Cisco Meraki
By integrating Cisco Meraki with ThreatDefence via the Meraki Dashboard APIs, you can stream network, device, and security events directly into ThreatDefence for comprehensive visibility and centralized incident management.
This integration enables ThreatDefence to monitor activity across Meraki-managed devices—including firewalls, switches, wireless access points, and endpoints—allowing correlation with other security data to detect threats, enforce policies, and accelerate response.
Step 1. Obtain Your Meraki API Key
To interact with the Meraki Dashboard API, you must first obtain an API key:
Open your Meraki dashboard at https://dashboard.meraki.com.
Navigate to Organization → Settings.
Ensure the setting Enable access to the Cisco Meraki Dashboard API is turned on.
Click your account email address in the top-right corner and go to My Profile.
Generate your API Key.
Step 2. Configure ThreatDefence Integration
Provide the following information to your ThreatDefence representative at 📧 [email protected]:
API Key
Support
For questions or assistance, please contact: 📧 [email protected]
Last updated