We use this solution to protect the network especially when someone brings their own device and to lock out access to anybody connecting to the network. Also to make sure that the people connect to the correct VLAN. So, mainly for security wifi access so that when people want to connect to our wifi they have to log in using their credentials.
OPCO IT Manager at MTN
Enables us to protect our network but it should be more user-friendly
Pros and Cons
- "For guests we give them limited access to the internet when they come in so that access has been useful. Previously, we just used to give them the APN key which they would leave with. Now, we give them credentials to use that are for a limited period of time."
- "In order to make it a ten, it should be more user-friendly. You need somebody who is knowledgeable about it to use it. It's not easy to use. We have to rely heavily on technical support."
What is our primary use case?
How has it helped my organization?
We give guests limited access to the internet when they come in so that access has been useful. Previously, we just used to give them the APN key which they would leave with. Now, we give them credentials to use that are for a limited period of time.
For how long have I used the solution?
Less than one year.
What do I think about the stability of the solution?
It is stable. Any time we found an issue we would get in touch with the reseller to help fix it. Then they tell us where the problem is and we'll know where to look.
Buyer's Guide
Cisco Identity Services Engine (ISE)
December 2024
Learn what your peers think about Cisco Identity Services Engine (ISE). Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,067 professionals have used our research since 2012.
What do I think about the scalability of the solution?
It is scalable. We have around 350 users. We required two staff members for maintenance but they don't have enough knowledge so we have to reach out externally for more help.
How are customer service and support?
Their technical support has been good. They have been responsive every time we have an issue. They get logs, check and then give us feedback of which corrections to do.
How was the initial setup?
The initial setup was complex. We had to engage an expert. When we rolled it out we would find challenges and then we would have to find a way of fixing those challenges. Out of nowhere, it would lock out all users. Then we discovered that no, the password had expired for the service account. We needed to make it none expiry.
Deployment took about a month. We had to do project planning, discuss the plan with the team, and by the end, it was a month.
What about the implementation team?
We used a reseller for the implementation and we had a good experience with them.
What's my experience with pricing, setup cost, and licensing?
If you go directly with Cisco for the implementation it's very, very expensive.
Which other solutions did I evaluate?
We also looked at Aruba.
What other advice do I have?
It's a good product but it requires technical support and knowledge otherwise it will be difficult to manage and run it. It requires somebody to be configuring issues. You need protection as you advance in the usage but it's a good product.
I would rate this solution an eight out of ten. In order to make it a ten, it should be more user-friendly. You need somebody who is knowledgeable about it to use it. It's not easy to use. We have to rely heavily on technical support.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Sr Manager Infrastructure at a financial services firm with 5,001-10,000 employees
Great network access control lets you know who's in your network at any time
Pros and Cons
- "I've had no issues with scalability. I started using it on two campuses, and now I'm using it across the country and scaling it across subsidiaries in other countries."
- "The intuitiveness of the user interface could be improved."
What is our primary use case?
My main uses are device administration, wireless access authentication, and ethernet access.
What is most valuable?
The most valuable feature is network access control for the users coming into the network, which allows us to know who is in the network at any given time.
What needs improvement?
The intuitiveness of the user interface could be improved. They could also make the deployment process more user-friendly.
For how long have I used the solution?
I have two years of experience with this solution.
What do I think about the stability of the solution?
ISE is very stable - since it was installed, I've had no issues with it.
What do I think about the scalability of the solution?
I've had no issues with scalability. I started using it on two campuses, and now I'm using it across the country and scaling it across subsidiaries in other countries.
How are customer service and support?
I've worked closely with Cisco for many years and have no complaints about their support. Sometimes it takes less than a couple of minutes to get through to their support team.
Which solution did I use previously and why did I switch?
I previously used Portnox, but it only gave us network access control, so we switched to ISE, which has more features like device administration.
How was the initial setup?
Deployment is usually tough the first time, though once you get it working, it works well.
What about the implementation team?
We used in-house engineers and an integrator.
What's my experience with pricing, setup cost, and licensing?
We have a three-year license. Standard licensing gives backup access and very few features, and then there's VM licensing - each VM we use needs to be licensed. VM licensing comes in different sizes: small, medium, and extra-large. There are also licenses for features, posturing licenses, and profiling licenses.
What other advice do I have?
Before deploying, it's a good idea to read up on the product first and then get some training so that when deployed, someone in the organization understands the solution. I would rate this solution as nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Cisco Identity Services Engine (ISE)
December 2024
Learn what your peers think about Cisco Identity Services Engine (ISE). Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,067 professionals have used our research since 2012.
Assistant general manager at Beximcocomputers
Highly-Recommended Solution with Commendable Integration Capabilities
Pros and Cons
- "The valuable feature of the solution lies in its integration capabilities with other applications."
- "The tracking mechanism in Cisco ISE is relatively costly, especially its vendor-specific protocol."
What is our primary use case?
We primarily use the solution for network access control solution and network device access management. The solution comes with features like posturing.
What is most valuable?
The valuable feature of the solution lies in its integration capabilities with other applications. This facilitates seamless operations like Microsoft migration across networks and call center management. The ability to segregate multiple domain users in the Access Network ensures efficient, logical management.
What needs improvement?
The tracking mechanism in Cisco ISE is relatively costly, especially its vendor-specific protocol. It would be beneficial if it could support open source or other devices with a similar checking mechanism, but unfortunately, it remains proprietary.
For how long have I used the solution?
I have been working with the solution for the past five years.
What do I think about the stability of the solution?
The solution is highly-stable. I rate it a perfect ten.
What do I think about the scalability of the solution?
The solution is scalable. We have three users for the Cisco ISE.
How are customer service and support?
Their customer service and support is excellent.
How would you rate customer service and support?
Positive
How was the initial setup?
The setup is straightforward. Effective planning is crucial for the setup of Cisco ISE. Placement of the virtual solution requires careful consideration of network accessibility from all branches. Different components may need placement in various areas in a large network. So, thoughtful planning for the architecture is important. It takes around two days for the deployment.
What's my experience with pricing, setup cost, and licensing?
Previously, Cisco ISE had a perpetual licensing model, but now they have shifted to a subscription-based licensing system. We now have to pay recurring costs. This change in the pricing model has presented challenges for many customers accustomed to the simplicity of the previous licensing model.
What other advice do I have?
I recommend this solution to all. Overall, I rate it a perfect 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
IT Architect at a tech services company with 501-1,000 employees
Enabled features that were not present or possible before but it needs a lot of resources to run
Pros and Cons
- "For customers, it's great. It has a GUI, so the customers themselves can edit ACLs or even modify the policies. It's also an all-in-one solution with RADIUS and TACACS."
- "I'm frustrated by the resource consumption and how many resources it needs to run. It takes a lot of RAM. It takes a lot of space and a lot of IO power. It's frustrating to do upgrades because it takes a long time."
What is our primary use case?
At first, Cisco ISE was a replacement for only ACS RADIUS. It was mostly for remote access VPNs and Wi-Fi. That was it, and later, it evolved into a complete ACS replacement, so it's for both TACACS and RADIUS. Nowadays, we also deploy .1X quite a lot.
How has it helped my organization?
It was a driver towards .1X. With the features that were there on the network side and the features that were there with Cisco ISE, it was way easier to go to .1X.
It's the brain of many things. It's the brain for VPNs. In Cisco ISE, we control where the users are allowed to go. Customers are able to do that by themselves. It's the same for .1X. It's the heart of security.
Cisco ISE improved our cybersecurity resilience. It enabled features that were not present or possible before.
What is most valuable?
For customers, it's great. It has a GUI, so the customers themselves can edit ACLs or even modify the policies. It's also an all-in-one solution with RADIUS and TACACS.
What needs improvement?
I'm frustrated by the resource consumption and how many resources it needs to run. It takes a lot of RAM. It takes a lot of space and a lot of IO power. It's frustrating to do upgrades because it takes a long time. Things are at a much smaller scale where we are than in the US. We even have smaller virtualization farms, so it takes a considerable amount of power and resources.
For how long have I used the solution?
We've been using this solution since its initial release. It was probably version 1.1 or 1.2.
How are customer service and support?
I don't remember opening a case for Cisco ISE except for the licensing problems, but several years ago, it took some time for people to get to the right way to solve the problem. I am not sure whether it was my inability to clarify the situation or whether it was a matter of poor training, but it was sometimes very painful.
How was the initial setup?
I've been working with this product for a while. It doesn't seem difficult. However, in terms of resources, it takes a while to get it running. I don't think it's necessary to be so resource-consuming and slow. That makes it complicated.
What's my experience with pricing, setup cost, and licensing?
Pricing is where things got a bit more complicated. Previously, it was a one-time purchase and we just had to renew support. These days, there's a subscription model, which is supposed to be easier and cheaper as well, but it's more pricey. Customers are aware of that, and many vendors are going the same way. They are trying to go along with the new model.
Which other solutions did I evaluate?
We did consider other products, but it didn't make sense to go for any competing vendor because of the integration with other Cisco products. AnyConnect is the best VPN product I am aware of, and that's usually why we stick with Cisco.
We also sell HPE products. We've deployed some HPE RADIUS solutions, but we prefer Cisco these days.
What other advice do I have?
To someone researching this solution who wants to improve the cybersecurity in their organization, I would tell them to first think about what they are trying to achieve and then think about Cisco ISE as a tool. It isn't a turnkey solution.
It hasn't saved our IT staff's time. It was something that wasn't present before. It's an evolution that is necessary, but I wouldn't say it saves time.
It did help us consolidate any tools or applications. It was either a replacement of some legacy products or it was an improvement where it introduced new features that were not present before, but it didn't help get rid of some of the other products. It was a new thing to place into the network.
Overall, I'd rate Cisco ISE a six out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Network System Engineer at VSIS
Allows you to control or restrict access on your network and has a scalable licensing structure
Pros and Cons
- "The best features are the scalability and the license structure."
- "The licensing documentation needs to be better."
What is our primary use case?
The solution is used for controlled access in the network, like if you want to restrict access.
The solution is deployed on-prem. I am an integrator of this solution.
What is most valuable?
The best features are the scalability and the license structure. The license structure is like a tier. If a customer doesn't actually want the highest features, then they can just start with the basic license package and upgrade it if their network is growing. For the smaller customers, they can start with the smaller plans and so on. If you have a financial customer or banking customer, they can go for the full features, and if it's not that critical, the customer can get the basic license package and implement that.
What needs improvement?
The licensing documentation needs to be better. We found some old documents describing the license names, like the Base license and Apex license. Cisco used both names. We have found that they changed the Advantage license and Premier License. If someone misunderstands that, they might end up with a hassle. I don't know if it's possible or not for Cisco to remove the older documents from the official website.
For how long have I used the solution?
We have been working with this solution for more than two years.
We were using two solutions on Cisco's network, so we had a few ISE plans in that network.
What do I think about the stability of the solution?
The solution is stable. We have maybe 4,000 users for the Next solution.
How are customer service and support?
We haven't used technical support very much, but in general, Cisco's support is always responsive.
How was the initial setup?
Initial setup was straightforward from our point of view because we have engineers who did that, so of course it was not an issue with us.
The accesses took maybe three or four months to complete, but the Next part took about three weeks.
For deployment and maintenance, the team was average sized. You need to follow the correct documents for deployment. There can be misunderstandings if you use old documentation.
What's my experience with pricing, setup cost, and licensing?
The licensing is subscription-based and based on the user account.
What other advice do I have?
I would rate this solution 8 out of 10.
I would recommend this solution.
If someone is looking for a concrete solution to control the access, then ISE is a better solution.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Integrator
Network Engineer at a financial services firm with 201-500 employees
Helps to ensure that we're secure and no unauthorized devices are accessing the network
Pros and Cons
- "TACACS and .1X security are the most valuable features. TACACS acts for user control, so no one can authenticate to our network devices, and .1X is to validate that unauthorized devices are plugged into our network."
- "Its user interface could be better. It's not bad. They've just redesigned the whole user interface. It's not terribly difficult. The drop-down menus are easy to use. However, when you're looking for some things in the user interface, it takes a minute to find where you were prior."
What is our primary use case?
We use it for Cisco device TACACS authentication and .1X security.
How has it helped my organization?
We have a better state of mind that we're secure, and we don't have unauthorized devices accessing the network. In a financial institution, we want to keep everything as secure as possible. We don't want anything plugged in.
It has helped to consolidate tools. We had arpwatch monitoring, which we no longer have to use, and then TACACS is securing the network. We didn't have a tool before, so that added a layer of security for us.
It has improved our cybersecurity resilience. We have authentication logging for everything that's authenticated or denied. We use a Splunk forwarder. We get notifications if something is denied for authentication.
What is most valuable?
TACACS and .1X security are the most valuable features. TACACS acts for user control, so no one can authenticate to our network devices, and .1X is to validate that unauthorized devices are plugged into our network.
What needs improvement?
Its user interface could be better. It's not bad. They've just redesigned the whole user interface. It's not terribly difficult. The drop-down menus are easy to use. However, when you're looking for some things in the user interface, it takes a minute to find where you were prior.
For how long have I used the solution?
I've been using Cisco ISE for a year.
What do I think about the stability of the solution?
Its stability is great.
What do I think about the scalability of the solution?
Its scalability is also great. We have 350 users.
How are customer service and support?
Their support is excellent. I've opened two support tickets so far, and they were able to remediate the issue within a few hours.
How was the initial setup?
It's fairly difficult. We have third-party support to assist with the setup.
Our setup is on-prem and virtual in Azure.
What about the implementation team?
It was a third-party support, not a reseller.
What other advice do I have?
It's a very good tool for security. It's a lot of work to initially set up, but once it's set up, it's pretty easy to use.
It hasn't yet saved the time of our IT staff. It's still fairly new, so we haven't had much time to use the product fully. It has only been a year since we started using it, so it's still pretty new.
Overall, I'd rate Cisco ISE a nine out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
IT Manager at Shanta Mining
Lacks properly knowledgeable support, but has stability
Pros and Cons
- "So far, we have had no issues with the stability."
- "The solution lacks properly knowledgeable support, especially internationally, and this is why I am exploring other applications."
What is our primary use case?
I am not certain if I am using the latest version. It is the one which is made for TV.
We use the solution to access control. Prior to any device being authenticated on the network, a person must login to the solution's site for authentication purposes.
What is most valuable?
While the solution has a host of features, we only use the one involving access control.
We are looking into further uses for it. My aim is to deploy it across all three of our sites and not just one.
What needs improvement?
There is much room for improvement, especially after having perused the documentation on the solution's website.
The solution lacks properly knowledgeable support, especially internationally, and this is why I am exploring other applications.
I would need time to expand my knowledge of the solution and consult with the Cisco engineers before I could point to other pain points.
For how long have I used the solution?
I have been using Cisco ISE (Identity Services Engine) since 2015.
What do I think about the stability of the solution?
So far, we have had no issues with the stability.
How are customer service and technical support?
There should be more knowledgeable support, particularly in the international sphere.
I have no doubt that we will get there. They contacted me yesterday, which makes it likely that by weeks-end we should be able to build a structure and do many things with the solution. This would allow me to know where I am standing, explore further and even examine the possibility of implementing some of Cisco's other features.
Which solution did I use previously and why did I switch?
We did not use other solutions prior to the current one and will likely not explore others in the future. The current one should be fine.
How was the initial setup?
The installation was straightforward, although it will likely involve a more complex implementation in the future.
As the previous installation was not complex, it did not take long.
What's my experience with pricing, setup cost, and licensing?
I believe I have paid around $1,000 in licensing fees. The license is annual.
Which other solutions did I evaluate?
We did not really explore other options prior to using the solution. We considered Fortigate, but found it to not be very straightforward, which is why we decided to go with the current solution.
What other advice do I have?
While we have focused on the access control aspects of the solution, the documentation demonstrates that it has many more features, so I would like to explore it further.
We are customers of Cisco.
At the moment, we have around 250 users making use of the solution.
I rate Cisco ISE (Identity Services Engine) as a five out of ten. This is because I wish to explore further any additional features that can add value to our organization, especially on the IT security side.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Associate Consultant at a computer software company with 201-500 employees
Streamlines security policy management and reduces operating costs
Pros and Cons
- "In terms of features, I think they've done a lot of improvement on the graphical user interface — it looks really good right now."
- "An issue with the product is it tends to have a lot of bugs whenever they release a new release."
What is our primary use case?
Our use cases are based around dot1x. Basically wired and wireless authentication, authorization, and accounting.
In terms of administration, only our networking team uses this solution. Probably five to ten administrators manage the whole product. Their role pretty much is to make sure that we configure the use cases that we use ISE for — pretty much for authenticating users to the wired and wireless networks. We might have certain other advanced use cases depending on certain other business requirements, but their job is pretty much to make sure all the use cases work. If there are issues, if users are complaining, they log into ISE to troubleshoot those issues and have a look at the logs. They basically expand ISE to the rest of the network. There is ongoing activity there as well. The usage is administrative in nature, making sure the configurations are okay, deploying new use cases, and troubleshooting issues.
How has it helped my organization?
This solution has definitely improved the way our organization functions.
What is most valuable?
In terms of features, I think they've done a lot of improvement on the graphical user interface — it looks really good right now. ISE is always very complicated to deploy because it's GUI-based. So they came up with this feature called work centers, that kind of streamlines that process. That's a good feature in the product right now.
What needs improvement?
An issue with the product is it tends to have a lot of bugs whenever they release a new release.
We've always found ourselves battling out one bug or another. I think, overall they need to form a quality assurance standpoint. ISE has always had this issue with bugs. Even if you go to a Cisco website and you type all the bug releases for ISE, you'll find a lot of bugs. Because the product is kind of intrusive, right? It's in the network. Whenever you have a bug, if something doesn't work, that always creates a lot of noise. I would say that the biggest issue we're having is with all the product bugs.
Also, the graphical user interface is very heavy. By heavy, I mean it's quite fancy. It's equipped with a lot of features and animations that sometimes slow down the user interface.
It's a technical product — I don't think a lot of engineers really need fancy GUIs. We pretty much look for functionality, but I think Cisco, for some reason, is putting an emphasis on its GUIs looking better. We always look for functionality over fancy features.
We've had issues with different browsers, and sometimes it's really slow. From a functionality standpoint, we would rather the GUI was light and faster to navigate.
ISE has a very good logging capability but because their GUI is so slow, we feel it's not as flexible or user-friendly as we would like it to be, especially when it comes to monitoring and logging. At the end of the day, we're implementing ISE for security. And that means visibility.
Of course, you can export the data into other products to get that visibility, but we would like to have a better type of monitoring, maybe better dashboards, and better analytics capabilities within the product.
Analytics is one thing that's really lacking. Even if you're to extract a report, it just takes a lot of time. So, again, that comes down to product design, but that's definitely an area for improvement. I think it does the job well, but they can definitely improve on the monitoring and analytics side.
For how long have I used the solution?
I have been using this solution since they released the first version over ten years ago.
What do I think about the scalability of the solution?
Scalability is pretty good, provided that you design it properly from the get-go. There are design limitations, depending on the platforms, especially the hardware platforms that you select. On the scalability front, it's not a product that can be virtualized very well — that's an issue. Because in the world of virtualization, customers are always looking for products that they can put in their virtual environments. But ISE is not a truly virtualized product, as in it doesn't do a lot of resource sharing.
As a result, it's not truly virtualized. Although they do have the VM offering, it's not virtualization in the proper sense of the word. That's one limitation of the product. It's very resource-intensive. As a result, you always end up purchasing additional hardware, actual ISE physical servers. Whereas, we would like to have it deployed in virtual machines if it was better designed. I think when it comes to resource utilization, it probably isn't optimized very well. Ideally, we would like to have a better-virtualized platform.
How are customer service and technical support?
Tech support tends to be pretty good for ISE. We do use it extensively because of all of the bugs we encounter.
Mostly it's at the beginning of setting the whole environment up. Typically, once it's set up properly, it tends to work. But it's just that the product itself integrates with a lot of other products in the network. It integrates with your switches, with your APs, etc. So, it's a part of an ecosystem. What happens is, if those products experience bugs, then it kind of affects the overall ISE solution as well — that is a bit of a dependency. The ISE use cases are dependent on your network access devices, but that's just the nature of it. The only issue with support is you might have to open a ticket with the ISE team, but if you're looking at issues in your wireless network or switches, you might have to open another ticket with their tech team for switches.
For customers using Cisco, end-to-end, they should improve the integration and providing a seamless experience to the customer. But right now, they have to refer to other experts. They come in the call, but the whole process just takes some time.
That's an area that they can improve on. But typically, I would say that the support has been good. We've been able to resolve issues. They are responsive. They've been good.
Overall, I would give the support a rating of eight.
How was the initial setup?
The setup is not straightforward. It's complex. You need to have a high level of expertise.
What's my experience with pricing, setup cost, and licensing?
It's an expensive solution when compared to other vendors. It's definitely more expensive than ClearPass. It's expensive, but the issue, again, comes down to scalability. Because you can't virtualize the product, there's a lot of investment when it comes to your hardware resources. Your CapEx is one of the biggest issues here. That's something Cisco needs to improve because organizations are looking at reducing their hardware footprint. It's unfortunate that ISE is such a resource-intensive application to begin with. As it's not a properly virtualized application, you need to rely on physical hardware to get the best performance.
The CapEx cost is high. When it comes to operational expenditure, it all depends on the features you're using. They have their tiers, and it all depends on the features you're using. The basic tier, which is where most of the functionality is, is relatively quite cheap. But if you're using some advanced use cases, you need to go to their higher tiers. So, I'm not too worried about operations costs. You need to buy support for the hardware: you need space, power, and cooling for the hardware-side. All of that adds up. So, that all comes down to the product design and they need to make sure it's properly scalable and it's truly virtualized going forward.
Which other solutions did I evaluate?
We've evaluated other products, for example, Aruba ClearPass. There's another product, Forescout, but the use case is a bit different.
When it comes to dot1x authentication, I think it's ISE and Aruba ClearPass. Forescout also comes into the next space, but the use case is a bit different.
We prefer ISE because, I think if you're using Cisco devices, it really kind of integrates your ecosystem — that's why we prefer ISE. When it comes to NAC or dot1x products, from a feature standpoint, ISE has had that development now for 10 to 11 years. So, we've seen the product mature over time. And right now it's a pretty stable and functional product. It has a lot of features as well. So, I think the decision is mainly kind of driven by the fact that the rest of the ecosystem is Cisco as well. From a uniform figure standpoint, the other product is probably the industry leader at this point in time for network admission control.
What other advice do I have?
The main advice would be in terms of upfront design — this is where a lot of people get it very wrong. Depending on the platforms you choose, there are restrictions and limitations on how many users. We've got various nodes, so how many nodes you can implement, etc. Also, latency considerations must be taken into account; especially if you're deploying it across geographically dispersed regions. The main advice would be to get the design right. Because given that directly interferes with the network, if you don't get your design right it could be disruptive to the network. Once you've got the proper design in place and that translates into a bit of material, the implementation, you can always figure it out. Getting it right, upfront, is the most important thing.
Overall, I would give ISE a rating of eight out of ten. I don't want to give it a 10 out of 10 because of all the design issues. There is definitely room for improvement, but overall out there in the market, I think it's one of the best products. It has a good ecosystem. It integrates well with Cisco devices, but it also integrates with third-party solutions if you have to do that. It's based on open standards, and we've seen the ecosystem grow over the years. So, they're doing a good job in terms of growing the ecosystem and making sure ISE can work with other products, but there's definitely room for improvement on the product design itself — on monitoring, on analytics.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Buyer's Guide
Download our free Cisco Identity Services Engine (ISE) Report and get advice and tips from experienced pros
sharing their opinions.
Updated: December 2024
Popular Comparisons
Aruba ClearPass
Forescout Platform
Fortinet FortiNAC
F5 BIG-IP Access Policy Manager (APM)
ThreatLocker Zero Trust Endpoint Protection Platform
Sophos Network Access Control
Ruckus Cloudpath
macmon Network Access Control
ExtremeControl
Buyer's Guide
Download our free Cisco Identity Services Engine (ISE) Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- ForeScout vs. Cisco ISE
- What are the main differences between Cisco ISE and Forescout Platform?
- Can Cisco ISE disallow authentication based on OS?
- Cisco ISE (Identity Services Engine) vs Fortinet FortiNAC: which solution is better and why?
- What are the requirements for integrating the Cisco Data Center and Cisco ISE?
- What is the biggest difference between Aruba ClearPass and Cisco ISE?
- Which is better - Aruba Clearpass or Cisco ISE?
- How would you compare Cisco ISE (Identity Services Engine) vs Forescout Platform?
- How does Cisco ISE compare with Fortinet FortiNAC?
- What is your experience with 802.1X when using EnGenius WAP/switch with Cisco ISE 2.1?
Cisco Identity Service Engine l will give it an 8 out of 10 rate. It's stable and easily integrates with other network devices such as switches, routers and its central device management TACACS. The major challenge is in the new license model. Base, Plus and Apex licenses have been migrated to Essentials, Advantage and Premier. The new Cisco ISE licensing model Essentials, Advantage, and Premier licenses are term-based which limits end-user to fully utilize all the device features and functionality.