What are two key capabilities of Meraki? (Choose two.)
A. identity-based and device-aware security
B. application visibility and control
C. device profiling
D. contextual awareness
E. security automation
What are two key capabilities of Meraki? (Choose two.)
A. identity-based and device-aware security
B. application visibility and control
C. device profiling
D. contextual awareness
E. security automation