We use it for the identification of our devices, users, and wireless users.
Manager of IT at a financial services firm with 10,001+ employees
Enables us to control certificates of each device, preventing unauthenticated devices from entering our network
Pros and Cons
- "The access policies, and all of the policies in Cisco ISE, are important to us."
- "The user interface could be more user-friendly."
- "The pricing is fair."
What is our primary use case?
How has it helped my organization?
Unauthenticated devices are not allowed on our network and that has been an improvement for our company. With Cisco ISE, we control the certificates of each device so that devices have internet access. The solution has eliminated trust from our network architecture.
What is most valuable?
The access policies, and all of the policies in Cisco ISE, are important to us.
What needs improvement?
The user interface could be more user-friendly.
Buyer's Guide
Cisco Identity Services Engine (ISE)
February 2026
Learn what your peers think about Cisco Identity Services Engine (ISE). Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
883,448 professionals have used our research since 2012.
For how long have I used the solution?
I have been using Cisco ISE (Identity Services Engine) for about six years.
What do I think about the stability of the solution?
The stability has been perfect. Our company has been using it for more than 10 years and it's stable. It's really good.
What do I think about the scalability of the solution?
The scalability is also good.
How are customer service and support?
The customer service has been perfect.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did not have a previous solution.
What's my experience with pricing, setup cost, and licensing?
The pricing is fair. We have a base license and an OpEx license.
Which other solutions did I evaluate?
We looked at other solutions, but that was a long time ago.
What other advice do I have?
I would recommend ISE to colleagues. We are happy with it and we want to use it in the cloud, next. Our on-prem devices go end-of-support in 2023 and we will try to use it on the cloud.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Technical Leader at a retailer with 1,001-5,000 employees
We are very secure now because only corporate endpoints can be authenticated on our wireless
Pros and Cons
- "Authentication is the most valuable feature because it puts our company at another level of security."
What is our primary use case?
We use it for MAC Authentication Bypass, 802.1X authentication, and certification and validation against Active Directory. Because MAC devices can't be enrolled in the domain, we were doing a manual installation of certificates.
How has it helped my organization?
We are a very secure enterprise now because only our corporate endpoints can be authenticated on our wireless. Before, any device could be connected to our production network. And the corporate endpoints have antivirus and anti-malware. Things are more and more secure.
What is most valuable?
Authentication is the most valuable feature because it puts our company at another level of security. It establishes trust for every access because we use only corporate endpoints. If somebody has another device, they can't connect it to the enterprise network because we haven't implemented bring-your-own-device yet. We have five warehouse buildings and all our operations are around logistics and that means external people don't come to our buildings.
For how long have I used the solution?
I have been using Cisco ISE (Identity Services Engine) for three years.
What do I think about the stability of the solution?
It's very stable.
What do I think about the scalability of the solution?
It's expensive to scale Cisco ISE, but our situation is stable so we don't need to scale it for now. In the future, we will need a more scalable solution.
It is used for all our departments, all end-users, all corporate endpoints. And when we use MAC Authentication Bypass, we include printers and VIP cell phones.
How are customer service and support?
Tech support is very good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We didn't have a previous solution.
How was the initial setup?
The deployment was a little complex, but not because of the solution. It was more an issue for our people because it was a mindset change.
It took us about six months to deploy. Because we didn't have a previous solution, we just deployed it one department at a time across our four departments.
What about the implementation team?
We used an integrator, ITS Infocom. Experience-wise, it was very good. On our side, we had three people involved.
What was our ROI?
Since implementing Cisco ISE, we haven't had any attacks against our application.
What's my experience with pricing, setup cost, and licensing?
Pricing is not a problem for Cisco because it has a lot of features and not much competition, although it's more expensive than other products. But if I do a cost-benefit analysis, Cisco provides high quality.
Which other solutions did I evaluate?
We looked at Aruba. Cisco ISE is much better.
What other advice do I have?
Be patient with the implementation. It can be very difficult for the clients, the people using it, because it requires a change of mindset.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Cisco Identity Services Engine (ISE)
February 2026
Learn what your peers think about Cisco Identity Services Engine (ISE). Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
883,448 professionals have used our research since 2012.
Network Solutions Architect at a tech services company with 201-500 employees
Stable and easy to install network administration solution; provides network access control and fast support
Pros and Cons
- "Stable network administration solution that can be installed easily, and comes with fast technical support."
- "Compatibility and integration with other vendors is what needs to be improved in Cisco ISE (Identity Services Engine)."
What is our primary use case?
Our customers use Cisco ISE (Identity Services Engine) as a network access control solution. Before they can get network access, you can do posture check, e.g. in the Windows version, or another version, then it is only after this posture check that the clients can enter the network.
What needs improvement?
Compatibility with other vendors is what needs to be improved in Cisco ISE (Identity Services Engine). We should be able to use it with other vendors, for all specifications. There should be integration with different vendors, e.g. Cisco ISE (Identity Services Engine) working with AccuPoint networks.
For how long have I used the solution?
I've worked in my current company in product pre-sales for one year, and prior, I worked for a different partner company in Turkey, so my total usage of Cisco ISE (Identity Services Engine) spans eight years.
What do I think about the stability of the solution?
Cisco ISE (Identity Services Engine) is a stable solution. It has good performance.
How are customer service and support?
If we need support from the vendor side, we can open a case, then the vendor replies to us as soon as possible. Support for Cisco ISE (Identity Services Engine) is fast.
How was the initial setup?
The installation of Cisco ISE (Identity Services Engine) was easy.
What's my experience with pricing, setup cost, and licensing?
Our customers pay for the license of Cisco ISE (Identity Services Engine). They have an annual subscription, rather than a monthly subscription.
Which other solutions did I evaluate?
I evaluated Fortinet.
What other advice do I have?
I'm a technical person, and I've worked for a company that does system integrations, including network pre-sales. My company sells Cisco ISE (Identity Services Engine) and Fortinet products in Turkey. I can also sell these products. My company is a gold partner of Cisco.
I've sold the on-premises version of Cisco ISE (Identity Services Engine).
Cisco ISE (Identity Services Engine) is the best solution for Cisco network customers. It is the best solution for Cisco network devices. As for network products from other vendors, we can use, or we could offer other network access control (NAC) solutions, e.g. Fortinet NAC, or Aruba Secure NAC, etc.
I'm part of the pre-sales team at our company. There are other people who are responsible for installing Cisco ISE (Identity Services Engine) post-sales, e.g. they install the solution for the customers. For this reason, I am unable to give information on how long it takes to install the solution.
We currently have over 30 users of Cisco ISE (Identity Services Engine).
I can recommend Cisco ISE (Identity Services Engine) to other users.
My rating for Cisco ISE (Identity Services Engine) is eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
IT Security manager at a energy/utilities company with 201-500 employees
An authentication solution we can trust
Pros and Cons
- "The ability to integrate our Cisco AnyConnect connections to the active directory has been great."
- "It would be nice if it could be configured easily by default."
What is our primary use case?
This solution ties into our Cisco Duo and Cisco AnyConnect connections to help us authenticate against the active directory and Cisco Duo multifactor authentication. It takes metrics about the connections that are connecting it and allows us to set up a rule against them. For instance, if a Windows device is not all the way up to date, we can put a message up that says, "Before you're able to connect, please do your Windows updates as they haven't been done in six months."
As this solution allows AnyConnect to authenticate with the active directory in the backend, the users won't directly use it. Still, it will be in use throughout the login process into Cisco AnyConnect as a source of authentication.
With this solution, we don't require anyone for maintenance.
What is most valuable?
The ability to integrate our Cisco AnyConnect connections to the active directory has been great. Also, as a source of authentication during the process of logging into Cisco AnyConnect has been very useful for us.
What needs improvement?
It perfectly does everything we have been looking for it to do. I have not discovered any feature sets or items that are lacking. It's a much more functional product than the old Cisco ACS that it replaced.
That being said, during deployment, they shipped us the Cisco ISE with the 3.1 operating system, which was incompatible with the license that we had purchased, which would only allow us to go up to version 2.9. Because of this, we actually had to do a factory reset and a reload to the operating system — to an older version of the operating system. This required a very extensive process. We had to take out the Cisco ISE and put it into a factory reset mode to get it to roll back to the old operating system. If we were doing an upgrade, this would have been very simple, but as we were doing a downgrade, it was extremely complex and very labor-intensive. I was crawling through the server room, through wires, to plug things in, to get it to connect in the way that it needed to be connected with an external device in order to actually get it to roll back.
I don't like that the licensing structure doesn't allow us to have the 3.1 operating system — it forces us to use version 2.9. If you don't want to pay a monthly or a yearly subscription fee, either that device should have come automatically with the 2.9 version operating system, or it should have been much easier to actually roll it back. Additionally, support should have realized that our license requires us to have the 2.9 operating system instead of the 3.1 operating system, which would have saved us a lot of time.
It would be nice if it could be configured easily by default. If you're configuring a Cisco device, you pretty much need the support of a CCNA-level technician to be able to do it. It would be nice if there was a default or a more simple way to do it. It's not really a requirement to use the device because you can purchase the premium support or you could get a CCNA in-house to do it. Just having that ability to say, "Hey, we want to set this up" without too many complications or without having to bring in support would be nice.
For how long have I used the solution?
We've only been using this solution for the past three months.
What do I think about the scalability of the solution?
The scalability reports that we could easily handle a million users.
How are customer service and technical support?
I have been extensively involved with their technical support; their technical support is very good. They're more than willing to just jump on and do things for you. My only complaint is that at one point, we were trying to configure our single channel for Cisco Duo to be able to perform a password reset. Whenever we needed to look closely at another device, the support technician would say, "Hold on, let me bring in my expert on VPN; hold on, let me bring in my expert on Cisco ASA." We basically had to wait until we were able to get the Cisco Duo support agent, the Cisco ASA support agent, the Cisco VPN support agent, and the Cisco ISE support agent — all in the WebEx meeting at the same time.
As far as I'm to understand, there are CCNAs that should have been able to do it, but they brought in the experts from each item instead of just directly doing it themselves — this made the whole process take longer. Still, they were able to do everything in a way that did not affect our live environment, even though it was on the same device. That was actually very nice because it meant that we could do it in the middle of the day instead of having to do things in the middle of the night.
How was the initial setup?
The initial setup was very simple. Everything was set up within an hour thanks to assistance from the onboarding teams from Duo and Cisco, and our network administrator. They got it set up and reviewed a bunch of options with us. It was a very easy and nice process.
What about the implementation team?
Implementation was achieved with in-house resources and premium onboarding support. The entire process only took an hour.
What's my experience with pricing, setup cost, and licensing?
We are running version 2.9 because version 2.9 of the ISE has a persistent license —it's a one-time payment. The latest version (3.1) is only available if you do a yearly subscription.
It's a licensed physical device; there is no subscription. If you want the latest operating system, then you'll need to get an annual license.
What other advice do I have?
If you're planning on using this solution, my advice is to be sure you review the full feature set available and select what is important to your users. This way you'll be able to ensure that you'll have everything you want and need.
Overall, on a scale from one to ten, I would definitely give this solution a rating of nine.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Assistant general manager at a tech services company with 51-200 employees
Highly-Recommended Solution with Commendable Integration Capabilities
Pros and Cons
- "The valuable feature of the solution lies in its integration capabilities with other applications."
- "The tracking mechanism in Cisco ISE is relatively costly, especially its vendor-specific protocol."
What is our primary use case?
We primarily use the solution for network access control solution and network device access management. The solution comes with features like posturing.
What is most valuable?
The valuable feature of the solution lies in its integration capabilities with other applications. This facilitates seamless operations like Microsoft migration across networks and call center management. The ability to segregate multiple domain users in the Access Network ensures efficient, logical management.
What needs improvement?
The tracking mechanism in Cisco ISE is relatively costly, especially its vendor-specific protocol. It would be beneficial if it could support open source or other devices with a similar checking mechanism, but unfortunately, it remains proprietary.
For how long have I used the solution?
I have been working with the solution for the past five years.
What do I think about the stability of the solution?
The solution is highly-stable. I rate it a perfect ten.
What do I think about the scalability of the solution?
The solution is scalable. We have three users for the Cisco ISE.
How are customer service and support?
Their customer service and support is excellent.
How would you rate customer service and support?
Positive
How was the initial setup?
The setup is straightforward. Effective planning is crucial for the setup of Cisco ISE. Placement of the virtual solution requires careful consideration of network accessibility from all branches. Different components may need placement in various areas in a large network. So, thoughtful planning for the architecture is important. It takes around two days for the deployment.
What's my experience with pricing, setup cost, and licensing?
Previously, Cisco ISE had a perpetual licensing model, but now they have shifted to a subscription-based licensing system. We now have to pay recurring costs. This change in the pricing model has presented challenges for many customers accustomed to the simplicity of the previous licensing model.
What other advice do I have?
I recommend this solution to all. Overall, I rate it a perfect 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
IT Architect at a tech services company with 501-1,000 employees
Enabled features that were not present or possible before but it needs a lot of resources to run
Pros and Cons
- "For customers, it's great. It has a GUI, so the customers themselves can edit ACLs or even modify the policies. It's also an all-in-one solution with RADIUS and TACACS."
- "I'm frustrated by the resource consumption and how many resources it needs to run. It takes a lot of RAM. It takes a lot of space and a lot of IO power. It's frustrating to do upgrades because it takes a long time."
What is our primary use case?
At first, Cisco ISE was a replacement for only ACS RADIUS. It was mostly for remote access VPNs and Wi-Fi. That was it, and later, it evolved into a complete ACS replacement, so it's for both TACACS and RADIUS. Nowadays, we also deploy .1X quite a lot.
How has it helped my organization?
It was a driver towards .1X. With the features that were there on the network side and the features that were there with Cisco ISE, it was way easier to go to .1X.
It's the brain of many things. It's the brain for VPNs. In Cisco ISE, we control where the users are allowed to go. Customers are able to do that by themselves. It's the same for .1X. It's the heart of security.
Cisco ISE improved our cybersecurity resilience. It enabled features that were not present or possible before.
What is most valuable?
For customers, it's great. It has a GUI, so the customers themselves can edit ACLs or even modify the policies. It's also an all-in-one solution with RADIUS and TACACS.
What needs improvement?
I'm frustrated by the resource consumption and how many resources it needs to run. It takes a lot of RAM. It takes a lot of space and a lot of IO power. It's frustrating to do upgrades because it takes a long time. Things are at a much smaller scale where we are than in the US. We even have smaller virtualization farms, so it takes a considerable amount of power and resources.
For how long have I used the solution?
We've been using this solution since its initial release. It was probably version 1.1 or 1.2.
How are customer service and support?
I don't remember opening a case for Cisco ISE except for the licensing problems, but several years ago, it took some time for people to get to the right way to solve the problem. I am not sure whether it was my inability to clarify the situation or whether it was a matter of poor training, but it was sometimes very painful.
How was the initial setup?
I've been working with this product for a while. It doesn't seem difficult. However, in terms of resources, it takes a while to get it running. I don't think it's necessary to be so resource-consuming and slow. That makes it complicated.
What's my experience with pricing, setup cost, and licensing?
Pricing is where things got a bit more complicated. Previously, it was a one-time purchase and we just had to renew support. These days, there's a subscription model, which is supposed to be easier and cheaper as well, but it's more pricey. Customers are aware of that, and many vendors are going the same way. They are trying to go along with the new model.
Which other solutions did I evaluate?
We did consider other products, but it didn't make sense to go for any competing vendor because of the integration with other Cisco products. AnyConnect is the best VPN product I am aware of, and that's usually why we stick with Cisco.
We also sell HPE products. We've deployed some HPE RADIUS solutions, but we prefer Cisco these days.
What other advice do I have?
To someone researching this solution who wants to improve the cybersecurity in their organization, I would tell them to first think about what they are trying to achieve and then think about Cisco ISE as a tool. It isn't a turnkey solution.
It hasn't saved our IT staff's time. It was something that wasn't present before. It's an evolution that is necessary, but I wouldn't say it saves time.
It did help us consolidate any tools or applications. It was either a replacement of some legacy products or it was an improvement where it introduced new features that were not present before, but it didn't help get rid of some of the other products. It was a new thing to place into the network.
Overall, I'd rate Cisco ISE a six out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Manager of Systems Architecture at a computer software company with 51-200 employees
Keeps us safe from rogue devices and helps to ensure that all devices meet the requirements for patches and certificates
Pros and Cons
- "It's keeping our company safe from rogue devices connecting to our network. From a security standpoint, there's peace of mind knowing that every device that connects is a good one."
- "The upgrades could be better. Every time we try to do an upgrade, we have problems. It's a pain."
What is our primary use case?
We use it to ensure that any device that connects to our network or wireless environment is a company-owned asset and has all the security certificates. We aren't doing too much remediation. We just identify whether it's one of our assets and whether it's allowed.
How has it helped my organization?
In our company, we have a lot of remote workers. Knowing that even devices that are coming through a VPN comply with our policies, whether they're in the office or they're remote, face the same level of scrutiny is a benefit to our company.
We can set as in-depth alerts as we want to. We can set up an alert through email, text, etc.
It has helped to improve our cybersecurity resilience. It helps to ensure that all devices meet the patching and certificate requirements.
What is most valuable?
It's keeping our company safe from rogue devices connecting to our network. From a security standpoint, there's peace of mind knowing that every device that connects is a good one.
What needs improvement?
The upgrades could be better. Every time we try to do an upgrade, we have problems. It's a pain.
For how long have I used the solution?
I've only been with the company for six months, but they adopted Cisco ISE about three to five years ago.
How are customer service and support?
Support has always been good. Overall, I'd rate them an eight out of ten. Sometimes it feels that their first-level support hasn't been trained in-depth.
How would you rate customer service and support?
Positive
How was the initial setup?
We have redundant solutions across all of our data centers, policy nodes, and authentication nodes. As far as I know, we started off in a small deployment with our wireless. We profiled our devices to ensure that they belonged to our companies before we let them access, and then from there, we expanded into profiling wired ports as well, so we started very small and then moved to a larger solution.
In terms of our plans to increase its usage, we may use Cisco ISE in different ways, but the number of nodes that we have will probably stay the same. With version 2, we're moving more of our deployment to the cloud, so we'll move from the on-premise solution to the cloud. We've already started the process. We have some nodes built in the cloud, and we just have to move the production and then remove our on-prem. We're using Oracle Cloud for our highest deployments. It will be fully cloud.
What was our ROI?
We've seen a return on investment from the security aspect.
What other advice do I have?
I'd advise starting just the way we did. Start small because there are a lot of use cases of Cisco ISE. If you try to do it all at once, you might be disappointed, so start small and pick an area that you'd like to focus on, get that piece done, and then go from there.
It hasn't really helped to free up our IT staff for other projects. It also hasn't helped us consolidate any tools.
Overall, I'd rate Cisco ISE an eight out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Architect at a tech vendor with 10,001+ employees
Has the ability to allow or deny hosts onto the network
Pros and Cons
- "The ability to allow or deny hosts onto the network is valuable. It provides great security to the network environment."
- "It could be more intuitive in terms of how to configure the policies."
What is our primary use case?
We mainly use it for endpoint security.
How has it helped my organization?
Cisco ISE has made our network more secure.
It has saved the time of our security team. I can't say how much time it has saved because I'm on the network side, but I'd imagine it has saved quite a bit of time. It lets them sleep better at night.
It does a good job of securing our infrastructure from end to end so that we can detect and remediate threats, but I don't have a similar product to compare.
It hasn't helped to consolidate any tools. The customer is in the process of migrating from their current ACS to ISE. When they've done that, we'll consolidate that piece. This consolidation would provide a single pane of management versus multiple tools.
I'd imagine it has helped our organization improve its cybersecurity resilience, but the security team would know more about it.
What is most valuable?
The ability to allow or deny hosts onto the network is valuable. It provides great security to the network environment.
What needs improvement?
It could be more intuitive in terms of how to configure the policies.
For how long have I used the solution?
I've been using Cisco ISE for four years.
What do I think about the stability of the solution?
It's very stable.
What do I think about the scalability of the solution?
It's very scalable. We have deployed it globally.
How are customer service and support?
Their support is good. I'd rate them a seven out of ten.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We didn't use any other solution previously. We went for Cisco ISE because we're a Cisco shop. It helps to have one vendor for network management and security.
What about the implementation team?
Cisco's Professional services did the installation. I wasn't involved in its installation, but they did a pretty good job.
What was our ROI?
I'd imagine we have seen an ROI, but I'm not involved in the pricing or purchasing. The security it provides gives peace of mind. That's a good return.
What other advice do I have?
My advice would be to do an evaluation of the product and purchase it.
I'd rate Cisco ISE an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Buyer's Guide
Download our free Cisco Identity Services Engine (ISE) Report and get advice and tips from experienced pros
sharing their opinions.
Updated: February 2026
Popular Comparisons
Cisco Secure Firewall
Cisco Umbrella
Aruba ClearPass
Forescout Platform
Fortinet FortiNAC
Cisco Secure Email
Cisco Secure Network Analytics
Cisco Secure Client (including AnyConnect)
Cisco Secure Endpoint
Cisco Secure Workload
ThreatLocker Zero Trust Endpoint Protection Platform
F5 BIG-IP Access Policy Manager (APM)
ExtremeCloud IQ
Buyer's Guide
Download our free Cisco Identity Services Engine (ISE) Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- ForeScout vs. Cisco ISE
- What are the main differences between Cisco ISE and Forescout Platform?
- Can Cisco ISE disallow authentication based on OS?
- Cisco ISE (Identity Services Engine) vs Fortinet FortiNAC: which solution is better and why?
- What are the requirements for integrating the Cisco Data Center and Cisco ISE?
- What is the biggest difference between Aruba ClearPass and Cisco ISE?
- Which is better - Aruba Clearpass or Cisco ISE?
- How would you compare Cisco ISE (Identity Services Engine) vs Forescout Platform?
- How does Cisco ISE compare with Fortinet FortiNAC?
- What is your experience with 802.1X when using EnGenius WAP/switch with Cisco ISE 2.1?














