Product Detail

Cisco Meraki Systems Manager || Cloud-Based Enterprise Mobility Management

Quick Overview
Overview: Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, monitoring, and security of the mobile devices managed by your organization. Manage distributed deployments of all of your devices with...


Add to Wishlist


Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, monitoring, and security of the mobile devices managed by your organization. Manage distributed deployments of all of your devices with Systems Manager — without an on-site appliance. Managed devices connect securely to Meraki's cloud, enabling you to locate devices, deploy software and apps, deliver content, enforce security policies, and monitor all your devices through an intuitive and powerful web-based dashboard.

Centralized Cloud Management

Seamlessly manage and control thousands of iOS and Android devices, Macs, and PCs via Meraki's secure, browser-based dashboard. After enrollment into Systems Manager, managed devices automatically pull security policies and settings from the cloud. Systems Manager works on any network — even if the devices you are managing are on the road, at a café, or used at home. New features, updates, and enhancements are delivered effortlessly to the dashboard from the cloud.

Meraki's cloud architecture provides the industry's only end-to-end solution which unifies WAN, LAN, wireless LAN, and mobile devices management under a single dashboard. Gain complete visibility and control from the top of the network to the edge using MX Security Appliances, MS Switches, and MR Wireless LAN, to the client devices on the network with Systems Manager. The intuitiveness of the dashboard enables IT professionals to configure and deploy in just minutes, without specialized training or dedicated staff.

Pre-enroll devices or dynamically add users as they join your network. Deploy wireless and VPN connectivity settings, push apps and content, or restrict usage—based on user groups.



Locate and track laptops and mobile devices anywhere in the world. Get real time visibility on device health, security posture, and software and hardware inventory for your entire fleet of devices.



Ensure security for your organization from devices all the way through to network policies. Protect devices and their data with encryption enforcement, enterprise remote wipe, and integrated network access control.

Network, Meet Device

Every user is unique. Every device, a bit different. Systems Manager keeps the network in the loop about constantly changing devices, automatically tracking device posture and adjusting security policies to match.Gone are the days of manual user-to-device assignment. Tie people to their devices by integrating enrollment with Active Directory. Scale your deployment to thousands and eliminate unknown devices in your environment.

Contain Your Data

Separate enterprise data from personal data
Don’t mess with complicated SDKs or modifying application source code. Systems Manager Enterprise provides secure containerization using native OS tools, allowing secure data sharing among apps without complexity. Whitelist secure applications and blacklist unsupported ones to ensure only approved apps are used, and enable VPN on a per-app basis.



Supported Platforms
  • Apple iPad, iPod Touch, iPhone, Apple TV (iOS 5 or higher)
  • Android (2.2 or higher)
  • Mac OS X (10.5, 10.6, 10.7, 10.8, 10.9, 10.10)
  • Windows Phone 8.1 (Enterprise only), Windows Pro 8.1, 8, 7, Vista, XP (Service Pack 3 or higher), Microsoft Server 2008, R2, 2012


  • Managed via the web using Meraki's secure browser based dashboard
  • Centralized administration of managed devices
  • Organization level two-factor authentication
  • Role-based administration
  • Inventory data export to CSV
  • Remote command line
  • Administrative event log and activity log
  • Automatic alerts for installed software, geofencing, enrollment, and dynamic security reporting
  • Copy profiles across different networks
  • Enterprise wipe and dissolving management profiles (Enterprise only)


  • Device location using device WiFi, IP address, and GPS data
  • Containerization, separation of Managed and unmanaged data (via Open-in with iOS)
  • Unenrollment monitoring and notification
  • Antivirus, antispyware, firewall, disk encryption, passcode and password, screenlock timeout , and jailbreak and root detection
  • Restrict access to iCloud (iOS)
  • Restrict users to accept untrusted TLS certificates (iOS)
  • Force encrypted backup (iOS) and encrypted storage (Android)
  • Global HTTP Proxy (iOS)
  • Enforce passcode policies and failed entry device wipe policy (iOS and Android)
  • Scan client device for Systems Manager before allowing network access (NAC)* (iOS, Android, Windows, and Mac)
  • Simple Certificate Enrollment Protocol (SCEP)
  • Customer Certificate Signing for certificate provisioning (Enterprise only)
  • Access rights to limit Dashboard control (e.g. cannot erase BYOD devices iOS and Mac) (Enterprise only)
  • Dynamic profile management - Security compliance, Geofence management, Time based (Enterprise only)
  • Cisco ISE MDM API Integration (Enterprise only)

Software and App Management

  • Inventory of installed software and apps
  • Custom deployment of software and App Store apps
  • Integration with Apple App Store and Apple's Volume Purchase Program
  • Software installation via .msi and .pkg (Windows and Mac)
  • Software uninstallation (Windows and Mac)
  • Custom uninstallation of iOS and Android apps
  • Restrict app installation
  • Restrict in-app purchase
  • Unauthorized software and app installation monitoring and notification
  • Install Enterprise Apps

Content Management

  • Custom deployment of files, documents, apps (iOS and Android)
  • Update and deploy the latest version to devices (iOS and Android)
  • Managed and distribute app licenses (iOS with VPP)
  • Deploy iBook licenses

Device Restrictions

  • Restrict use of camera (iOS and Android)
  • FaceTime, Siri, iTunes Store, multiplayer gaming (iOS)
  • Restrict content consumption (YouTube, explicit music & podcasts, content rated movies, TV shows, and apps) (iOS)
  • Force encrypted backup (iOS) and encrypted storage (Android)
  • Enforce passcode policies and failed entry device wipe policy (iOS and Android)
  • Single App mode (iOS and Android – Samsung KNOX)
  • Autonomous Single App mode (iOS) (Enterprise only)
  • Automatic and whitelisted content filter (iOS)
  • Restrict use of AirDrop (iOS)
  • Restrict changes to cellular data usage for apps ( iOS)
  • Toggle Voice and Data Roaming Settings (iOS)
  • Restrict which Airplay devices are listed (iOS)


Download the Cisco Meraki Systems Manager Datasheet (PDF).

    Purchasing & Delivery


    Always free shipping

    Warranty Information

    If your Cisco Meraki device fails and the problem cannot be resolved by troubleshooting, contact support to address the issue. Once support determines that the device hardware is in a failed state, they can process an RMA and send out a replacement device free of charge. In most circumstances, the RMA will include a pre-paid shipping label so the faulty equipment can be returned. Note that, for end-customer device security, RMAs may only be requested by Full Organization Write Admins, or Network Write Admins (for only devices in networks they are Admins of). Meraki Support will not process RMAs unless the support agent can verify the requester has sufficient network permissions. If you have not received a pre-paid shipping label in the box, please check your email inbox and spam folders 24-48 business hours after the replacement has been received for an email from FedEx or UPS to print the return label. More information can be found here on Cisco’s website; Hardware Returns If you are experiencing hardware issues, please contact Cisco Meraki support by logging in to dashboard (Help > Get help) or by calling us. To request a return materials authorization (RMA), please complete the RMA request form in the Meraki dashboard. If your RMA request is approved, Cisco Meraki will email you an RMA number and a return shipping label free of charge. We will ship replacement units within five business days of receiving your defective units. If no trouble is found, we will contact you before taking further action. If you require advance replacement, please call Cisco Meraki technical support. Advance replacement orders will ship within 1 business day. Additional information about Cisco Meraki’s hardware warranty can be found in Cisco Meraki’s End Customer Agreement. Refund Requests If you are dissatisfied with your Cisco Meraki purchase for any reason, you may return your order for a full refund. All returns must meet the following criteria: You purchased the product through an authorized Cisco Meraki reseller or direct from Cisco Meraki You are the original purchaser of the product You submit your refund request within 30 days of purchase The product is in new condition, including all accessories in the original packaging To request a refund, please complete our RMA request form. If your refund request is approved, Cisco Meraki will email you an RMA number. In order for the refund to be accepted and processed, Meraki must receive the hardware you are returning no later than 30 days following the date the RMA number is issued. Once we have received and inspected the units, we will process your return. If you purchased through a Cisco Meraki reseller, your refund will be issued by that reseller. If you purchased directly from Cisco Meraki, we will issue a refund, typically within 15 days of receiving the return. (If you paid by credit card we will credit the original credit card. If you paid by any other method, we will send you a check.) From time to time Cisco Meraki offers special refund terms. If your return is covered by special terms, please reference those terms on your RMA request. Please contact Cisco Meraki directly for all returns, including product purchased through distributors or resellers.