We use Cisco ISE Identity Services Engine currently for TACACS and posturing.
Cyber systems Engineer at a manufacturing company with 10,001+ employees
Has good posturing and prevents other users from insider threats
Pros and Cons
- "We found all the features of the product to be valuable."
- "They should improve their licensing. Licensing is always trouble with Cisco, and Cisco Identity Services Engine is no different. The way the product is licensed could be improved."
What is our primary use case?
How has it helped my organization?
The product elevated my organization’s security level, helped us meet some guidelines, and made our life easy.
What is most valuable?
We found all the features of the product to be valuable. We have no complaints about it. Posturing is valuable to my organization. Now, we're improving our whole environment to go into a Zero Trust policy, and Cisco Identity Services Engine plays a huge role in it. We're defense contractors, so we support DOD and have specific stakes and a baseline to go with. Our strict environment requires us to do certain things, and the solution plays a role in it.
What needs improvement?
They should improve their licensing. Licensing is always trouble with Cisco, and Cisco Identity Services Engine is no different. The way the product is licensed could be improved.
Buyer's Guide
Cisco Identity Services Engine (ISE)
December 2024
Learn what your peers think about Cisco Identity Services Engine (ISE). Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,067 professionals have used our research since 2012.
For how long have I used the solution?
I have been using the solution for almost three years.
What do I think about the stability of the solution?
The solution’s stability is good to go so far. Some vulnerabilities had popped up like any other solution, but Cisco remediated them. There was no problem.
What do I think about the scalability of the solution?
We haven’t even scraped to the surface of what the tool could do. It's very scalable, and we will try to use it as much as we can in the future.
How are customer service and support?
We have had no issues with the product’s customer support so far. We had a neutral experience with support.
How would you rate customer service and support?
Positive
What was our ROI?
We have seen a return on investment in terms of not pursuing any other solutions. We didn't need to look further. The product did what it does for us now. We are very content with it. We don't have to invest further into something else.
What's my experience with pricing, setup cost, and licensing?
The solution’s pricing is okay.
What other advice do I have?
The tool secures our infrastructure to a certain point. However, we're not using it in terms of detection. My team is only four people, and we take all the tasks together.
The solution did not help us consolidate tools. However, it does help us with TACACS. TACACS was a big thing that we needed. We are trying to get rid of NPS and RADIUS, and we will probably use the product in the future for Certificate Authority. It could probably consolidate tools, but it's not doing it now. However, it will in the future.
The product has absolutely improved our cybersecurity resilience. With all the posturing we're doing and the Zero Trust policy we are bringing, it prevents other users from insider threats. It helps big time with insider threats. It's a big thing for us in our specific programs.
Give it a shot because we did give it a shot. People at first said it was very pricey, but it wasn't really as pricey as people say it is. It's worth trying it. Zero Trust will be mandated later, especially if you're in the government. The product will play a big role in it.
One of our team members was pursuing a certification in CCMP security. He was specifically on the Cisco Identity Services Engine track. We got that for him to demo and test it out. Eventually, it became part of our product. TACACS, Posturing, and Certificate Authority could be the reason why we chose the solution. We are using it now for 802.1X. All port security is not a thing anymore for us.
Overall, I rate the product a nine out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Systems Engineer at Austro Control
Offers flexible policy sets, helps secure our infrastructure, and serves as a central hub for all types of network access
Pros and Cons
- "The most valuable feature is the flexibility of the policy sets."
- "Cisco ISE requires a lot of time-consuming administration."
What is our primary use case?
We utilize Cisco ISE for network access control and employ RADIUS access for managing user control in our virtual environment.
How has it helped my organization?
Cisco ISE enables us to implement network access control, ensuring that only approved devices can connect to our network. It serves as a central hub for all types of network access, including wired, wireless, and VPN connections improving our network security.
It does a good job of helping secure our infrastructure from end to end, even though there are many features that we are not utilizing.
Cisco ISE has helped us consolidate tools like Cisco Token that we no longer require. The ability to consolidate tools has provided us with a centralized point of access for our security infrastructure, generating abundant information regarding access.
It has helped our organization improve its cybersecurity resilience by enabling us to control the devices that access our network, unlike before when we had to physically access the port.
What is most valuable?
The most valuable feature is the flexibility of the policy sets.
What needs improvement?
Cisco ISE requires a lot of time-consuming administration.
For how long have I used the solution?
I have been using Cisco ISE for eight years.
How are customer service and support?
Cisco tech support, I'm sure, is very good. However, the amount of resources required to submit and process cases is quite significant. As a result, unless we encounter a major issue, we generally prefer to avoid Cisco TAC and instead seek out workarounds.
How was the initial setup?
The initial setup should be straightforward, but it is often quite complex. A greenfield deployment, where we start from scratch, is easy. The challenges typically arise when we attempt to upgrade an existing deployment.
What about the implementation team?
We utilized the services of Open Network for assistance with the implementation. Their services were excellent, and we would gladly engage their services again.
What other advice do I have?
I give Cisco ISE an eight out of ten.
Cisco ISE is equipped with numerous features. We are a small company and only utilize the ones we require. However, as our requirements change or grow, we may consider adopting more of the features that Cisco ISE offers.
The administration can be time-consuming due to all the updates and patches, but overall, I recommend Cisco ISE.
Our organization was familiar with Cisco, and we used wireless LAN products. That is why we chose Cisco ISE, as it integrates well with our infrastructure.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Cisco Identity Services Engine (ISE)
December 2024
Learn what your peers think about Cisco Identity Services Engine (ISE). Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,067 professionals have used our research since 2012.
Associate consultant at HCL Technologies
Efficient for wireless security and highly scalable solution for our use cases
Pros and Cons
- "The product is stable."
- "There is room for improvement in CLI. Most things are done through the GUI, and there aren't many commands or troubleshooting options available compared to other Cisco products like switches and routers."
What is our primary use case?
We use it to secure our networks. We can secure our switches and wireless networks, basically everything.
We use it primarily for wireless security, but it can be used for many other things as well, like LAN and WAN security.
What needs improvement?
There is room for improvement in CLI. Most things are done through the GUI, and there aren't many commands or troubleshooting options available compared to other Cisco products like switches and routers. We have more visibility on the CLI for those devices, but the GUI seems limited. Moreover, sometimes, GUI seems very pathetic.
For how long have I used the solution?
I have experience working with this solution. I have been using it for four to five years. We still use the old version, but we plan to migrate to the new version soon because they recently changed their licensing model.
What do I think about the stability of the solution?
The product is stable. We don't face many challenges. It's stable, so I would rate it around a nine out of ten.
What do I think about the scalability of the solution?
The product is scalable. I would rate the scalability a ten out of ten. We have medium-sized businesses as our clients.
How are customer service and support?
There was some delay.
How would you rate customer service and support?
Positive
How was the initial setup?
Setup wasn't difficult because we already had a solution in place. It was very easy to install.
What about the implementation team?
The deployment definitely took weeks.
What's my experience with pricing, setup cost, and licensing?
I would rate the pricing an eight out of ten, one being cheap and ten being expensive.
What other advice do I have?
Overall, I would rate the solution a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Network Manager at a healthcare company with 10,001+ employees
Helps us determine real users on our network, protects our environment 100%, and has excellent support
Pros and Cons
- "Cisco ISE is a powerful solution. It gives us the ability to control who's accessing our network, and Cisco has made it very easy."
- "Some of the reporting could be improved."
What is our primary use case?
We use it for network access control. For security reasons, if a vendor plugs into our network, the port is automatically shut down because it's not authenticated to our network.
How has it helped my organization?
Cisco ISE is a great solution. It helped us determine real users on our network. It's very useful.
From a security standpoint, Cisco ISE has improved our organization 100%. We're not guessing who is plugging into our network. It 100% protects our environment and infrastructure from end to end.
Cisco ISE has saved the time of our IT staff time to help work on other projects, but I don't have the metrics.
Cisco ISE has absolutely improved our cybersecurity resilience. Specifically, the 802.11 authentication for wireless has been huge.
Cisco ISE hasn't helped to consolidate any tools or applications.
What is most valuable?
Cisco ISE is a powerful solution. It gives us the ability to control who's accessing our network, and Cisco has made it very easy.
What needs improvement?
Some of the reporting could be improved.
For how long have I used the solution?
We've been using it for about ten years.
What do I think about the stability of the solution?
It's stable. We never had any issues.
How are customer service and support?
I love it. They know their stuff. Almost in one call, you get the right person. They're very good. I'd rate them a nine out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We didn't use any other solution previously.
How was the initial setup?
You have to have a plan. You have to be prepared to roll it out. You need to think through what you want to configure.
It took us about three and a half months to get every angle we were after, and after that, it was a very slow rollout. We rolled it out in about eight months. It was easy.
What about the implementation team?
We did it all in-house, but we did have consultants from Cisco come in and help us tweak it.
What's my experience with pricing, setup cost, and licensing?
Pricing and licensing are not my expertise. As far as budgeting is concerned, we run an ELA with Cisco. It's a part of our ELA.
Which other solutions did I evaluate?
We didn't evaluate other products. We went straight to Cisco because you can't go wrong with their technology. They're a leader in this space, and they've got a good, robust solution, so we rolled it out.
It integrates seamlessly with other Cisco products that we have. I use Cisco Meraki for all my edge cases. We never considered switching to another vendor.
What other advice do I have?
It's a great product. I'd rate Cisco ISE a nine out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network Security Engineer at Kooperativa pojistovna, a.s., Vienna Insurance Group
Video Review
SGTs enable us to leverage security based on those tags and integrate with other SG firewalls
Pros and Cons
- "The most valuable thing in ISE is the adoption of EAP deep that came in [version] 2.7, so we can do authentication based on user and machine certificates in one authentication."
- "Also, the menus could have been much simpler. There are many redundant things. That's a problem with all Cisco solutions. There are too many menus and redundant things on all of them."
What is our primary use case?
We are using it mainly for .1X authentication, and we also authenticate our VPN users, and we are doing some light profiling and posture.
We're trying to solve the problem where different users have different privileges in the network. And also we're trying to block some access from our least privileged users. Those are the main use cases for us.
We have on-prem virtual appliances and a distributed model.
How has it helped my organization?
It has improved our organization very much because we're now adopting the SGTs, Security Group Tags, and we're leveraging security based on those tags on our core systems and integrating with other SG firewalls.
We have a pretty distributed network and we have only one ISE deployment and it's been really good so far for managing all of those sites.
What is most valuable?
The most valuable thing in ISE is the adoption of EAP deep that came in [version] 2.7, so we can do authentication based on user and machine certificates in one authentication.
[Regarding establishing trust for every access request] it's been pretty good so far. We've been authenticating all of our users, no matter where they're coming from. If it's from our VPNs, or if it's wireless access, we are all Cisco, so the integrations are pretty good. It's very important [that the solution considers all resources to be external]. Right now, with the challenges that the multi-cloud environment poses, you have to have a solution like this.
What needs improvement?
[When it comes to securing access to your applications we are] not [using it] so much. I'll have another session with a TAC engineer on Friday, and I will have to discuss some basic concepts of securing the application with ISE. I find it very challenging to do some micro segmentation with it. I'm staying on top of it and doing it macro, but I want to go micro, and it's something I need to discuss more with an engineer.
Also, the menus could have been much simpler. There are many redundant things. That's a problem with all Cisco solutions. There are too many menus and redundant things on all of them. This is a problem in ISE. This could be much simpler.
For how long have I used the solution?
I wasn't involved in the process of choosing this particular technology. The colleagues that made the decision made it seven or eight years ago. They were using ISE for a long time. I've been in the company for four years now so I came into an already deployed solution. But it wasn't so good, so we had to migrate from physical appliances to virtual ones because they were end-of-life and end-of-support.
What do I think about the stability of the solution?
Sometimes, they push an update that breaks the whole deployment. It happened to me with update two. It was my fault. I updated right after it came out, and I won't ever do that again. I will wait at least a month or two or three, because the update was taken down a week later.
I was lucky enough because I had updated from update one to update two. So it didn't really break the whole deployment, just parts of it. But they fixed it in a week with update three, so I was able to put it back together. Roll back is also always an option.
What do I think about the scalability of the solution?
Scalability is really good. The number of possible nodes in deployment is high. I don't know the exact number, but it's really high. Scalability is not a problem.
How are customer service and support?
I have had some problems lately with the TAC engineers being unable to investigate the logs that I gave [them]. They always ask for more, but there is not much you can do on ISE. When you give out all the debugs from the nodes, then there is nothing else to do.
It's been a bit of a ping pong with the TAC engineers. Sometimes I have four to five TAC cases open, specifically on ISE. Most of the problems I have are with the integrations of other companies' firewalls.
This year I would give them a six [out of 10]. Before, I would say eight.
How would you rate customer service and support?
Neutral
How was the initial setup?
I have had to find my own way to do the new deployment. It wasn't that there was some documentation about how to migrate. There is none of this stuff on Cisco's site. You have to search Reddit and multiple forums to assess what you can do with the deployment. I basically built it from scratch.
What was our ROI?
We are more secure thanks to ISE. That's always a return on investment.
What other advice do I have?
[When it comes to eliminating trust from our organization's network architecture] I'd say, no, ISE hasn't done that. It's been a challenge to implement this. We're trying to bridge the gap between the security guys and network guys. They're not the same teams. Sometimes the security guys also do networking, but it can be hard to cooperate on projects like this. This is a big project. ISE is a pretty big solution and security guys are sometimes lost in what's going on in the network, like equipment where you have to configure things.
It's pretty much the most resilient solution as of now.
I like this solution a lot. I would say it's a nine out of 10.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network engineer at Bimbo Bakeries USA
Is user-friendly, saves troubleshooting time, and is stable
Pros and Cons
- "The return on investment we have seen is related to time in terms of troubleshooting. The logs, such as the security logs, inform us of the issues that people have had. ISE has been very instrumental in helping isolate those issues. We've seen a lot of cost savings because we don't have to pay an IT person to waste time doing something that should be instantaneous."
- "On the network services devices, when you click on filter, the filter comes up. However, when I type in a search and I want to click on something it defaults back to the main page. I keep having an issue with that, and I'm not doing anything wrong."
What is our primary use case?
We use it for our AAA authentication through Active Directory. We also use it a lot to verify command line history.
We have ISE in the data center environment with redundancy, and we use it for authentication for all our devices. We have access to our third-party vendors, and for the new projects, we all use ISE. It's an awesome enterprise product for on-premises or for cloud-based deployments.
How has it helped my organization?
The integration of ISE with Active Directory has really been a big plus for us.
What is most valuable?
I've found two features to be the most valuable. One would be AAA reporting for historical analysis, showing what's been done and by whom. The second is the log for failures on Active Directory logins.
If I were to assess Cisco ISE for establishing trust for every access request, I would give it an eight or nine on a scale from one to ten.
Cybersecurity resilience has been very important to our organization and has been a big factor. We've had issues in the past, but one of the things I like about ISE is its logging features. Security-wise or information-wise, it really has been a powerful tool.
My impression of Cisco ISE for helping to support an organization across a distributed network is that it's invaluable. It's a monster tool; we don't even touch on all the features that it offers, but the few that we do use are extremely strong and very user-friendly.
What needs improvement?
On the network services devices, when you click on filter, the filter comes up. However, when I search and want to click on something it defaults back to the main page. I keep having an issue with that, and I'm not doing anything wrong.
For how long have I used the solution?
I've been using Cisco ISE (Identity Services Engine) for about six to seven years.
What do I think about the stability of the solution?
I've had no issues with stability.
What do I think about the scalability of the solution?
We've actually scaled before and have never had an issue.
How are customer service and support?
I've used technical support only once and would give them an eight out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously used ACS.
What was our ROI?
The return on investment we have seen is related to time in terms of troubleshooting. The logs, such as the security logs, inform us of the issues that people have had. ISE has been very instrumental in helping isolate those issues. We've seen a lot of cost savings because we don't have to pay an IT person to waste time doing something that should be instantaneous.
What other advice do I have?
If you are a leader who wants to build more resilience within your organization, I would advise you to follow what they're doing at ISE.
If you're evaluating Cisco ISE, do an apples-to-apples comparison. There are a lot of features, and ISE is a monster. If you use it the right way, I think that no other product will compare to it.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Client Manager at a tech vendor with 10,001+ employees
We can deep dive into each employees' usage according to our infrastructure needs
Pros and Cons
- "There are a lot of integrations available with multiple vendors. This has made the solution easier to work with."
- "If you have someone taking care of it, it can be quite easy to manage the solution. Otherwise, if you don't look after it and take care of it day-to-day, then it will become more complex to run."
What is our primary use case?
We have been authenticating our company's employees and certifying that they are in compliance. We have to certify our employees in regards to compliance, having all the necessary protections in our infrastructure for their endpoints, notebooks, laptops, and mobile phones.
We have implemented it across the entire company in every area and department at every single level of our organization.
So far, it has been on-premises. We are still working to expand it to integrate with multiple cloud providers, like AWS.
How has it helped my organization?
We have become more reliable because we do not have any vulnerabilities coming into our network, which is important since a lot of employees are using their own endpoints to connect to our infrastructure.
Every other time that we have a new employee, we need to make sure they have been using the latest version of the solution in order to connect to our infrastructure.
We have made our company more secure. As an IT guy, I have gained more importance to my company.
What is most valuable?
It is more about the features related to Apex. This is part of the solution where we can deep dive into each employees' usage according to our infrastructure needs.
There are a lot of integrations available with multiple vendors. This has made the solution easier to work with.
We use the management platform, which makes it easy for our IT to access and manage.
For how long have I used the solution?
We have been working with it for about 10 years.
What do I think about the stability of the solution?
If you have someone taking care of it, it can be quite easy to manage the solution. Otherwise, if you don't look after it and take care of it day-to-day, then it will become more complex to run. However, if you have someone taking care of it, maintenance is not that difficult.
What do I think about the scalability of the solution?
The scalability is good and quite easy to do. If you have the licenses, then anything is possible.
We worked with customers. The last one that we worked with had 10,000 licenses, i.e., 10,000 endpoints. We started working with the corporate office, then we replicate to the distribution centers.
How are customer service and support?
As an IT integrator, it is quite easy to work with their technical support. We have the correct people to deploy it as well as receive good support from the Cisco Technical Assistance Center. I would rate the support as 10 out of 10.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We have been using ISE for a while. We didn't have another solution beforehand.
How was the initial setup?
We had to do some labs beforehand, in order not to breach the environment. The deployment was not too complex.
When we work with customers, it takes four or five hours. We start with a specific environment, then we replicate to other areas.
What about the implementation team?
We are a reseller. My professional services implemented it, which includes a tech lead, engineer, senior engineer, and project manager to work with the solution.
It is an easy solution to implement with the correct partner.
What was our ROI?
It is difficult to measure security breaches, but since we have not been attacked so far, it has paid for itself over the years.
Which other solutions did I evaluate?
We worked with Fortinet to look at their solution, but ISE was more reliable and had more integration with our product vendors. Also, it had a more affordable cost.
When compared with other vendors, like Forescout, for what we need, ISE has been more usable and accessible.
What other advice do I have?
Learn about the solution, then evaluate what devices it would be implemented with. I would amalgamate the devices and their versions with a systems integrator or partner who already has experience and will try only to replicate it, not to reinvent the wheel.
Part of our journey is getting everybody connected to the infrastructure and trying to avoid any breaches. We don't want to be vulnerable.
I would rate the solution as 10 out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller.
Manager of IT at a financial services firm with 10,001+ employees
Enables us to control certificates of each device, preventing unauthenticated devices from entering our network
Pros and Cons
- "The access policies, and all of the policies in Cisco ISE, are important to us."
- "The user interface could be more user-friendly."
- "The pricing is fair."
What is our primary use case?
We use it for the identification of our devices, users, and wireless users.
How has it helped my organization?
Unauthenticated devices are not allowed on our network and that has been an improvement for our company. With Cisco ISE, we control the certificates of each device so that devices have internet access. The solution has eliminated trust from our network architecture.
What is most valuable?
The access policies, and all of the policies in Cisco ISE, are important to us.
What needs improvement?
The user interface could be more user-friendly.
For how long have I used the solution?
I have been using Cisco ISE (Identity Services Engine) for about six years.
What do I think about the stability of the solution?
The stability has been perfect. Our company has been using it for more than 10 years and it's stable. It's really good.
What do I think about the scalability of the solution?
The scalability is also good.
How are customer service and support?
The customer service has been perfect.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did not have a previous solution.
What's my experience with pricing, setup cost, and licensing?
The pricing is fair. We have a base license and an OpEx license.
Which other solutions did I evaluate?
We looked at other solutions, but that was a long time ago.
What other advice do I have?
I would recommend ISE to colleagues. We are happy with it and we want to use it in the cloud, next. Our on-prem devices go end-of-support in 2023 and we will try to use it on the cloud.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Cisco Identity Services Engine (ISE) Report and get advice and tips from experienced pros
sharing their opinions.
Updated: December 2024
Popular Comparisons
Aruba ClearPass
Forescout Platform
Fortinet FortiNAC
F5 BIG-IP Access Policy Manager (APM)
ThreatLocker Zero Trust Endpoint Protection Platform
Sophos Network Access Control
Ruckus Cloudpath
macmon Network Access Control
ExtremeControl
Buyer's Guide
Download our free Cisco Identity Services Engine (ISE) Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- ForeScout vs. Cisco ISE
- What are the main differences between Cisco ISE and Forescout Platform?
- Can Cisco ISE disallow authentication based on OS?
- Cisco ISE (Identity Services Engine) vs Fortinet FortiNAC: which solution is better and why?
- What are the requirements for integrating the Cisco Data Center and Cisco ISE?
- What is the biggest difference between Aruba ClearPass and Cisco ISE?
- Which is better - Aruba Clearpass or Cisco ISE?
- How would you compare Cisco ISE (Identity Services Engine) vs Forescout Platform?
- How does Cisco ISE compare with Fortinet FortiNAC?
- What is your experience with 802.1X when using EnGenius WAP/switch with Cisco ISE 2.1?