Cisco Meraki vs Veeam

NinjaOne

Ratings

Cisco Meraki

Veeam

NinjaOne Logo®

Overall

4.3
4.6

4.8

Meets Requirements

8.8
151 responses
9.4
482 responses

9.2

905 responses

Ease of Use

9
152 responses
9
485 responses

9.3

912 responses

Ease of Setup

9.1
129 responses
8.7
417 responses

9.4

804 responses

Ease of Admin

9.2
131 responses
9
415 responses

9.5

80 responses

Quality of Support

8.3
141 responses
9
415 responses

9.4

876 responses

Ease of Doing Business with

8.6
126 responses
8.9
425 responses

9.6

808 responses

Product Direction (% positive)

8.5
149 responses
9
467 responses

9.8

897 responses

Based on G2 Spring 2024

Competitors

Cisco Meraki

Product Summary

Cisco Meraki is a brand within Cisco that specializes in cloud-managed networking solutions. Its mobile device management (MDM) feature, offered through Systems Manager, provides centralized management and security for various mobile devices within your organization.

Use Cases

  • Security:
    Cisco Meraki’s MDM enforces security policies to protect device data, apply restrictions, and control usage with passcode policies.
  • Content management:
    The platform’s on-device content management lets technicians deploy and manage apps, images, documents, and other files on Android devices.
  • Geolocation:
    Cisco Meraki’s geolocation capabilities allow users to locate managed devices and enforce security policies based on a device’s location.

Shortcomings

  • Brand customization:
    It would be helpful if the platform had more flexibility for customizing the user interface (UI) to match your company’s branding.
  • Log information:
    The customer portal lacks some necessary log information, making it challenging for technicians to swiftly analyze and troubleshoot.
  • Limited integrations:
    Cisco Meraki MDM reviews state that there are few third-party integrations available.

Veeam

Product Summary

Veeam is an IT security business that specializes in data protection and ransomware recovery. Veeam focuses on providing data security, data recovery, and data freedom for IT teams regardless of their locations. Veeam users gain access to secure data backup, recovery, and storage services to protect their data anytime, anywhere.

Use Cases

  • Data backup:
    Users are able to streamline their backup processes while still retaining control over their data.
  • Ransomware recovery:
    Veeam helps IT teams recover quickly from ransomware attacks due to its data storage and instant recovery features.
  • Infrastructure monitoring and reporting:
    Veeam provides performance monitoring for backup infrastructure components.

Shortcomings

  • Challenging initial setup:
    New users find that the initial configuration is challenging and time-consuming.
  • Complex interface:
    G2 reviews report that the platform can be difficult to navigate and use to its full potential.
  • Minimal reporting:
    Performance reporting for agents is minimal and might not provide all the necessary information.

NinjaOne

Why your peers choose us over Cisco Meraki and Veeam

NinjaOne sets itself apart with its exceptional customer reviews, usability and comprehensive integration options, positioning it ahead of its competitors. The platform’s interface is expertly crafted for both quick adoption and ease of use, vital for dynamic IT environments. This focus on user experience doesn’t compromise its robust feature set, which is designed to boost operational efficiency, an area where many competitors struggle.

In terms of integration, NinjaOne shines by offering extensive compatibility with a wide array of third-party applications, an area where other RMM solutions often have limitations. This makes it a more adaptable choice for varied IT ecosystems. Furthermore, NinjaOne’s scalability and performance consistency, even in large network scenarios, mark it as a superior option. Enhanced by advanced, customizable reporting tools, NinjaOne emerges as a leading choice for IT professionals seeking a dependable, efficientRMM platform.

What they're saying

G2 5-star rating
Software Advice 5-star rating

Watch a Demo of the #1 IT Management Software on G2

This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is for validation purposes and should be left unchanged.

Related resources

Cisco Meraki

×

See NinjaOne in action!

By submitting this form, I accept NinjaOne's privacy policy.