Try our new research platform with insights from 80,000+ expert users
Chandra-Prakash - PeerSpot reviewer
Practice Director & Technologies Advisory at Happiest Minds Technologies
Real User
Top 20
Superior support, effective NAC, but difficult to configure
Pros and Cons
  • "The most valuable features are the NAC and the bundles that are available with Cisco ISE, such as Cisco ACS being integrated."
  • "The solution configuration is complicated for setting the infrastructure. They have improved over the years but there is still a lot of room to improve. When comparing the simplicity to other vendors, such as Fortinet and Aruba they are behind."

What is our primary use case?

My clients are small to enterprise-size companies using this networking solution. One of my clients is a leading pharmaceutical manufacturing company, providing genetic medicine. The network they have has approximately 5,000 device inventory. Additionally, I have a couple of clients in the banking industry in the USA that has quite a large networking infrastructure using this solution.

What is most valuable?

The most valuable features are the NAC and the bundles that are available with Cisco ISE, such as Cisco ACS being integrated.

What needs improvement?

The solution infrastructure configuration is complicated to set up. They have improved over the years but there is still a lot of room to improve. When comparing the simplicity to other vendors, such as Fortinet and Aruba they are behind.

For how long have I used the solution?

I have been using this solution for approximately three years.

Buyer's Guide
Cisco Identity Services Engine (ISE)
January 2025
Learn what your peers think about Cisco Identity Services Engine (ISE). Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,265 professionals have used our research since 2012.

What do I think about the stability of the solution?

The solution is stable.

How are customer service and support?

Cisco's support system is very good and they are well known for it.

Which solution did I use previously and why did I switch?

I am also using FortiNAC and it is similar to Cisco ISE. However, Cisco is spread across the globe with bigger clients, large enterprises. FortiNAC is not as mature, but they are still working their way up in the market

What's my experience with pricing, setup cost, and licensing?

The price of the solution is price fair for the features you receive.

Which other solutions did I evaluate?

I have evaluated other solutions from Aruba and Fortinet.

What other advice do I have?

I rate Cisco ISE (Identity Services Engine) a seven out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: partner
PeerSpot user
it_user1456230 - PeerSpot reviewer
Head Cyber Security at a retailer with 10,001+ employees
Real User
Has good flexibility and stability
Pros and Cons
  • "It's flexible and stable. It's been good as a standard environment to run."
  • "The initial setup was a little bit complex. It's not that simple because it requires a lot of prerequisites for the solution to get a hold on."

What is our primary use case?

One of the use cases was the certificate-based authentication for the endpoints. All the laptops and mobiles are embedded with certificates and once they get authenticated, then only they would be able to connect to the LAN. 

The other use case was the NAC use case wherein the integrity of the laptops and mobile and such were checked before the scan. They fulfill the policy requirements and then they are able to connect to the network.

The third use case was the consolidated access control management for all the network devices and security devices. 

What is most valuable?

It's flexible and stable. It's been good as a standard environment to run.

For how long have I used the solution?

It was implemented in my last organization and we used it for three years. We are evaluating and will be implementing it in a couple of months at my current organization. 

What do I think about the stability of the solution?

It is stable and scalable. We have 5,000 to 6,000 users. 

How are customer service and technical support?

Technical support is good because the partner is quite competent so we have all the support that is required.

How was the initial setup?

The initial setup was a little bit complex. It's not that simple because it requires a lot of prerequisites for the solution to get a hold on. So the prerequisites and then onboarding all this like the landscape of endpoints was quite tedious. That was no surprise, because this is something which would be with other products as well. It took a long time for the implementation, but it's been rock stable now.

The deployment took six to seven months. 

What about the implementation team?

We had consultants and we had a partner for the deployment. The system integrator was involved with the roll out.

What other advice do I have?

The management part is much smoother. It takes care of all the costs across branded devices as well, so that it is a single panel we can manage all the end-to-end entry devices as well. That's something would be really good for Cisco ISE product.

I would recommend Cisco ISE. I would rate it an eight out of ten. I would like it to be more stable. 

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Cisco Identity Services Engine (ISE)
January 2025
Learn what your peers think about Cisco Identity Services Engine (ISE). Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,265 professionals have used our research since 2012.
IT Manager at Shanta Mining
Real User
Lacks properly knowledgeable support, but has stability
Pros and Cons
  • "So far, we have had no issues with the stability."
  • "The solution lacks properly knowledgeable support, especially internationally, and this is why I am exploring other applications."

What is our primary use case?

I am not certain if I am using the latest version. It is the one which is made for TV. 

We use the solution to access control. Prior to any device being authenticated on the network, a person must login to the solution's site for authentication purposes. 

What is most valuable?

While the solution has a host of features, we only use the one involving access control. 

We are looking into further uses for it. My aim is to deploy it across all three of our sites and not just one. 

What needs improvement?

There is much room for improvement, especially after having perused the documentation on the solution's website. 

The solution lacks properly knowledgeable support, especially internationally, and this is why I am exploring other applications. 

I would need time to expand my knowledge of the solution and consult with the Cisco engineers before I could point to other pain points. 

For how long have I used the solution?

I have been using Cisco ISE (Identity Services Engine) since 2015. 

What do I think about the stability of the solution?

So far, we have had no issues with the stability. 

How are customer service and technical support?

There should be more knowledgeable support, particularly in the international sphere. 

I have no doubt that we will get there. They contacted me yesterday, which makes it likely that by weeks-end we should be able to build a structure and do many things with the solution. This would allow me to know where I am standing, explore further and even examine the possibility of implementing some of Cisco's other features. 

Which solution did I use previously and why did I switch?

We did not use other solutions prior to the current one and will likely not explore others in the future. The current one should be fine. 

How was the initial setup?

The installation was straightforward, although it will likely involve a more complex implementation in the future.

As the previous installation was not complex, it did not take long. 

What's my experience with pricing, setup cost, and licensing?

I believe I have paid around $1,000 in licensing fees. The license is annual. 

Which other solutions did I evaluate?

We did not really explore other options prior to using the solution. We considered Fortigate, but found it to not be very straightforward, which is why we decided to go with the current solution. 

What other advice do I have?

While we have focused on the access control aspects of the solution, the documentation demonstrates that it has many more features, so I would like to explore it further. 

We are customers of Cisco. 

At the moment, we have around 250 users making use of the solution. 

I rate Cisco ISE (Identity Services Engine) as a five out of ten. This is because I wish to explore further any additional features that can add value to our organization, especially on the IT security side. 

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Edwin Dzangare - PeerSpot reviewer
Edwin DzangareNetwork Engineer at compulink Systems
User

Cisco Identity Service Engine l will give it an 8 out of 10 rate. It's stable and easily integrates with other network devices such as switches, routers and its central device management TACACS. The major challenge is in the new license model. Base, Plus and Apex licenses have been migrated to Essentials, Advantage and Premier. The new Cisco ISE licensing model Essentials, Advantage, and Premier licenses are term-based which limits end-user to fully utilize all the device features and functionality.  

Project Manager at Projectnet
Real User
Overall complete package, secure authentication, with great customer service
Pros and Cons
  • "One of the most important features is the authentication security for the individual connection to the network through their computer or laptop."
  • "The customer server was great but it would have been better for me if they had support in other languages such as Spanish."

What is our primary use case?

The company implemented the solution to keep track of wired and wireless devices.

What is most valuable?

One of the most important features is the authentication security for the individual connection to the network through their computer or laptop. The solution is very complete overall.

What needs improvement?

There should be better documentation on the implementation of the solution. I learned how to implement it from watching videos. I felt the documentation was too complicated and I also learn better from watching videos.

In my experience, there needs to be better documentation for firewall integration as well, we had some trouble early on.

For how long have I used the solution?

I have been using the solution over the last year.

What do I think about the stability of the solution?

A co-worker of mine had some issues with the solution crashing unexpectantly or some processes went down. 

What do I think about the scalability of the solution?

We are using the solution with around 200 people and we had no problems with scalability. Most of our clients are small businesses.

How are customer service and technical support?

The customer server was great but it would have been better for me if they had support in other languages such as Spanish. It was difficult for me to communicate in English.

How was the initial setup?

The setup was easy for this solution.

What about the implementation team?

We implemented the solution.

What's my experience with pricing, setup cost, and licensing?

There are other cheaper options available.

Which other solutions did I evaluate?

We did evaluate Aruba ClearPass before the client picked Cisco ISE. I had suggested ClearPass because it was cheaper but the client decided to go with Cisco regardless.

What other advice do I have?

Our clients and my company plan to continue the use of the solution in the future.

I rate Cisco ISE (Identity Services Engine) a ten out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
reviewer2212425 - PeerSpot reviewer
Manager of Systems Architecture at a computer software company with 51-200 employees
Real User
Keeps us safe from rogue devices and helps to ensure that all devices meet the requirements for patches and certificates
Pros and Cons
  • "It's keeping our company safe from rogue devices connecting to our network. From a security standpoint, there's peace of mind knowing that every device that connects is a good one."
  • "The upgrades could be better. Every time we try to do an upgrade, we have problems. It's a pain."

What is our primary use case?

We use it to ensure that any device that connects to our network or wireless environment is a company-owned asset and has all the security certificates. We aren't doing too much remediation. We just identify whether it's one of our assets and whether it's allowed.

How has it helped my organization?

In our company, we have a lot of remote workers. Knowing that even devices that are coming through a VPN comply with our policies, whether they're in the office or they're remote, face the same level of scrutiny is a benefit to our company.

We can set as in-depth alerts as we want to. We can set up an alert through email, text, etc.

It has helped to improve our cybersecurity resilience. It helps to ensure that all devices meet the patching and certificate requirements.

What is most valuable?

It's keeping our company safe from rogue devices connecting to our network. From a security standpoint, there's peace of mind knowing that every device that connects is a good one.

What needs improvement?

The upgrades could be better. Every time we try to do an upgrade, we have problems. It's a pain.

For how long have I used the solution?

I've only been with the company for six months, but they adopted Cisco ISE about three to five years ago.

How are customer service and support?

Support has always been good. Overall, I'd rate them an eight out of ten. Sometimes it feels that their first-level support hasn't been trained in-depth.

How would you rate customer service and support?

Positive

How was the initial setup?

We have redundant solutions across all of our data centers, policy nodes, and authentication nodes. As far as I know, we started off in a small deployment with our wireless. We profiled our devices to ensure that they belonged to our companies before we let them access, and then from there, we expanded into profiling wired ports as well, so we started very small and then moved to a larger solution.

In terms of our plans to increase its usage, we may use Cisco ISE in different ways, but the number of nodes that we have will probably stay the same. With version 2, we're moving more of our deployment to the cloud, so we'll move from the on-premise solution to the cloud. We've already started the process. We have some nodes built in the cloud, and we just have to move the production and then remove our on-prem. We're using Oracle Cloud for our highest deployments. It will be fully cloud.

What was our ROI?

We've seen a return on investment from the security aspect.

What other advice do I have?

I'd advise starting just the way we did. Start small because there are a lot of use cases of Cisco ISE. If you try to do it all at once, you might be disappointed, so start small and pick an area that you'd like to focus on, get that piece done, and then go from there. 

It hasn't really helped to free up our IT staff for other projects. It also hasn't helped us consolidate any tools. 

Overall, I'd rate Cisco ISE an eight out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1895499 - PeerSpot reviewer
Network Manager at a university with 501-1,000 employees
Real User
Enables us to identify users and make appropriate decisions about where they can and cannot go
Pros and Cons
  • "The TACACS and RADIUS have been the most valuable features so far."
  • "Cisco ISE has almost all the features we are looking for now, but sometimes the configuration, such as the conditions, is a little difficult to understand and not so easy to navigate."

What is our primary use case?

We use it for the TACACS authentication, for administrator login to network devices, and the RADIUS service for VPN and wireless authentication.

Initially, we were looking for a single sign-on for administrators to log in to every network device, but we also wanted a good way to control remote user access for logging in. Later we started using it for VPN and wireless.

How has it helped my organization?

It gives us a better way to authenticate users. It helps us identify a user with their device to establish trust. When a remote user is trying to access network resources, we need to find out who they are and where they want to go and make an appropriate decision about where they can and cannot go.

Resilience in cyber security is very important. Without security, nothing else can happen.

What is most valuable?

The TACACS and RADIUS have been the most valuable features so far.

What needs improvement?

Cisco ISE has almost all the features we are looking for now, but sometimes the configuration, such as the conditions, is a little difficult to understand and not so easy to navigate.

For how long have I used the solution?

I have been using Cisco ISE (Identity Services Engine) for a few years.

What do I think about the stability of the solution?

It is stable.

How are customer service and support?

They have resolved my issues, but sometimes they have been slow.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We used to use Cisco ACS and that evolved to Cisco ISE.

How was the initial setup?

The initial deployment was not a process that was easy to understand. But after I completed it, looking back, I see it was reasonable. It's just hard to understand upfront. There is a steep learning curve.

I did the migration too late, so I couldn't do a direct migration and that meant I had to kind of rebuild it.

What was our ROI?

Security is something we need, but I don't think that there is a return on investment. It causes more delays to the regular workflow.

What's my experience with pricing, setup cost, and licensing?

The Essentials licensing is reasonable, but I would like the Premier version to be perpetual instead of a subscription.

What other advice do I have?

An idea we are looking into is associating it with the MAC address table, so that approved devices can log in to the more restricted network.

My advice is to attend training before going for it. Otherwise, it will not be easy to understand. Each product, from ACS to ISE, does similar things, but they do them in different ways.

I rate Cisco ISE a nine out of 10. If it could become a little bit easier to understand that would help.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Security Solutions Architect at GTS
Real User
Stable security policy management that offers automation, visibility, and control; could be a little easier to implement
Pros and Cons
  • "Cisco offers automation, visibility, and control as well as third party integration capabilities."
  • "I would like for the next release to be easier to implement and to limit its dependencies around ISE, Windows, the network as a whole, etc."

What is our primary use case?

We are a partner with Cisco and am a part of an information security team that uses Cisco to provide security policy management via network, device and wireless access. 

What is most valuable?

Cisco offers automation, visibility, and control as well as third party integration capabilities.

What needs improvement?

I would like for the next release to be easier to implement and to limit its dependencies around ISE, Windows, the network as a whole, etc.

For how long have I used the solution?

I have been using Cisco ISE for over six years.

What do I think about the stability of the solution?

This is a very stable solution with many integrations.

What do I think about the scalability of the solution?

Cisco's scalability depends on the design - small deployments are not scalable.

How are customer service and support?

Cisco support is good.

How was the initial setup?

This solution is a bit more complex to set up than in comparison to other options - it can take anywhere from two to five months depending on the use case.

What's my experience with pricing, setup cost, and licensing?

The price for Cisco ISE itself is very low, however, Cisco professional services are quite expensive. Subscription amount is dependent on number of users.

Which other solutions did I evaluate?

We looked at Forescout which is more user-friendly but they have a very vulnerable network.

What other advice do I have?

This is a good solution for security teams. If you do not have a security team, I would not recommend this product. 

Overall, I would rate Cisco a seven out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1261278 - PeerSpot reviewer
Associate Consultant at a computer software company with 201-500 employees
Real User
Streamlines security policy management and reduces operating costs
Pros and Cons
  • "In terms of features, I think they've done a lot of improvement on the graphical user interface — it looks really good right now."
  • "An issue with the product is it tends to have a lot of bugs whenever they release a new release."

What is our primary use case?

Our use cases are based around dot1x. Basically wired and wireless authentication, authorization, and accounting. 

In terms of administration, only our networking team uses this solution. Probably five to ten administrators manage the whole product. Their role pretty much is to make sure that we configure the use cases that we use ISE for — pretty much for authenticating users to the wired and wireless networks. We might have certain other advanced use cases depending on certain other business requirements, but their job is pretty much to make sure all the use cases work. If there are issues, if users are complaining, they log into ISE to troubleshoot those issues and have a look at the logs. They basically expand ISE to the rest of the network. There is ongoing activity there as well. The usage is administrative in nature, making sure the configurations are okay, deploying new use cases, and troubleshooting issues.

How has it helped my organization?

This solution has definitely improved the way our organization functions.

What is most valuable?

In terms of features, I think they've done a lot of improvement on the graphical user interface — it looks really good right now. ISE is always very complicated to deploy because it's GUI-based. So they came up with this feature called work centers, that kind of streamlines that process. That's a good feature in the product right now.

What needs improvement?

An issue with the product is it tends to have a lot of bugs whenever they release a new release.

We've always found ourselves battling out one bug or another. I think, overall they need to form a quality assurance standpoint. ISE has always had this issue with bugs. Even if you go to a Cisco website and you type all the bug releases for ISE, you'll find a lot of bugs. Because the product is kind of intrusive, right? It's in the network. Whenever you have a bug, if something doesn't work, that always creates a lot of noise. I would say that the biggest issue we're having is with all the product bugs.

Also, the graphical user interface is very heavy. By heavy, I mean it's quite fancy. It's equipped with a lot of features and animations that sometimes slow down the user interface.

It's a technical product — I don't think a lot of engineers really need fancy GUIs. We pretty much look for functionality, but I think Cisco, for some reason, is putting an emphasis on its GUIs looking better. We always look for functionality over fancy features.

We've had issues with different browsers, and sometimes it's really slow. From a functionality standpoint, we would rather the GUI was light and faster to navigate.

ISE has a very good logging capability but because their GUI is so slow, we feel it's not as flexible or user-friendly as we would like it to be, especially when it comes to monitoring and logging. At the end of the day, we're implementing ISE for security. And that means visibility.

Of course, you can export the data into other products to get that visibility, but we would like to have a better type of monitoring, maybe better dashboards, and better analytics capabilities within the product.

Analytics is one thing that's really lacking. Even if you're to extract a report, it just takes a lot of time. So, again, that comes down to product design, but that's definitely an area for improvement. I think it does the job well, but they can definitely improve on the monitoring and analytics side.

For how long have I used the solution?

I have been using this solution since they released the first version over ten years ago.

What do I think about the scalability of the solution?

Scalability is pretty good, provided that you design it properly from the get-go. There are design limitations, depending on the platforms, especially the hardware platforms that you select. On the scalability front, it's not a product that can be virtualized very well — that's an issue. Because in the world of virtualization, customers are always looking for products that they can put in their virtual environments. But ISE is not a truly virtualized product, as in it doesn't do a lot of resource sharing.

As a result, it's not truly virtualized. Although they do have the VM offering, it's not virtualization in the proper sense of the word. That's one limitation of the product. It's very resource-intensive. As a result, you always end up purchasing additional hardware, actual ISE physical servers. Whereas, we would like to have it deployed in virtual machines if it was better designed. I think when it comes to resource utilization, it probably isn't optimized very well. Ideally, we would like to have a better-virtualized platform.

How are customer service and technical support?

Tech support tends to be pretty good for ISE. We do use it extensively because of all of the bugs we encounter. 

Mostly it's at the beginning of setting the whole environment up. Typically, once it's set up properly, it tends to work. But it's just that the product itself integrates with a lot of other products in the network. It integrates with your switches, with your APs, etc. So, it's a part of an ecosystem. What happens is, if those products experience bugs, then it kind of affects the overall ISE solution as well — that is a bit of a dependency. The ISE use cases are dependent on your network access devices, but that's just the nature of it. The only issue with support is you might have to open a ticket with the ISE team, but if you're looking at issues in your wireless network or switches, you might have to open another ticket with their tech team for switches. 

For customers using Cisco, end-to-end, they should improve the integration and providing a seamless experience to the customer. But right now, they have to refer to other experts. They come in the call, but the whole process just takes some time.

That's an area that they can improve on. But typically, I would say that the support has been good. We've been able to resolve issues. They are responsive. They've been good.

Overall, I would give the support a rating of eight.

How was the initial setup?

The setup is not straightforward. It's complex. You need to have a high level of expertise.

What's my experience with pricing, setup cost, and licensing?

It's an expensive solution when compared to other vendors. It's definitely more expensive than ClearPass. It's expensive, but the issue, again, comes down to scalability. Because you can't virtualize the product, there's a lot of investment when it comes to your hardware resources. Your CapEx is one of the biggest issues here. That's something Cisco needs to improve because organizations are looking at reducing their hardware footprint. It's unfortunate that ISE is such a resource-intensive application to begin with. As it's not a properly virtualized application, you need to rely on physical hardware to get the best performance.

The CapEx cost is high. When it comes to operational expenditure, it all depends on the features you're using. They have their tiers, and it all depends on the features you're using. The basic tier, which is where most of the functionality is, is relatively quite cheap. But if you're using some advanced use cases, you need to go to their higher tiers. So, I'm not too worried about operations costs. You need to buy support for the hardware: you need space, power, and cooling for the hardware-side. All of that adds up. So, that all comes down to the product design and they need to make sure it's properly scalable and it's truly virtualized going forward.

Which other solutions did I evaluate?

We've evaluated other products, for example, Aruba ClearPass. There's another product, Forescout, but the use case is a bit different.

When it comes to dot1x authentication, I think it's ISE and Aruba ClearPass. Forescout also comes into the next space, but the use case is a bit different.

We prefer ISE because, I think if you're using Cisco devices, it really kind of integrates your ecosystem — that's why we prefer ISE. When it comes to NAC or dot1x products, from a feature standpoint, ISE has had that development now for 10 to 11 years. So, we've seen the product mature over time. And right now it's a pretty stable and functional product. It has a lot of features as well. So, I think the decision is mainly kind of driven by the fact that the rest of the ecosystem is Cisco as well. From a uniform figure standpoint, the other product is probably the industry leader at this point in time for network admission control.

What other advice do I have?

The main advice would be in terms of upfront design — this is where a lot of people get it very wrong. Depending on the platforms you choose, there are restrictions and limitations on how many users. We've got various nodes, so how many nodes you can implement, etc. Also, latency considerations must be taken into account; especially if you're deploying it across geographically dispersed regions. The main advice would be to get the design right. Because given that directly interferes with the network, if you don't get your design right it could be disruptive to the network. Once you've got the proper design in place and that translates into a bit of material, the implementation, you can always figure it out. Getting it right, upfront, is the most important thing.

Overall, I would give ISE a rating of eight out of ten. I don't want to give it a 10 out of 10 because of all the design issues. There is definitely room for improvement, but overall out there in the market, I think it's one of the best products. It has a good ecosystem. It integrates well with Cisco devices, but it also integrates with third-party solutions if you have to do that. It's based on open standards, and we've seen the ecosystem grow over the years. So, they're doing a good job in terms of growing the ecosystem and making sure ISE can work with other products, but there's definitely room for improvement on the product design itself — on monitoring, on analytics. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Buyer's Guide
Download our free Cisco Identity Services Engine (ISE) Report and get advice and tips from experienced pros sharing their opinions.
Updated: January 2025
Buyer's Guide
Download our free Cisco Identity Services Engine (ISE) Report and get advice and tips from experienced pros sharing their opinions.