The following proposal seeks to conduct research and documentation on the Cisco Meraki tool, since currently most mining and industrial companies have a very old or obsolete telecommunications network infrastructure, which leads to problems of reliability and information security, as well as vulnerabilities and security breaches in the network, These can be exploited by ill-intentioned users who know that when manufacturers stop supporting network devices or software due to their age, they stop releasing updates, which translates into attack opportunities, which is why new technologies must be sought to meet all the current and future needs of companies. On the other hand, it has been evidenced that this type of companies suffers from a common problem, which is the difficulty to access, manage and control the telecommunications network in the mines where it operates, this problem can be solved with a system that provides flexible, scalable, highly available telecommunications infrastructure, with visibility and remote access; as well as centralized configuration and management using cloud technology. Considering that, when a company decides to grow and decides to expand it must have new infrastructure, this process in a traditional telecommunications network ends up being extensive and tedious to manage, this because once installed network devices must physically go to the site to perform maintenance, software reinstallations, firmware upgrades or any basic configuration on the network device. This generates an impact on response times, KPI's and revenues for companies, not to mention the limited and complex access to some sites due to environmental, military and geological factors; this is why it becomes necessary to update the enterprise network proposing a new scheme in which these points are optimized and improve the management, flexibility, control and visibility 360 for companies in the industrial mining sector. In terms of network security, some measures are not sufficient, since there are techniques that can divert or intercept wireless network traffic for their own benefit and it is not possible to detect and control them. Fortunately, systems have been implemented to detect intruders in the network and protect against any anomaly that threatens the security of the information within the network, such systems can be Firewall, WIDS, WIPS and others. There are even tools that allow observing the network traffic in real time, monitoring users connected to the network, what bandwidth they are using and several additional tools that can help us to monitor in terms of security and network management, obviously provided by the Cisco Meraki solution.