The RADIUS Server holds the most value.
The TACACS feature in ISE is good.
We also use the Posture feature to control the environment.
The product features are quite good.
The RADIUS Server holds the most value.
The TACACS feature in ISE is good.
We also use the Posture feature to control the environment.
The product features are quite good.
One of the main issues in Cisco ISE (Identity Services Engine) is that it lags excessively.
Sometimes Cisco ISE (Identity Services Engine) just doesn't work properly, due to misconfiguration.
I would like to see the product simplified more, especially with the configuration.
I have been working with Cisco ISE (Identity Services Engine) for approximately two years.
We are using version 2.7 Patch 2.
Cisco ISE (Identity Services Engine) is easy to scale.
I have approximately 450 Apex end-based licenses.
Currently, we don't have plans to expand.
Technical support as always is one of the best.
The initial setup was a bit complex. It took us three to four weeks to complete the setup and get it up and running. We had help from the reseller.
It was deployed by a vendor.
It was installed by a vendor.
It's a bit expensive, especially the licensed product.
The hardware is purchased one time.
The support license is reasonable, but when compared to other products, such as ClearPass or Fortinet, the base license for users is much lower in other products. In general, Cisco is more expensive.
I would like to see one license based on one user. We do not need to use multiple licenses in order to have multiple features in the product.
One of the issues in ISE is that if you need more features you have to have multiple licenses per user. One user can have three or four licenses.
It would be beneficial to have a single license that included all of the features.
We are currently trying to deploy Fortinet network access control. The support from Fortinet is disappointing.
We are in the testing phases, but there is a good possibility that we will go with Fortinet.
We have not used it yet. We will try the POCs this week coming.
I would suggest having an experienced engineer implement the product. If there is an error when implementing, you will experience many issues, especially lagging.
If it was well implemented I would rate it a nine out of ten, because it's good.
Cisco ISE (Identity Services Engine) is used in large enterprise companies. In our company and with our implementation, I would rate Cisco ISE (Identity Services Engine) a four out of ten.
The primary use case is to have network access control and automation to integrate with the enterprise network. It also helps provide a method to make segmentations between users and enable access control.
Cisco ISE has provided more mobility for the organization while controlling access no matter how the users connect to the network.
I like the guest access feature, which has been important for us. The BYOD feature is also good.
Segmentation can be improved. They can also improve security policies for each group of users, and automation can also be better. The software interface could be better. They should make it easier for users to find features.
I have been working with Cisco ISE for more than three years, but in general, I have more than 20 years of experience working with Cisco.
Cisco ISE is a stable solution.
Cisco ISE is very scalable.
Cisco technical support is very good.
The initial setup is complex, and you can't easily find the features you want.
If we're talking about a medium enterprise and there is a greenfield, it can take between one or two weeks.
I think the price is okay.
I advise new users to go through the admin guides for implementation and follow the script very carefully.
On a scale from one to ten, I would give Cisco ISE an eight.
I am a reseller. We also implement solutions for our clients. Currently, we have a client who is doing a proof of concept with different clients of their own.
We sell this product to many different clients here in Mexico for both retail and manufacturing plants.
Our clients use Cisco ISE (Identity Services Engine) to secure the access of the users. It's a great tool for access control functions.
The profiling model included is the most valuable feature.
The user interface could be improved to make it more user-friendly.
I have been selling Cisco ISE (Identity Services Engine) for eight years.
Cisco ISE (Identity Services Engine) is very stable.
It is very scalable. Cisco ISE (Identity Services Engine) is a nice solution.
I have not had any contact with technical support.
The initial setup is easy.
It can take three days for a basic configuration.
As resellers, we frequently evaluate solutions for our customers.
After the deployment, I would recommend completing a proof of concept.
I would rate Cisco ISE (Identity Services Engine) a nine out often.
My primary use case of this solution is to protect the website from web attacks.
I use the F5 device on the DMZ zone of the firewall. A record will come to the virtual server on the F5. Then the F5 will upload the encrypted message to the server and decrypt this message. The firewall can see the traffic as unencrypted and we can mitigate the enemy and any attack from F5 and from the firewall.
The most valuable feature would be the protection.
I would like for them to improve the reporting.
This solution is stable.
It is scalable.
I would rate their technical support as an eight. They provide a quick solution and I trust working with them.
The initial setup was straightforward.
The price is not very expensive.
This solution can be used to protect one's application. The server has many features to secure and diagnose.
We mainly use it for authenticating devices on our network.
It's our way to track people who are authenticating onto our network, whenever they log on to our switches, et cetera. It's good for security purposes.
The interface is pretty easy to use.
Whenever we see the authentication logs, we can't see what device we're logging into. It shows us the main server, but we don't see details like, "It's in building 200," or that kind of thing. We can't see the IP address. We can see who logged in, but we can't see the IP address of the device.
I'm sure that's available. We just haven't figured out how to properly deploy it.
I've been using Cisco ISE (Identity Services Engine) for about a year. I'm only using a small portion of it, so I don't know all the capabilities of the program.
The stability is good. I haven't had any issues with downtime or anything going out.
We use it enterprise-wide, around the world. That would indicate it's pretty scalable.
I haven't had to contact technical support.
It's a good product.
We use this solution to monitor and secure devices on our network.
Using this solution gives us the ability to allow proper access to the network.
The stability of this solution needs to be improved.
It should not be necessary to go to each individual set of alarms and acknowledge them in order for them to go away. There should be a single button that can be pressed to dismiss all of the alarms at once.
This solution has problems in terms of stability. I have had certain things that do not work, and I have called technical support for help. They have sent me a patch, and then it still doesn't work, so we end up living with the problem.
I would rate this solution an eight out of ten.
The feature that I most like is that it can notify me whenever someone plugs in their device, which is not allowed. I get notifications for new laptop devices.
I think the user interface looks good compared to previous versions.
The software is a little bit complicated to understand in the beginning, meaning the implementation. It needs proper documentation so that we can understand the options more easily.
I have only very recently using Cisco ISE, since about one and a half months ago.
We have our own team for the maintenance of this solution.
I am still implementing it. So far it has been one and a half months.
Cisco ISE is a good product, but it requires some technical knowledge and knowledge about network security.
One a scale from one to ten, I would rate Cisco ISE a six.
As I said, I have not implemented it 100%. Maybe once I implement it 100%, and I start using it in production, then I will rate it higher.
Our company doesn't use Cisco ISE internally. We act as the solution reseller. Our business model is set up to provide a network-based approach for adaptable, trusted access to our clients. We provide our clients with intelligent, integrated protection through intent-based policy and compliance solutions.
We found that the most valuable features associated with this tool are posture assessment, policy management, VLAN assignments, guest assignment, and BYOD services. In addition to these services, the Cisco IOS software switch configuration feature is another very valuable aspect of the policy and compliance solution.
There are issues with respect to the posture assessment function. It's been observed that customers are not receiving total access to the network because the assessment agent is glitchy and malfunctions from time-to-time. I would like to see refining of the compliance assessment and adding more detailed compliance of endpoints on the user end.
We have also had to deal with some cache update issues in conjunction with Cisco's tech support team. Unfortunately, they had trouble providing suitable solutions within specific and desirable time frames.
The next release should offer more inter-operability, increased cross-integration functionality.
We are currently experiencing stability issues with this solution.
Technical support needs improvement. There were times when my engineers had to talk to a number of different Cisco tech engineers explaining things over and over again. If their tech support has to escalate an issue our support staff is required to mediate which of course disturbs workflows.
The setup requires proper planning. We approach every customer interaction strategically taking into account the complete project scope. It's our job to understand the customer's expectations and requirements for deployment.
Initially, the setup is a bit tough with respect to the graphic user interface (GUI) tool. Cisco ISE has proven to be a bit complex as well.
The solution is sufficient and seems to require little to no maintenance from the client side. Maintenance is always in proportion to the client's needs and product deployment. For instance when we are managing two Cisco ISE boxes with two onsite engineers. As capacity grows obviously we need more engineers; it's not a 1-to-1 relationship but we always take a minimum of two certified engineers qualified to manage Cisco ISE.
I would give this solution a rating of 7 out of 10.