Skip to main content

Help us improve the Digital Marketplace - send your feedback

RE-SOLUTION DATA LTD

Cisco Meraki - Network, Security, CCTV & IoT Software

Cisco Meraki's Cloud Software Technology offers centralised management of network infrastructure via cloud-based platform, enabling remote configuration, monitoring, and troubleshooting with ease. Organisations are easily able to centrally manage and control their Switches, Firewalls, Wireless Access Points, CCTV Cameras and IoT Sensors.

Features

  • Cloud-based management: Simplifies network administration from anywhere.
  • Centralised dashboard: Offers visibility and control over network devices.
  • Scalability: Easily scales from small organisations to large enterprises.
  • Automatic updates: Ensures devices are always running the latest software.
  • Security: Robust security features, including built-in firewall and intrusion prevention.
  • Analytics: Delivers insights into network traffic and user behavior.
  • Mobility management: Enables management of mobile devices and BYOD policies.
  • Application control: Allows prioritisation and restriction of specific applications.
  • Integration: Seamlessly integrates with other Cisco products and third-party solutions.

Benefits

  • Simplified management: Reduces administrative burden with centralised control.
  • Enhanced visibility: Provides comprehensive insights into network performance.
  • Increased flexibility: Adapts to changing business needs with scalable solutions.
  • Improved security: Ensures protection against threats with advanced features.
  • Enhanced productivity: Enables efficient resource allocation and application management.
  • Cost savings: Reduces hardware and maintenance expenses.
  • Seamless connectivity: Facilitates reliable connectivity for users and devices.
  • Streamlined operations: Automates routine tasks for operational efficiency.
  • Better user experience: Ensures consistent network performance and reliability.
  • Future readiness: Supports technology evolution and innovation.

Pricing

£1 to £100,000 a unit a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@re-solution.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 9 2 0 4 4 1 0 3 8 9 5 0 4 4

Contact

RE-SOLUTION DATA LTD Jacob Tranter
Telephone: 02038808369
Email: sales@re-solution.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
Planned updates and upgrades require downtime through authorised change control process. Cisco Meraki Dashboard access is wholly dependant on internet access. Standard faulty hardware replacement is next business day if organisations need increased SLA's up to replacement within 4 hours then this would be chargeable from onset.
System requirements
  • Internet connection: Required for cloud-based management.
  • Supported browsers: Works with modern web browsers.
  • Operating systems: Compatible with Windows, macOS, iOS, Android, and Linux.
  • Minimum bandwidth: Adequate bandwidth for device management and updates.
  • Power source: Access to power outlets for device operation.
  • Network configuration: DHCP server or static IP addresses for connectivity.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Our services come with SLAs that outline the level of service, performance, and support guaranteed by us in case of service disruptions or failures.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Remote or on-site support is chargeable on a 'per device' basis. The baseline support for moves, adds, changes and monitoring of the devices is chargeable on a monthly basis. The following is chargeable per device per month. Firewall - £75.00 Switch - up to 24 ports - £30.00 Switch over 24 ports - £60.00 Camera/Access Point £30.00 On site support is chargeable at £800.00 per day in hours and £1200.00 per day out of hours. Technical account management is included within the monthly support cost.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We typically follow a structured approach that includes the following steps: - Understand User Requirements by gathering requirements from the users to understand their specific needs and objectives. - Define Use Cases: This helps in designing a solution that meets the users' needs effectively. - Create High-Level Design: That outlines the overall architecture and components of the solution. - Create Low-Level Design: Based on the HLD we create detailed low-level design documentation that provides specific technical details and configurations required to implement the solution. - Architecture Diagrams: Incorporate architecture diagrams into the documentation to visually represent the structure and relationships between various components of the solution such as network topology diagrams, data flow diagrams, and sequence diagrams. - Scalability and Resilience: Ensure that the low-level design accounts for scalability and resilience requirements, such as redundancy, load balancing, failover mechanisms. - Security Considerations: Incorporate security best practices and considerations into the solution. - Review and Validation: Review the low-level design documentation with stakeholders to validate the design and ensure that it aligns with the users' requirements and best practices. - Update and Maintain Documentation: Keep the documentation up-to-date with any changes or updates to the underlying infrastructure.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Dashboard export: Users can export data directly from the Cisco Meraki dashboard, typically in CSV format, by navigating to the desired data section and selecting the export option. Re-solution can export an organisation's / users support / request tickets and provide these in pdf / .csv format.
End-of-contract process
Handover of administration rights and access to key stakeholders at the customers organisation. Provide available documentation that was created for organisation. e.g. High Level Designs, Low Level Designs, Export of Customer Support Request from support platform. The off boarding service is provided free of charge for the above services.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
- User Interface (UI): The desktop dashboard typically offers a more extensive and detailed interface, with more screen real estate available for displaying network information and configurations. The mobile dashboard is designed to be more streamlined and optimised for smaller screens, which may result in a simpler layout and less information available.

- Feature Availability: Some advanced features or configurations may only be available on the desktop dashboard due to limitations of mobile devices.

- Accessibility: The desktop dashboard, while not as portable, may provide a more comfortable and efficient user experience, especially for tasks requiring extensive configuration or analysis.
Service interface
No
User support accessibility
WCAG 2.1 AA or EN 301 549
API
Yes
What users can and can't do using the API
Can retrieve network information: Access details on devices, clients, and network configurations. Can configure network settings: Modify device configurations, policies, and settings. Can automate tasks: Create scripts for provisioning, monitoring, and troubleshooting. Can integrate with third-party systems: Connect Meraki data with other applications and services. Can develop custom applications: Build applications leveraging Meraki data for specific use cases. Can't access sensitive data: Limited access to sensitive information like user credentials. Can't perform all management tasks: Some administrative actions may not be available via API. Can't bypass security measures: API calls are subject to authentication and authorisation checks. Can't modify firmware or hardware: Limited control over device firmware and hardware components. Can't guarantee real-time updates: API responses may have latency, not suitable for real-time applications.
API documentation
Yes
API documentation formats
  • HTML
  • ODF
  • PDF
  • Other
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
Dashboard Layout: Users can customise the layout of the dashboard by rearranging and resizing the various widgets and panels to prioritise the information that is most relevant to them.

Dashboard Preferences: Users can customise various preferences related to the dashboard interface, such as the time zone, date format, language preference, and default view.

Alerts and Notifications: Users can customise alerts and notifications to receive notifications for specific events or conditions within their network, such as device connectivity issues or security alerts.

Reports and Analytics: Users can customise reports and analytics dashboards to track and analyse various aspects of their network performance, usage, and security.

Network Configuration: Users can customise network configurations, such as VLANs, firewall rules, access policies, and quality of service (QoS) settings, to meet the specific requirements of their organisation.

User Access and Permissions: Users can customise access control and permissions settings to control who has access to the dashboard and what actions they can perform.

Scaling

Independence of resources
Service Level Agreements (SLAs): which outline expected response times, resolution times, and availability of support services. Tiered Support Structure: with multiple levels of support, such as first-line, second-line, and third-line support. 99.99% Availability of data centres with multiple failsafe and redundancy options.

Analytics

Service usage metrics
Yes
Metrics types
Meraki provides customers with service usage metrics encompassing network performance, user activity, and device utilisation. These metrics include data on bandwidth consumption, traffic patterns, application usage, and client device connections. Through the Meraki dashboard, customers can access real-time and historical data.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Cisco & Cisco Meraki

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Encryption of all physical media
  • Other
Other data at rest protection approach
MFA Authentication
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users export their data via their dashboard and requesting .csv export.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Meraki has an uptime of 99.99%. Re-solution has response SLA's in place. These are covered off in our documentation.
Approach to resilience
Available on request.
Outage reporting
- Real-time dashboard: Displays status updates and alerts for network outages and service disruptions.
- Email notifications: Sends automated emails to users informing them of detected outages or service interruptions.
- In-app notifications: Alerts users within the Meraki dashboard interface about any ongoing outages or issues.
- Service status page: Provides a dedicated webpage where users can check the current status of Meraki services and any reported outages.
- Support ticketing system: Allows users to report outages directly to Meraki's support team for investigation and resolution.
- Proactive communication: Meraki may proactively reach out to affected users via email or other communication channels to notify them of outages and provide updates on resolution efforts.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Other
Other user authentication
- Email-Based Authentication: Users are prompted to provide their email address and must click on the verification link in the email to authenticate their identity. - Role-Based Access Control (RBAC): Once authenticated, users are granted access to the dashboard based on their assigned roles and permissions. - Single Sign-On (SSO): Users log in to the dashboard using their corporate credentials through integration with identity providers such as Active Directory, LDAP, or SAML-based authentication. - Two-Factor Authentication (2FA): Users must provide a second form of verification, such as a one-time passcode generated by a mobile authenticator app or sent via SMS.
Access restrictions in management interfaces and support channels
Role-Based Access Control: To restrict access to management interfaces based on user roles and permissions. Multi-Factor Authentication: An additional security measure to protect access to management interfaces. IP Whitelisting: To restrict access to the Meraki dashboard from specific IP addresses or ranges. Audit Logs and Monitoring: Dashboard logs all user activities and access attempts. Encrypted Communication Protocols: In use to secure data transmitted between users' devices and the management interfaces. Restricted Support Channels: Cisco Meraki restricts access to its support channels, such as phone support and live chat, to authorised individuals with valid support contracts.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Other
Description of management access authentication
- Email-Based Authentication: Users are prompted to provide their email address and must click on the verification link in the email to authenticate their identity. - Role-Based Access Control (RBAC): Once authenticated, users are granted access to the dashboard based on their assigned roles and permissions. - Single Sign-On (SSO): Users log in to the dashboard using their corporate credentials through integration with identity providers such as Active Directory, LDAP, or SAML-based authentication. - Two-Factor Authentication (2FA): Users must provide a second form of verification, such as a one-time passcode generated by a mobile authenticator app or sent via SMS.

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
03/08/2018
What the ISO/IEC 27001 doesn’t cover
While ISO/IEC 27001 certification provides a comprehensive framework for establishing, implementing, maintaining, and continually improving an ISMS, there are certain aspects it may not cover: Physical Security: While ISO/IEC 27001 includes requirements for physical security controls, such as access control and protection of facilities, it may not address every aspect of physical security in detail. Third-Party Security: ISO/IEC 27001 requires our company to assess and manage risks associated with third-party relationships, including suppliers, partners, and service providers. However, it may not cover every aspect of third-party security management, such as contractual agreements, service level agreements, and ongoing monitoring of third-party security practices. Emerging Threats and Technologies: Information security threats and technologies are continually evolving. While ISO/IEC 27001 provides a framework for managing information security risks, it may not address every emerging threat or technology.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
  • Cisco CCNA
  • Cisco CCNP

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
We have a comprehensive Information Security Policy that outlines our commitment to protecting sensitive information. We maintain strict access control policies to limit access to sensitive systems and data only to authorised personnel. We have an established Incident Response Plan that outlines the steps to be taken in the event of a security incident or breach. We perform regular audits and assessments of our information security controls to ensure compliance with internal policies, industry standards, and regulations. We have a dedicated Information Security Officer responsible for overseeing our information security program and ensuring compliance with relevant policies and regulations. Employees are encouraged to report any security incidents, concerns, or policy violations to the Information Security Team or the designated incident response contact, either through internal reporting mechanisms or directly to their supervisors. We conduct regular monitoring and review of our information security controls to ensure compliance with policies and identify any gaps or areas for improvement. Policy violations are taken seriously, and appropriate enforcement measures are implemented to address non-compliance. We continuously review and update our information security policies and processes to adapt to evolving threats, ensuring that our security measures remain effective and aligned with best practices.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Configuration Management: - Asset Inventory: We maintain a comprehensive inventory of all components and assets of our services. - Version Control: We utilise version control systems to manage changes to configuration files. This ensures that changes are tracked, documented, and easily reversible. Change Management: - Change Request Process: All changes are subject to a formal change request process. This process includes submitting a change request, assessing the potential impact of the proposed change, obtaining approval, and implementing the change. - Security Impact Assessment: Proposed changes undergo a thorough security impact assessment to identify potential security risks and vulnerabilities.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
- Continuous Monitoring: We employ continuous monitoring mechanisms to detect potential threats and vulnerabilities in our systems and services. - Threat Intelligence Feeds: We subscribe to reputable threat intelligence feeds and security advisories provided by industry organisations, government agencies, security vendors, and trusted information sharing platforms. - Patch Management Process: We have a structured patch management process in place to deploy security patches and updates promptly across our systems and services. - Vendor Security Advisories: We closely monitor security advisories and bulletins issued by software and hardware vendors for information about newly discovered vulnerabilities and available patches.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We employ continuous monitoring tools and technologies to collect and analyse security-relevant data from various sources, including network traffic, system logs, and user activity. We deploy intrusion detection and prevention systems ,security information and event management solutions tools to detect known threats, zero-day exploits, malware infections, and unauthorised access attempts. We have a documented incident response plan that outlines the steps to be taken in the event of a security incident or compromise. We aim to respond to security incidents promptly and efficiently. Response times vary depending on the severity and are guided by predefined SLAs.
Incident management type
Supplier-defined controls
Incident management approach
We maintain pre-defined incident management processes for common events such as service outages, performance degradation, security incidents, and other disruptions to our services. Users can report incidents through various channels, including, Service desk ticketing systems, Email, Phone. Upon receipt of an incident report, our incident response team initiates the incident management process according to predefined procedures. Incidents are categorised and prioritised based on their severity, impact on services, and urgency of resolution. Once an incident is resolved, we provide incident reports to affected users to summarise the details of the incident.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

1. Carbon Neutrality:
By January 2030 Re-solution Data Ltd aims to achieve carbon neutrality by implementing measures to reduce our carbon footprint. This includes enhancing energy efficiency in our operations, investing in renewable energy sources, and offsetting any remaining emissions through verified carbon offset programs.

2. Energy Efficiency:
Reduce overall energy consumption by 30% by 2028. This will be achieved through the implementation of energy-efficient technologies, regular energy audits, and the promotion of sustainable practices across all company facilities.

3. Waste Reduction:
Decrease waste generation by 75% by 2030. We will focus on minimising single-use plastics, promoting recycling initiatives, and adopting circular economy principles to ensure responsible waste management.

4. Sustainable Procurement:
By 2030, Re-solution Data Ltd commits to sourcing a minimum of 75% of our products and services from suppliers who adhere to environmentally responsible practices. This includes selecting suppliers with sustainable sourcing, ethical labor practices, and a commitment to reducing their own environmental impact.

5. Paperless Operations:
Transition to a paperless office environment by 2027. This goal involves the digitisation of internal processes, reducing reliance on paper-based documentation, and promoting electronic communication and collaboration tools.

6. Employee Engagement:
Foster a culture of environmental sustainability among employees by providing training programs. Encourage employees to contribute ideas and actively participate in achieving our sustainability goals.

7. Continuous Improvement and Reporting:
Regularly assess and improve our environmental sustainability practices. Re-solution Data Ltd will conduct annual reviews of our progress, communicate transparently about our achievements and challenges, and seek opportunities for continuous improvement in our sustainability performance.

These goals are designed to guide Re-solution Data Ltd in its journey towards becoming a more environmentally sustainable organisation. Regular monitoring, reporting, and engagement with stakeholders will be integral to the success of these initiatives.

Covid-19 recovery

We believe our Managed Network & Security service can play a pivotal role in supporting Covid-19 recovery efforts in several ways:

- Enabling Remote Work: With the transition to remote work during the pandemic, reliable network connectivity and secure access to resources have become crucial. Employees can effectively and securely work remotely, aiding business continuity and supporting economic recovery efforts.

- Supporting Distance Learning: As educational institutions adopt online learning models, our service helps ensure that students, teachers, and administrators can securely access educational resources from any location. This supports educational continuity and helps mitigate the impact of school closures on students' academic progress.

- Enhancing Cybersecurity Resilience: The Covid-19 pandemic has led to a rise in cyber threats targeting remote workers, healthcare organisations, and critical infrastructure. Our service enhances cybersecurity resilience by implementing robust security measures, conducting threat monitoring, and providing incident response capabilities, thereby protecting against cyber attacks and disruptions to essential services.

Overall, our Managed Network & Security service plays a vital role in supporting Covid-19 recovery efforts by enabling remote work and distance learning, enhancing cybersecurity resilience, and promoting business continuity and resilience in challenging times.

Tackling economic inequality

Supporting Small and Medium Enterprises (SMEs): We offer affordable and scalable network and security solutions, enabling SMEs to compete effectively, grow their businesses, create jobs, and contribute to economic growth, thereby reducing inequality.

Enabling Remote Work and Access to Opportunities: Our robust managed network service facilitates remote work, providing access to job opportunities and educational resources across diverse backgrounds and locations, bridging the digital divide and reducing economic inequality.

Protecting Against Cyber Threats and Data Breaches: Our service safeguards against cyber threats and data breaches, protecting sensitive information and financial assets for all stakeholders, thus reducing the impact of cybercrime on economic inequality.

Enhancing Access to Critical Services: We ensure reliable network connectivity and secure access to digital services, crucial for accessing healthcare, financial services, and government resources. Our compliance with accessibility standards ensures equal access for users with disabilities, promoting economic equality.

Accommodating Diverse Workforce Needs: With user-friendly interfaces, multilingual support, and culturally sensitive security policies, we cater to diverse workforce needs, ensuring equal opportunity for all users to utilise digital resources effectively and securely.

Equal opportunity

Re-solution believes the skills, capabilities and talents of its employees are the key to its success. Re-solution is fully committed as an equal opportunities’ employer, defined by its diversity and opposition to all forms of unlawful and unfair discrimination.

Wellbeing

- Promote Work-Life Balance: Our solutions enable remote work, reducing commuting stress and allowing for more flexible work arrangements.

- Enhanced Security: Secure network infrastructure and data protection measures alleviate concerns about cyber threats, promoting peace of mind.

- Encourage Collaboration: Seamless communication tools foster teamwork and social connections, improving morale and job satisfaction.

- Enable Personal Development: Access to online learning resources and remote training opportunities supports continuous professional growth and skill development.

Pricing

Price
£1 to £100,000 a unit a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Full trials available with all features included. There are zero restrictions on trial devices / features. Trials can be utilised for 30 days with extensions possible.
Link to free trial
https://re-solution.co.uk/trials/

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@re-solution.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.