We utilize Cisco ISE for authentication by employing the AnyConnect Posture model to address vulnerabilities on the workstations. Additionally, we make use of TACACS.
Network Architect at a tech vendor with 10,001+ employees
Scans all the programs on the workstations, enforces data loss prevention and security
Pros and Cons
- "The most valuable feature is AnyConnect Posture because it scans all the programs on the workstation and checks if the antivirus is up to date, as well as the cryptographic keys on our SSD."
- "Cisco ISE has numerous features that are impractical, and I won't utilize them since they require payment."
What is our primary use case?
How has it helped my organization?
It is a mature solution and it grows with our needs.
Cisco ISE has helped consolidate DNA Center.
Cisco ISE helps our cybersecurity resilience by enforcing security over the workstations.
What is most valuable?
The most valuable feature is AnyConnect Posture because it scans all the programs on the workstation and checks if the antivirus is up to date, as well as the cryptographic keys on our SSD. It also enforces data loss prevention on our workstation, which is usually the main vulnerability for network entry.
What needs improvement?
Cisco ISE has numerous features that are impractical, and I won't utilize them since they require payment.
Buyer's Guide
Cisco Identity Services Engine (ISE)
December 2024
Learn what your peers think about Cisco Identity Services Engine (ISE). Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,067 professionals have used our research since 2012.
For how long have I used the solution?
I have been using Cisco ISE for around four years.
What do I think about the stability of the solution?
We encountered a few bugs that were resolved using the SMUs. However, when the solution is built properly, there are no performance issues.
What do I think about the scalability of the solution?
We can scale Cisco ISE up using VMs.
How are customer service and support?
The technical support is excellent, and we rely on their services frequently.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously used Cisco ACS but transitioned to Cisco ISE because it reached its end-of-life status, and we needed to progress.
What was our ROI?
We have observed a return on investment from the tasks performed by Cisco ISE for our organization.
What's my experience with pricing, setup cost, and licensing?
Cisco ISE is not inexpensive, but the solution is well-built and worth the expense.
Which other solutions did I evaluate?
We evaluated Aruba ClearPass but ultimately chose Cisco ISE due to budgetary constraints. We were able to secure a favorable discount with Cisco.
What other advice do I have?
I would rate Cisco ISE a nine out of ten. Despite the fact that the solution offers numerous features, it is challenging to use.
We do not rely solely on Cisco ISE to secure our infrastructure from end to end. Instead, we utilize various tools such as McAfee, DLP, and Endpoint Security. Additionally, we have the Domain client to check for any breaches. On our Internet edges, we perform SSL offload to enhance the performance of security projects like WAF and IPS, as well as conduct full packet scans. Furthermore, we have NGFW and NG Networks in place.
Cisco ISE is an important component in protecting our environment because it enforces security against the main point of vulnerability, which is accessing workstations. Ransomware infiltrates a network through workstations. The policies implemented are based on the posture model, ensuring that we use the necessary products on our network to mitigate such risks.
I was not involved in the initial setup, but testing the implementation of a new feature is always challenging. We need to allocate time to test it with the security team and the network team. Additionally, we need to create a separate environment to gain a better understanding of how we can improve the performance of the solution within our network.
For organizations that do not have the funds to purchase Cisco ISE, there are good open-source solutions available. These include TACACS servers, OpenLDAP, and FreeRADIUS. However, Cisco ISE is an excellent tool for enhancing all the existing tools within an organization.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Networks & Security Solutions Architect at EIIC
Used in-house for phone profiling and for users' computer authentication needs
Pros and Cons
- "It offers automatic profiling of phones and computers, enabling administrators to identify and categorize devices seamlessly."
- "They could incorporate some AI features."
What is our primary use case?
We are using it in-house for phone profiling and for users' computer authentication needs.
How has it helped my organization?
The policy and segmentation that we use are currently based on the users and their domains. Let's say different domains, such as HR or finance and procurement. We have policies where users are assigned VLANs or specific requirements and are directed to corresponding policies where services are activated. They have access to specific services based on their domain or vertical.
What is most valuable?
Many Cisco ISE features are good. It offers automatic profiling of phones and computers, enabling administrators to identify and categorize devices seamlessly. Additionally, Cisco ISE can block anonymous devices attempting to connect to the network. This includes unauthorized attempts from non-domain computers or users trying to obscure their identity to gain network access. Cisco ISE ensures such attempts are thwarted by enforcing full identification authentication.
What needs improvement?
I struggled with spoofing, specifically the max spoofing feature, which I believe has started working after version 3. Before that, it was not that effective. They could incorporate some AI features.
For how long have I used the solution?
I have been using Cisco ISE for over three years.
What do I think about the stability of the solution?
The product is stable.
I rate the solution’s stability a out of ten.
What do I think about the scalability of the solution?
Scalability is also good. I haven't seen any problem because I currently have a new deployment for the ISE and other branches. Getting an integrated access setup is easy, and scalability is also fine. Initially, the scale upon the licensing part and that sizing is low. ISE's existing policies pretty much work very well. There are no significant changes you have to make.
We have more than a thousand users using this solution.
How are customer service and support?
ISE support is good.
How was the initial setup?
The initial setup is straightforward. They are very easy to manage and not complicated at all.
We have received all our files from the client and deployed them. Currently, we are using single active nodes. We have one Primary Admin Node, which is active, and one Policy Service Node. We don't have a secondary admin node for administrative purposes. We have an active operational node. The deployment is pretty simple. You download the file from Cisco, import it into your Cisco ISE, and follow the prompts to set it up based on your requirements, including IPs, basic security needs, DNS servers, etc. Once the initial setup is complete, you can begin creating policies.
What was our ROI?
Cisco ISE protects your environment from potential physical attacks. This ensures that your environment and users are fully safe, thus enhancing your overall security posture as a first line of defense.
What's my experience with pricing, setup cost, and licensing?
We don't have the full license. An enterprise license includes Apex and device management. We secured it for one of our new branches where the deployment will start. We have a full enterprise license, including Apex and device management, to cut costs.
What other advice do I have?
The problem is we have a team of five. I look into the security and infrastructure part.
Integrating Cisco ISE depends on the specific products you're working with. Each integration may present unique challenges that require individualized solutions. There isn't a one-size-fits-all checklist for potential issues.
They were looking to protect their assets, such as devices, from somebody. If they have an environment exposed to users who frequently come to their office, and it's not a very closed environment, then Cisco ISE is very much required. It's the first place where the attack starts. From a risk and compliance perspective, ISE is essential.
Overall, I rate the solution an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Last updated: May 20, 2024
Flag as inappropriateBuyer's Guide
Cisco Identity Services Engine (ISE)
December 2024
Learn what your peers think about Cisco Identity Services Engine (ISE). Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,067 professionals have used our research since 2012.
Data Engineer at a healthcare company with 5,001-10,000 employees
Does everything under the sun but is hard to upgrade and manage
Pros and Cons
- "It works as a good RADIUS server. It has lots of features. It works with all the proprietary Cisco AB pairs and features."
- "It could be less monolithic. It's one huge application, and it does everything under the sun, so it's hard to deal with and upgrade and manage."
What is our primary use case?
Right now we use Wireless.1X and TACACS for device management. It's in our wired network too, but only use it for MAC address bypass.
How has it helped my organization?
It has helped to consolidate tools and applications. Previously, we had Windows NPS in some places and then Cisco ACS in other places. Now, Cisco ISE is all I use. This consolidation hasn't had a whole lot of impact on our organization. It wasn't that big of a deal to begin with.
What is most valuable?
It works as a good RADIUS server. It has lots of features. It works with all the proprietary Cisco AB pairs and features.
What needs improvement?
It could be less monolithic. It's one huge application, and it does everything under the sun, so it's hard to deal with and upgrade and manage.
For how long have I used the solution?
I've been using Cisco ISE for three or four years.
What do I think about the stability of the solution?
Overall, it's pretty stable.
What do I think about the scalability of the solution?
It seems to be pretty good for what we're doing with it.
How are customer service and support?
Cisco TAC support is hit or miss. It depends on who you got. I'd rate them a six out of ten.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We didn't have any network access control. For the wireless, we had ACS, and some places used NPS from Windows.
We chose Cisco ISE because we have a Cisco network. It seemed like the obvious choice.
How was the initial setup?
The initial setup was pretty easy, but trying to get all the switches to talk to ISE was pretty complex. It required a lot of configuration and learning, and we found a lot of bugs and issues along the way.
What about the implementation team?
Initially, we took the help of Presidio. They were good. They knew a lot about it and helped us a lot.
What other advice do I have?
In terms of detection and remediation of threats, it wouldn't detect anything. If we integrated it with other products, it could cut certain clients off from the network, but we haven't gotten that far yet.
It hasn't helped to free up our IT staff. It has probably consumed more time.
I don't have a lot of familiarity with other products, so I'd rate it a six out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network Technical Lead at a energy/utilities company with 10,001+ employees
Good pricing, easy to give role-based access, and easy to manage
Pros and Cons
- "For me, the TACACS feature is the most valuable. I have also used Cisco ISE with LDAP, not with Active Directory. That works for me because I prefer LDAP versus Active Directory."
- "The templates could be better. When you have to do certs, especially with X.500 certs, it isn't very intuitive."
What is our primary use case?
The company's use case for Cisco ISE is switch access. I'm from the high-performance compute side. I'm not the back office IT. I'm what they call GSIT. Their use cases are different but very similar.
How has it helped my organization?
On our side, Cisco ISE has improved cybersecurity resilience. The company uses it for global WAN and other things. We haven't had any issues.
What is most valuable?
For me, the TACACS feature is the most valuable. I have also used Cisco ISE with LDAP, not with Active Directory. That works for me because I prefer LDAP versus Active Directory.
What needs improvement?
The templates could be better. When you have to do certs, especially with X.500 certs, it isn't very intuitive.
For how long have I used the solution?
I've been using Cisco ISE since 2011.
What do I think about the stability of the solution?
After I set it and forget it, upgrading Cisco ISE is the only thing to do.
What do I think about the scalability of the solution?
I've never had a problem with Cisco. Cisco has always scaled well, so it's pretty good.
How are customer service and support?
Initially, it wasn't good, but once I found the right TAC person, it was fine. I had to probably get level three or above, and then I had to get a software developer because the certs didn't initially work properly to give you a special code. I'd rate their support a nine out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I used OpenRADIUS before. That was open source. I switched because I'm the support for everything. It was easy to support with Cisco ISE.
Role-based access is easy to do with Cisco ISE versus OpenRADIUS. That's because OpenRADIUS is something you have to manage yourself. You have to manage the certs and other things. You have to define the roles yourself for special read access and for certain groups and multi-groups.
The only thing I didn't like at the beginning was that Cisco ISE was limited to how many groups you could use. That problem has been fixed. I haven't run into that problem.
How was the initial setup?
The initial setup was complex. The main part was the certs, especially the X.500 certs with LDAP. Azure Directory is a little bit smoother, but I prefer LDAP.
It's deployed for internal switch access. It's purely for switch access and role-based access.
What about the implementation team?
I deployed it myself.
What was our ROI?
We've seen an ROI.
What's my experience with pricing, setup cost, and licensing?
I get very good pricing from Cisco, so I don't have a problem with that. I also don't have a problem with licensing because we get enterprise or global licensing.
What other advice do I have?
It hasn't helped to free up our IT staff. Our IT staff is already very limited anyway. We've always worked smart and don't work where we don't have to work. For example, in 2019, we were more than 60. There are 14 of us now, and we still do the same amount of work. Cisco ISE hasn't contributed to less workload. We do it with automation. We have a lot of Linux, so we do automation on all of our stuff.
Overall, I'd rate Cisco ISE an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Senior Network Architect at Commercial Metals Company
Integration with Active Directory means we can find and authorize users based on their AD groups
Pros and Cons
- "The most valuable feature is 801.1x and another very good feature is the TACACS."
- "I would like to see integration with other vendors, and the RADIUS integration needs to be improved a little bit."
What is our primary use case?
We use it mostly for identity, authentication, and authorizations for wireless and wired. The challenges we were looking to address were mostly around the authorization and authentication of the users. We wanted to use the Identity Services Engine to make sure that the users accessing our network were authorized users, with the authentication happening before.
How has it helped my organization?
The integration with Active Directory, and finding and authorizing users based on their Active Directory groups, rather than just their identities, was a big change for us.
What is most valuable?
The most valuable feature is 801.1x and another very good feature is the TACACS.
In addition, it establishes trust for every access request. That's very valuable. We can't authorize users without it. The fact that it considers all resources to be external is very important. Without Cisco ISE, we couldn't authorize our users, contractors, and everyone else. It's our one source of truth for authentication and authorization.
It's also very good when it comes to supporting an organization across a distributed network. We like that.
What needs improvement?
I would like to see integration with other vendors, and the RADIUS integration needs to be improved a little bit.
Other than that, all the features that we're using look good.
For how long have I used the solution?
I have been using Cisco ISE (Identity Services Engine) for about six years.
What do I think about the stability of the solution?
It has been very stable. There's no problem with that, as we have redundancy in place.
What do I think about the scalability of the solution?
It can be scaled very quickly by adding more nodes to the solution. The scalability is very good.
We have it deployed in three data centers in Austin, Texas, Lewisville, Texas, and one in Poland. It's a distributed deployment and we have around 8,000 endpoints on it so far.
How are customer service and support?
Technical support has been okay, but I wouldn't describe it as "very good." We have had some problems with technical support. Sometimes it takes them too long to resolve a problem.
How would you rate customer service and support?
Neutral
What's my experience with pricing, setup cost, and licensing?
The pricing is good. The last time we purchased four new appliances the price was doable for any organization of our size.
Which other solutions did I evaluate?
In my previous job, I used Aruba ClearPass. It's similar to ISE. They're both good.
What other advice do I have?
Design it well in the first place. If you design it well, you can scale it. Always read, line-by-line, the Cisco guide because that's where you'll find all the information about the design and the scalability. If you design it correctly in the first place, you will have a smooth ride.
We want to use it in a hybrid cloud deployment, but we currently use it 100 percent on-premises. As we move more into the cloud, we're trying to integrate that with Cisco ISE to make it our authentication and authorization source. We're not really into the cloud yet. We're just doing some dev. We're building a whole cloud strategy.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Network Engineer at a tech consulting company with 11-50 employees
Acts as a network access control solution and mitigates a lot of potential attack factors
Pros and Cons
- "I found the CMDB Direct Connect in Cisco ISE 3.2 the most promising feature for my use case."
- "Cisco ISE's real-time data analytics for database logging could be improved."
What is our primary use case?
We primarily use Cisco ISE as a network access control solution. We do a lot of quarantine actions from our CSOC. We use the AnyConnect VPN by setting multiple deployments for dedicated purposes, where we use it to provide wireless.
How has it helped my organization?
Cisco ISE has brought a level of visibility that my organization hadn't had beforehand. At the same time, it has mitigated a lot of potential attack factors and brought in a sense of control in the hardware during the onboarding process.
What is most valuable?
I found the CMDB Direct Connect in Cisco ISE 3.2 the most promising feature for my use case. We have a lot of wired map devices and having an externally approved source to validate if a machine is legitimate or approved to be on the network is extremely valuable for us. It helps make the whole process of authorizing endpoints quick.
What needs improvement?
Cisco ISE's real-time data analytics for database logging could be improved. Earlier, you didn't have direct read access to the database. You'd have to rely on logs through some other sources like Splunk and be able to put everything that you want together. Being able to review logs in real-time, customized to your filtering, adds a lot of context and visibility.
For how long have I used the solution?
I have been using Cisco Identity Services Engine for about four and a half years.
What do I think about the stability of the solution?
I do not like the stability of Cisco ISE in the virtual environment. That might have been more of an underlying host issue rather than an ISE issue. But we've moved to hardware right now, and I wouldn't have looked back. The next place we're looking to explore is potentially in the cloud, but that's still up in the air because our environment is not small. We're one of the larger 700,000-plus endpoints.
What do I think about the scalability of the solution?
Cisco ISE's scalability is nice. However, not many people can deploy Cisco ISE in a very large environment. In other words, there are no large environments that are hitting around 100,000 plus clients for active concurrent sessions. If you're trying to create multiple deployments to distribute the workload evenly, I don't like that there's no centralized management platform for Cisco ISE. You still have to go into each deployment and do your configuration.
How are customer service and support?
From my account team, I rate Cisco ISE's technical support ten out of ten. However, from a tech perspective, if I'm talking to tech level one, tech tier one, or tech tier two, I'd have to give it a six out of ten. Once you start getting into the more advanced tiers and even the business units, the support goes through the roof.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I've always worked with Cisco ISE. However, in my organization, there's another part of my infrastructure where they use Forescout. The way Forescout implements a NAC solution differs vastly from how Cisco ISE does it. The way Cisco ISE does it is more ingrained in the whole radius process and enhances the security features on a switch or wireless line controller.
Our organization chose to go with Cisco ISE instead of Forescout because, holistically, the solution checked all the boxes needed for a NAC solution.
How was the initial setup?
I was not involved in our organization's first iteration of Cisco ISE. We've since migrated and modernized our Cisco ISE deployment, and I've been heavily involved in that.
The ease of deployment depends on the environment you're deploying in, understanding what use cases you have out there, and understanding what kind of endpoints you're exposed to or exposing your network.
Overall, Cisco ISE's initial setup is not overly complicated right now. But since our organization is moving into a multi-vendor or managed services contract, we're bringing in many vendors like Meraki, Juniper Mist, Aruba, and Fortinet. That's when things get complicated because they don't all use the same type of authorization results.
What about the implementation team?
We implemented Cisco ISE in our organization directly through Cisco. My experience with Cisco has been phenomenal because they listen. We've run into many technical issues, but they've been at our beck and call and have been there to support us to a point where they've rushed certain fixes. We've had a couple of engineering specialits because of things we've encountered. They worked hard for us.
What was our ROI?
The product is positive regarding a return on investment, considering the cost we're bringing in for Cisco ISE's deployment versus the value we're adding to the environment.
What's my experience with pricing, setup cost, and licensing?
According to my sales and account team, the prices we're getting are pretty good. I wouldn't say they're the manufacturing or listed price by any means, but we do a lot of business with them. So the price points that they're coming in at are pretty manageable.
What other advice do I have?
When it comes to securing our infrastructure from end to end so that we can detect intermediate threats, a lot of it has to do with integrating Cisco ISE with other products. For example, Cisco ISE primarily deals with either the access layer or remote connections. However, when you start integrating it with other things like titration or secure network analytics, you can get a bigger grasp of the overall picture. When you bring other security teams into it, they can start creating their policies, alerts, etc. They can start automating some of the incident mitigations and stuff like that.
My use case is a little bit different in that there's no end to our work. There are a lot of other business groups within my organization that aren't complying with what the network security policy should be. So I have to reach out to them and get them to use a dot1x protocol or ensure that their stuff is in our CMDB database.
We're in a big migration and shift in our overall security policy. So there's a lot of moving aspects going on right now. However, as we start getting things moved into an MDM, as we start getting things moved into using a dot1x protocol, we can get an active identity of an endpoint.
Cisco helps reduce the amount of staff we have to chase down and figure out what kind of policies should be implemented. We can then incorporate our onboarding process into that, preventing unauthorized devices from connecting in or at least be reassured that if anything that we haven't had any chance to look at connects in, we can deny it with confidence. Down the road, it'll alleviate a lot of the time and planning we're doing right now.
My organization is a bit different. I've tried to get them onto the posture feature of Cisco ISE, but they're pursuing other vendors for that. We've decided to incorporate through a pxGrid integration with other applications such as Tanium, Forescout, or whatever application my security organization uses. They can pull contacts from the Cisco ISE endpoint and then be able to issue a quarantine action to Cisco ISE on that particular endpoint.
Overall, I rate Cisco ISE ten out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Network Architect at Tarrant Regional Water District
Helps us protect our SCADA systems by segmenting them from the rest of the network
Pros and Cons
- "The endpoint profiling feature is among the most valuable because it keeps me from having to manually maintain a MAC address bypass list to track endpoints. I can have ISE profile them for me and then put them in the right bucket."
- "I'd like to see the logging be a bit more robust in terms of what it has baked in. If I want to do any in-depth searching, I have to export all the logs to an external platform like Elastic or LogRhythm and then parse through them myself. It would be nice if I could find what I want, when I want it, on the platform itself."
What is our primary use case?
We use it for wired .1x, wireless authentication, VPN, and multi-factor authentication. We wanted to have a consistent experience for authentication and authorization of endpoints across the network, as well as security.
How has it helped my organization?
As a water utility organization, we're considered critical infrastructure by the feds. Everyone needs water. So it's important for us to protect our industrial control systems, our SCADA systems. ISE helps us do that by segmenting them off from the rest of the network.
And by eliminating trust, it helps us with audits, including CJIS because we have a law enforcement division, and trying to conform to the NIST standards. A lot of government agencies are becoming more familiar with the Zero Trust model and ISE makes our audits go a lot faster and a lot smoother than they used to.
What is most valuable?
The endpoint profiling feature is among the most valuable because it keeps me from having to manually maintain a MAC address bypass list to track endpoints. I can have ISE profile them for me and then put them in the right bucket.
In addition, ISE really adopts and is strong in the Zero Trust model where we consider everybody a foreign endpoint until they prove they belong on the network. ISE just seems to be built from the ground up to do that, whereas with other solutions, you have to "shoehorn" that in.
I also rate it pretty highly for securing access to our applications and network. If you have the good fortune of being a total Cisco shop, you can utilize SGTs, end to end, across the network. It can be a little tricky to get working, but once it does, it creates quite a consistent experience for any endpoint, even if it moves anywhere in the network.
What needs improvement?
I'd like to see the logging be a bit more robust in terms of what it has baked in. If I want to do any in-depth searching, I have to export all the logs to an external platform like Elastic or LogRhythm and then parse through them myself. It would be nice if I could find what I want, when I want it, on the platform itself.
For how long have I used the solution?
I've been using Cisco ISE (Identity Services Engine) for 10 years.
What do I think about the stability of the solution?
Now, the stability is pretty good. I've been working on it since the product launched and it was a bit sketchy. Its current state is really good right now.
The only thing we have run into was a bug when we ran virtual appliances, but that turned out to be an issue with our storage networking QoS policies. That wasn't really an ISE problem, it was more of a storage problem.
What do I think about the scalability of the solution?
In terms of supporting a distributed network, it's pretty powerful. You can stand it up and cluster it and it scales out pretty well. You can put nodes wherever you want to service authentication requests. We're able to scale up or out and we can choose how and when we do that with either virtual or physical machines, meaning it's very flexible.
It scales quite well. One of the things that Cisco is good at is keeping things pretty simple when you want to scale it. If you want to scale up, you get stronger admin and monitoring nodes. If you want to scale out, you get more policy service nodes. It's quite easy to stand them up, really anywhere, if you use virtuals.
We use it around our Fort Worth campus, which has about half a dozen buildings. By the end of the summer, we'll have it deployed to all of the rest of our five campuses. We have about 30 remote locations across 12 counties in North Texas and they're all using ISE. It works out pretty well.
We have it on-prem right now, but we are moving to a hybrid cloud platform on Azure for a lot of our applications, so we're starting to do proofs of concept with ISE in Azure.
How are customer service and support?
TAC is pretty good. I would definitely suggest getting their solution support, which provides higher maintenance. That way, when you do get someone, you get someone who knows what they're doing. If you get the higher level of support, you get some really smart people who can fix things pretty quickly.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We used to use Aruba ClearPass. It was somewhat clunky to use and it didn't integrate well with third-party platforms. If you used Aruba, it worked great. If you didn't use Aruba, and were pointing things at ClearPass, it had some issues. We found that ISE typically handled things a little bit better. We could point anything at ISE and take care of it.
How was the initial setup?
The initial deployment was pretty straightforward. It's very simple to just turn the box on and plug into it. You go through a couple of settings and then you can log in to the GUI and pull in all the other nodes that you want.
After the gear came in, it took us about a day to deploy it. I started by implementing it at the local campus. That way, if I broke anything, I could just walk down the hall and not have to drive anywhere.
I stood up the first cluster, and then it was another engineer and me who worked on deploying it out to all the buildings. We started out in monitor mode, to see what it would do if we had turned it on. Once we had remediated anything that looked like it was authenticating incorrectly on the wired network, we went to closed mode and that's where we are now.
What was our ROI?
Return on investment falls in line with the business vision of securing our resources and protecting them against cyber attacks and nation-state attacks. It's hard to put a monetary value on clean water.
What's my experience with pricing, setup cost, and licensing?
Licensing is a disaster. It's a mess and I hope they fix it soon.
Which other solutions did I evaluate?
In addition to ClearPass, we looked at Forescout. At the time we looked at Forescout, it was more of an inline product and we weren't looking to add more infrastructure between parts of the network to try to do inline authentications. It seemed easier to do it on the switch ports and have them talk to ISE.
What other advice do I have?
It's a very strong platform, especially now that we're on version 3.1. It's definitely my go-to. I would recommend it over any other NAC platform.
It requires a lot of technical knowledge to actually get it off the ground and running. It's not quite as intuitive as it could be, but it's still a solid platform.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
IT Business Manager at Telefónica
Simple, works well, and has a lot of features
Pros and Cons
- "It's scalable."
- "The price here in Brazil is very expensive."
What is our primary use case?
This solution provides access to the employees of the company.
What is most valuable?
It works. It is simple. It works very well. We have a good strategic setup. We are very happy with the solution and we have no problem using Cisco ISE solutions.
The solution is stable.
It's scalable.
What needs improvement?
I'm not working in the IT team. I'm working the sales team. While there are a lot of features that we could improve in our organization, I can't speak to the exact changes that should be made.
We'd like to be able to integrate the product with our solutions. Sometimes we face some infrastructure where there are multiple vendors and sometimes the ISE is not the best tool to manage multiple vendor infrastructure.
The price here in Brazil is very expensive.
Configurations can be a bit complicated.
Sometimes we have problems integrating logs into SIEM solutions. We have to deliver some logs to a SIEM secret platform, and sometimes it does not work well. It would be better if we had better integration or a better way to deliver the logging SIEM platforms.
For how long have I used the solution?
I've been using the solution for five to six years.
What do I think about the stability of the solution?
The stability is good. There are no bugs or glitches. It doesn't crash or freeze.
What do I think about the scalability of the solution?
We have no problem with the management of our infrastructure when we need more accountability from the platform. Scalability was fine. There is no problem.
We have 6,000 people in Brazil using the solution.
How are customer service and support?
I consider technical support to be perfect. Anytime that I have problems with shifting solutions, they work well with me and I have no problems with working with them.
Which solution did I use previously and why did I switch?
I'm a reseller from Fortinet and Cisco solutions. I also have experience with Check Point.
How was the initial setup?
I can't speak to how the setup goes. I'm not working directly in deployment. What I've heard from my customers, for example, is that it is not difficult to set up, however, it may be to run all the features.
What I've heard is the first setup is very, very easy and to do some adjustments is very easy, however, when you want to go further in the configuration, that could be a bit easier.
What's my experience with pricing, setup cost, and licensing?
I can't speak to the exact pricing of the product.
What other advice do I have?
I work with various versions of the solution.
We're resellers.
Others should know it's a very good solution, very stable. There are a lot of features, and it is a secure solution. It's the first solution that we indicate to our customers and most of the time, the decision of the customer is to deploy a Cisco product.
I'd rate the solution nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: My company has a business relationship with this vendor other than being a customer:
Buyer's Guide
Download our free Cisco Identity Services Engine (ISE) Report and get advice and tips from experienced pros
sharing their opinions.
Updated: December 2024
Popular Comparisons
Aruba ClearPass
Forescout Platform
Fortinet FortiNAC
F5 BIG-IP Access Policy Manager (APM)
ThreatLocker Zero Trust Endpoint Protection Platform
Sophos Network Access Control
Ruckus Cloudpath
macmon Network Access Control
ExtremeControl
Buyer's Guide
Download our free Cisco Identity Services Engine (ISE) Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- ForeScout vs. Cisco ISE
- What are the main differences between Cisco ISE and Forescout Platform?
- Can Cisco ISE disallow authentication based on OS?
- Cisco ISE (Identity Services Engine) vs Fortinet FortiNAC: which solution is better and why?
- What are the requirements for integrating the Cisco Data Center and Cisco ISE?
- What is the biggest difference between Aruba ClearPass and Cisco ISE?
- Which is better - Aruba Clearpass or Cisco ISE?
- How would you compare Cisco ISE (Identity Services Engine) vs Forescout Platform?
- How does Cisco ISE compare with Fortinet FortiNAC?
- What is your experience with 802.1X when using EnGenius WAP/switch with Cisco ISE 2.1?