hardware must connect to the internet to establish cloud connectivity

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Email and online ticketing is available 24x7, with a 3 levels of priority for the case raised (Low, Medium and High)
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels 8x5xNBD hardware replacement is included with the Dashboard License, additonal levels of hardware replacement are available on request. All software updates are included with the dashboard license, support cases can be raised via the online portal or by phone. Access to user dashboard for fault diagnostic and resolution prior to approval for remote engineer.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Full user documentation is available to download, and online support tickets can be raised to assist in the configuration. There are online webinars to provide pre-recorded training covering all topics.
Service documentation No
End-of-contract data extraction No data is held within the cloud
End-of-contract process The hardware will continue to operate but will not be able to be managed or changes applied, the devices will continue to operate on the last set of instructions.

Using the service

Using the service
Web browser interface Yes
Using the web interface The web interface is an intuitive multi-site managment cloud portal with simple steps to provision all services, changes can be made via drop down menus. Users can have individual accounts setup limiting or enabling different levels of access
Web interface accessibility standard None or don’t know
How the web interface is accessible The web interface is access by all leading web applications (Chrome, Windows Edge, Mozilla Firefox), or via the Merakimobile app (Android or iOS). Users can have individual accounts setup limiting or enabling different levels of access and ability.
Web interface accessibility testing None
Command line interface No


Scaling available Yes
Scaling type Manual
Independence of resources No user traffic is transported through the cloud, all data is moved out of band to the cloud management, the only data is within the cloud is the configuration, and management information which has no effect on user performance.
Usage notifications Yes
Usage reporting
  • API
  • Email


Infrastructure or application metrics Yes
Metrics types
  • Network
  • Number of active instances
Reporting types
  • API access
  • Real-time dashboards


Supplier type Reseller providing extra support
Organisation whose services are being resold Cisco Meraki

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
  • Other locations
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Other
Other data at rest protection approach No customer data is held within the cloud
Data sanitisation process No
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Backup and recovery No

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks IPsec or TLS VPN gateway
Data protection within supplier network Other
Other protection within supplier network No user data is transported within the cloud, all traffic is out of band, and only the configuration and management data is transported within the cloud

Availability and resilience

Availability and resilience
Guaranteed availability The Meraki dashboard is based in the clould which is replicated across three data centers around the world providing a high level of uptime, if the Meraki cloud is not available it does not effect the working of the wireless network.
Approach to resilience Meraki have three data centres around the world. All data centres have high resiliencey in all areas.
Outage reporting All service outages will be notified via e-mail, and on the Meraki Dashboard portal, all outages are reported in the local time of the effected devices.

Identity and authentication

Identity and authentication
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google apps)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Other user authentication External radius or authentication servers
Access restrictions in management interfaces and support channels Access is restricted by the use of individual privilage levels required by login.
Access restriction testing frequency At least every 6 months
Management access authentication Username or password
Devices users manage the service through Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards Other
Other security governance standards PCI-DSS
Information security policies and processes ISO 27001 - We are regularly audited for this and have a team on in-house compliance officers ensuring company policy, compliance and security policy is followed. Inline with policies, controls are placed across the company meaning that these are achieved.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach All changes (upgrades and fixes) are fully tracked and can be rolled back if required on an individual basis or as a whole
Vulnerability management type Supplier-defined controls
Vulnerability management approach Risk assessments and vunerability tests are performed to ascertain the security of the service on a regular basis. Patches to our service are push out regularly where and when required. Information regarding current threats are from multiple data streams as well as Meraki's own global threat intelligence streams.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach Cisco Advanced Malware Protection is the industry's leading malware protection solution. With a database of over 500 million known files and over 1.5 million new incoming file samples every day, AMP provides not only global threat protection but also extensive visibility during and after a malware attack.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach All incidents can be reported either by opening a case via the Cloud Dashboard, or via the telephone. If it is a security issue then the case can be marked as a high priority as will be dealt with accordingly. If there is a critical incident that has been discovered in the cloud or has been reported exteranally the actions and updates are communicated via email and via the Cloud Dashboard.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart No

Energy efficiency

Energy efficiency
Energy-efficient datacentres Yes


Price £235.00 to £34000.00 per unit per year
Discount for educational organisations Yes
Free trial available Yes
Description of free trial All hardware and licenses are included as per a purchased product, this also includes full support during the trial. There is nothing that is not included in the trail that would not be included in a full purchase. There is a 30 day trial period but this can be extended


Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Terms and conditions document View uploaded document
Return to top ↑