We use this solution to protect the network especially when someone brings their own device and to lock out access to anybody connecting to the network. Also to make sure that the people connect to the correct VLAN. So, mainly for security wifi access so that when people want to connect to our wifi they have to log in using their credentials.
OPCO IT Manager at MTN
Enables us to protect our network but it should be more user-friendly
Pros and Cons
- "For guests we give them limited access to the internet when they come in so that access has been useful. Previously, we just used to give them the APN key which they would leave with. Now, we give them credentials to use that are for a limited period of time."
- "In order to make it a ten, it should be more user-friendly. You need somebody who is knowledgeable about it to use it. It's not easy to use. We have to rely heavily on technical support."
What is our primary use case?
How has it helped my organization?
We give guests limited access to the internet when they come in so that access has been useful. Previously, we just used to give them the APN key which they would leave with. Now, we give them credentials to use that are for a limited period of time.
For how long have I used the solution?
Less than one year.
What do I think about the stability of the solution?
It is stable. Any time we found an issue we would get in touch with the reseller to help fix it. Then they tell us where the problem is and we'll know where to look.
Buyer's Guide
Cisco Identity Services Engine (ISE)
January 2025
Learn what your peers think about Cisco Identity Services Engine (ISE). Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,265 professionals have used our research since 2012.
What do I think about the scalability of the solution?
It is scalable. We have around 350 users. We required two staff members for maintenance but they don't have enough knowledge so we have to reach out externally for more help.
How are customer service and support?
Their technical support has been good. They have been responsive every time we have an issue. They get logs, check and then give us feedback of which corrections to do.
How was the initial setup?
The initial setup was complex. We had to engage an expert. When we rolled it out we would find challenges and then we would have to find a way of fixing those challenges. Out of nowhere, it would lock out all users. Then we discovered that no, the password had expired for the service account. We needed to make it none expiry.
Deployment took about a month. We had to do project planning, discuss the plan with the team, and by the end, it was a month.
What about the implementation team?
We used a reseller for the implementation and we had a good experience with them.
What's my experience with pricing, setup cost, and licensing?
If you go directly with Cisco for the implementation it's very, very expensive.
Which other solutions did I evaluate?
We also looked at Aruba.
What other advice do I have?
It's a good product but it requires technical support and knowledge otherwise it will be difficult to manage and run it. It requires somebody to be configuring issues. You need protection as you advance in the usage but it's a good product.
I would rate this solution an eight out of ten. In order to make it a ten, it should be more user-friendly. You need somebody who is knowledgeable about it to use it. It's not easy to use. We have to rely heavily on technical support.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Assistant general manager at Beximcocomputers
Highly-Recommended Solution with Commendable Integration Capabilities
Pros and Cons
- "The valuable feature of the solution lies in its integration capabilities with other applications."
- "The tracking mechanism in Cisco ISE is relatively costly, especially its vendor-specific protocol."
What is our primary use case?
We primarily use the solution for network access control solution and network device access management. The solution comes with features like posturing.
What is most valuable?
The valuable feature of the solution lies in its integration capabilities with other applications. This facilitates seamless operations like Microsoft migration across networks and call center management. The ability to segregate multiple domain users in the Access Network ensures efficient, logical management.
What needs improvement?
The tracking mechanism in Cisco ISE is relatively costly, especially its vendor-specific protocol. It would be beneficial if it could support open source or other devices with a similar checking mechanism, but unfortunately, it remains proprietary.
For how long have I used the solution?
I have been working with the solution for the past five years.
What do I think about the stability of the solution?
The solution is highly-stable. I rate it a perfect ten.
What do I think about the scalability of the solution?
The solution is scalable. We have three users for the Cisco ISE.
How are customer service and support?
Their customer service and support is excellent.
How would you rate customer service and support?
Positive
How was the initial setup?
The setup is straightforward. Effective planning is crucial for the setup of Cisco ISE. Placement of the virtual solution requires careful consideration of network accessibility from all branches. Different components may need placement in various areas in a large network. So, thoughtful planning for the architecture is important. It takes around two days for the deployment.
What's my experience with pricing, setup cost, and licensing?
Previously, Cisco ISE had a perpetual licensing model, but now they have shifted to a subscription-based licensing system. We now have to pay recurring costs. This change in the pricing model has presented challenges for many customers accustomed to the simplicity of the previous licensing model.
What other advice do I have?
I recommend this solution to all. Overall, I rate it a perfect 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Buyer's Guide
Cisco Identity Services Engine (ISE)
January 2025
Learn what your peers think about Cisco Identity Services Engine (ISE). Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,265 professionals have used our research since 2012.
Network Engineer at a financial services firm with 201-500 employees
Helps to ensure that we're secure and no unauthorized devices are accessing the network
Pros and Cons
- "TACACS and .1X security are the most valuable features. TACACS acts for user control, so no one can authenticate to our network devices, and .1X is to validate that unauthorized devices are plugged into our network."
- "Its user interface could be better. It's not bad. They've just redesigned the whole user interface. It's not terribly difficult. The drop-down menus are easy to use. However, when you're looking for some things in the user interface, it takes a minute to find where you were prior."
What is our primary use case?
We use it for Cisco device TACACS authentication and .1X security.
How has it helped my organization?
We have a better state of mind that we're secure, and we don't have unauthorized devices accessing the network. In a financial institution, we want to keep everything as secure as possible. We don't want anything plugged in.
It has helped to consolidate tools. We had arpwatch monitoring, which we no longer have to use, and then TACACS is securing the network. We didn't have a tool before, so that added a layer of security for us.
It has improved our cybersecurity resilience. We have authentication logging for everything that's authenticated or denied. We use a Splunk forwarder. We get notifications if something is denied for authentication.
What is most valuable?
TACACS and .1X security are the most valuable features. TACACS acts for user control, so no one can authenticate to our network devices, and .1X is to validate that unauthorized devices are plugged into our network.
What needs improvement?
Its user interface could be better. It's not bad. They've just redesigned the whole user interface. It's not terribly difficult. The drop-down menus are easy to use. However, when you're looking for some things in the user interface, it takes a minute to find where you were prior.
For how long have I used the solution?
I've been using Cisco ISE for a year.
What do I think about the stability of the solution?
Its stability is great.
What do I think about the scalability of the solution?
Its scalability is also great. We have 350 users.
How are customer service and support?
Their support is excellent. I've opened two support tickets so far, and they were able to remediate the issue within a few hours.
How was the initial setup?
It's fairly difficult. We have third-party support to assist with the setup.
Our setup is on-prem and virtual in Azure.
What about the implementation team?
It was a third-party support, not a reseller.
What other advice do I have?
It's a very good tool for security. It's a lot of work to initially set up, but once it's set up, it's pretty easy to use.
It hasn't yet saved the time of our IT staff. It's still fairly new, so we haven't had much time to use the product fully. It has only been a year since we started using it, so it's still pretty new.
Overall, I'd rate Cisco ISE a nine out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network engineer at Bimbo Bakeries USA
Is user-friendly, saves troubleshooting time, and is stable
Pros and Cons
- "The return on investment we have seen is related to time in terms of troubleshooting. The logs, such as the security logs, inform us of the issues that people have had. ISE has been very instrumental in helping isolate those issues. We've seen a lot of cost savings because we don't have to pay an IT person to waste time doing something that should be instantaneous."
- "On the network services devices, when you click on filter, the filter comes up. However, when I type in a search and I want to click on something it defaults back to the main page. I keep having an issue with that, and I'm not doing anything wrong."
What is our primary use case?
We use it for our AAA authentication through Active Directory. We also use it a lot to verify command line history.
We have ISE in the data center environment with redundancy, and we use it for authentication for all our devices. We have access to our third-party vendors, and for the new projects, we all use ISE. It's an awesome enterprise product for on-premises or for cloud-based deployments.
How has it helped my organization?
The integration of ISE with Active Directory has really been a big plus for us.
What is most valuable?
I've found two features to be the most valuable. One would be AAA reporting for historical analysis, showing what's been done and by whom. The second is the log for failures on Active Directory logins.
If I were to assess Cisco ISE for establishing trust for every access request, I would give it an eight or nine on a scale from one to ten.
Cybersecurity resilience has been very important to our organization and has been a big factor. We've had issues in the past, but one of the things I like about ISE is its logging features. Security-wise or information-wise, it really has been a powerful tool.
My impression of Cisco ISE for helping to support an organization across a distributed network is that it's invaluable. It's a monster tool; we don't even touch on all the features that it offers, but the few that we do use are extremely strong and very user-friendly.
What needs improvement?
On the network services devices, when you click on filter, the filter comes up. However, when I search and want to click on something it defaults back to the main page. I keep having an issue with that, and I'm not doing anything wrong.
For how long have I used the solution?
I've been using Cisco ISE (Identity Services Engine) for about six to seven years.
What do I think about the stability of the solution?
I've had no issues with stability.
What do I think about the scalability of the solution?
We've actually scaled before and have never had an issue.
How are customer service and support?
I've used technical support only once and would give them an eight out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously used ACS.
What was our ROI?
The return on investment we have seen is related to time in terms of troubleshooting. The logs, such as the security logs, inform us of the issues that people have had. ISE has been very instrumental in helping isolate those issues. We've seen a lot of cost savings because we don't have to pay an IT person to waste time doing something that should be instantaneous.
What other advice do I have?
If you are a leader who wants to build more resilience within your organization, I would advise you to follow what they're doing at ISE.
If you're evaluating Cisco ISE, do an apples-to-apples comparison. There are a lot of features, and ISE is a monster. If you use it the right way, I think that no other product will compare to it.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network engineer at a financial services firm with 1,001-5,000 employees
Enables us to define our policies and authenticate users based on them, eliminating threats
Pros and Cons
- "It integrates with the rest of our platform, like our firewall, and helps us a lot. It also does a good job establishing trust for every access request."
- "With the recent release of the solution, we had a bunch of bugs and we had to delay our deployment. Other than that, the solution is good."
What is our primary use case?
We use it for network device administration and for user access.
How has it helped my organization?
It has really helped us when it comes to security. It has eliminated trust from our network architecture because, with the solution in place, you tell us who you are and, based on who you are, we give you access. The solution provides us with a platform to define our policies. Users get into our system based on those policies. That eliminates threats. If you are not who you say you are, it will block you completely from our network.
What is most valuable?
It integrates with the rest of our platform, like our firewall, and helps us a lot. It also does a good job establishing trust for every access request.
What needs improvement?
With the recent release of the solution, we had a bunch of bugs and we had to delay our deployment. Other than that, the solution is good.
For how long have I used the solution?
I have been using Cisco ISE (Identity Services Engine) for 10 years.
What do I think about the stability of the solution?
Cisco ISE has come a long way when it comes to stability. It's getting better.
What do I think about the scalability of the solution?
It's very scalable. We have it deployed in two data centers, and we're managing about 10,000 endpoints.
How are customer service and support?
TAC is very responsive whenever we call them.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Currently we have two solutions that do the same kinds of things. For our wireless infrastructure, we use Aruba, but for our wired access, we use ISE.
What was our ROI?
The ROI we have seen is because Cisco gives us what they promised us. They deliver. Our requirements are being met and that results in getting value for what we pay.
What's my experience with pricing, setup cost, and licensing?
Since we have a complete Cisco portfolio, including an Enterprise Agreement, it's not simple for me to compare what we're paying with the prices of other platforms.
Which other solutions did I evaluate?
We evaluated other companies and what they each do differently and looked at what was the better fit for our requirements.
Cisco TAC is really good. Whenever we have issues, we know they are there and that they will help us out with troubleshooting. The support of the other companies we looked at is not that great.
When I compare it with Aruba ClearPass and other solutions out there, I prefer Cisco. Cisco is number-one for user access, managing devices, and for network devices.
We don't leverage Cisco ISE for application access. We have another solution for that.
What other advice do I have?
Get some hands-on familiarity with it first. Do a PoC and get people who really know the solution to help you out during phase one before you deploy it.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Security Solution Architect at a tech services company with 501-1,000 employees
Allows you to automate the collection of information
Pros and Cons
- "I like the automation of the collection of information."
- "One of the issues that we used to have was with profiling because we're working with a service provider that uses a lot of bring your own devices."
What is our primary use case?
We're using version 3.1, which is very stable. There have been a lot of improvements.
What is most valuable?
I like the automation of the collection of information.
What needs improvement?
We have only been deploying this version for three months. We haven’t had any issues, but we'll see how it goes. One of the issues that we used to have was with profiling because we're working with a service provider that uses a lot of bring your own devices. We haven't had any issues since we started using version 3.1.
For how long have I used the solution?
I have been using this solution for over 12 years.
What do I think about the stability of the solution?
There are no stability issues with version 3.1.
What do I think about the scalability of the solution?
It's stable. We deployed with a client in petroleum with about 200 users worldwide, and it was stable.
How was the initial setup?
Setup wasn't easy, especially if you haven’t worked with it intensively. VM is a little bit easier. If you don't deploy ISE with correct policies, it will be difficult.
If you deploy it with the correct policies, it's a wonderful product. You don't need to attach anything like your firewalls or creating rules.
What's my experience with pricing, setup cost, and licensing?
ISE has always been expensive compared to other products in terms of what it does on a user level. I haven't had a client who didn't say that ISE wasn't expensive. I’ve had an issue where I was just selling four boxes, and it was four million. It was a high-end box, and the client didn't take it. They end up going with VM.
What other advice do I have?
I would rate this solution 9 out of 10.
It's one of the more difficult products to deploy.
You can learn a lot about ISE from their training videos. I would suggest watching the videos before deploying the solution. They have created good videos for ISE, from version 1.3.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Solution Architect Telecom at a manufacturing company with 10,001+ employees
Okay technical support but hard to scale and not very stable
Pros and Cons
- "Technical support is okay."
- "The solution is not so user-friendly."
What is our primary use case?
We primarily use the solution for user authentication and wireless segmentation of users for actual radius purposes.
What is most valuable?
The actual radius is the most valuable aspect of the solution. We need to have a centric solution either on MarTech X and for the wireless user authentication. We were mainly on Cisco and we continue to use them. However, this is the time period for a refresh as the five-year lifespan is completed. We may look for other options.
Technical support is okay.
What needs improvement?
The solution is not so user-friendly. It's very difficult to navigate through different manuals. The documentation should be simplified so that it is easier to understand.
It would take time for a beginner to understand and familiarize themselves with the solution. There's a bit of a learning curve.
Cisco ISE is not very stable. They could work on that aspect.
We'd like the pricing to be better.
The product is not easily scalable.
Currently, if you want to do something with authentication, you need to have an additional document agent, however, these are short on all Microsoft endpoints. We then need to come up with some alternate options so that I don't have to modify any native applications on it. By default, Windows should be able to support and onboard the devices. Right now I need to have a Cisco AnyConnect as an agent to be deployed for authentication.
For how long have I used the solution?
I've been using the solution for over five years at this point. It's been a while.
What do I think about the stability of the solution?
The stability of the solution needs to be improved. It's not ideal. It's lacking overall. If we have five or six items activated, the box shakes and we're scared to touch anything. When we do have to reconfigure things, it's a nightmare as it can go down and it can take us a day or two to sort things out.
What do I think about the scalability of the solution?
In terms of scalability, it needs to be reactivated, which means that I need to add more nodes. It's got its own design limitations. We had only a two-node deployment in it. We need to add more hardware and we need to reduce so many things. It's not an easy option to scale this hardware. Scaling, in general, is very difficult.
We have roughly 9,000 users on this product currently.
How are customer service and technical support?
Technical support is fine. However, we may need to depend on support to resolve some of our many issues. We need to spend an enormous amount of time with them and to explain so much stuff. It would be easier if we could troubleshoot the issue ourselves or if the solution was more reliable.
Which solution did I use previously and why did I switch?
I don't know about other alternative products. I don't have any experience with other alternative products. I've only ever used Cisco ISE.
How was the initial setup?
The solution's initial setup can be a bit complex as there are so many features that are available. It all depends, however, upon which one you want to activate. In our case, we have five or six activated and the box always shakes. It's not stable. So my colleagues are always afraid to touch the box. If it is working well and good, you don't touch it, and we don't reconfigure it. In cases where we encounter any issues, it's a nightmare and we need to spend a minimum of twenty-four to forty-eight hours to recover everything.
What's my experience with pricing, setup cost, and licensing?
We pay a fee based on a subscription model.
The pricing could always be better.
Which other solutions did I evaluate?
I've been looking at evaluating Aruba's Clearpass as a potential replacement option for this solution. I haven't gotten too far into my research, however. I'm looking for a solution that's scalable and easy to use.
What other advice do I have?
My advice to Cisco would be to simplify as much as possible so that a normal IT guy can understand the CCD and set it up. If they can simplify the manuals, navigation, and documentation, it would be nice. It will always be difficult for a beginner, however, to, rearrange or design the network.
I would rate the solution five out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Director of Engineering at a tech services company with 51-200 employees
Allowed us to pull in multiple authentication databases, then centralize them into a captive portal system
Pros and Cons
- "It has allowed us to pull in multiple authentication databases, then centralize them into a captive portal system."
- "Documentation is probably the worst part of the software."
What is our primary use case?
We use it for Community WiFi and TACACS authentication. It is service provider authentication, both for the core infrastructure and Community WiFi.
We were looking to solve captive portal and centralized authentication with Cisco ISE.
How has it helped my organization?
It has allowed us to pull in multiple authentication databases, then centralize them into a captive portal system.
It is important for our organization that the solution considers all resources to be external. It treats them with minimum trust.
What is most valuable?
Integration is a big factor. That has really been the driving force behind it.
What needs improvement?
Documentation is probably the worst part of the software.
For how long have I used the solution?
I have been using it for about five years.
What do I think about the stability of the solution?
It is very stable. I would rate the stability as 10 out of 10.
What do I think about the scalability of the solution?
We don't use its scalability. I would rate it as five out of 10.
How are customer service and support?
The technical support is good. I would rate them as six out of 10.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We previously used an open-source solution. We switched for vendor support and scalability.
What was our ROI?
We don't monetize this solution.
What's my experience with pricing, setup cost, and licensing?
It is fair.
Which other solutions did I evaluate?
We did not evaluate other options.
What other advice do I have?
It is worth checking out the integration that it provides. It is a strong platform.
Cybersecurity resilience has not been that important for our organization.
I would rate ISE as eight out of 10. It does exactly what it is supposed to do without much issue.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Buyer's Guide
Download our free Cisco Identity Services Engine (ISE) Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2025
Popular Comparisons
Aruba ClearPass
Forescout Platform
Fortinet FortiNAC
F5 BIG-IP Access Policy Manager (APM)
ExtremeCloud IQ
ThreatLocker Zero Trust Endpoint Protection Platform
Sophos Network Access Control
Ruckus Cloudpath
macmon Network Access Control
ExtremeControl
Buyer's Guide
Download our free Cisco Identity Services Engine (ISE) Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- ForeScout vs. Cisco ISE
- What are the main differences between Cisco ISE and Forescout Platform?
- Can Cisco ISE disallow authentication based on OS?
- Cisco ISE (Identity Services Engine) vs Fortinet FortiNAC: which solution is better and why?
- What are the requirements for integrating the Cisco Data Center and Cisco ISE?
- What is the biggest difference between Aruba ClearPass and Cisco ISE?
- Which is better - Aruba Clearpass or Cisco ISE?
- How would you compare Cisco ISE (Identity Services Engine) vs Forescout Platform?
- How does Cisco ISE compare with Fortinet FortiNAC?
- What is your experience with 802.1X when using EnGenius WAP/switch with Cisco ISE 2.1?