CyberArk Privileged Access Manager and Cisco Identity Services Engine (ISE) compete in privilege management and network identity services. CyberArk is favored for its support and pricing, while Cisco ISE stands out with robust features that justify its cost.
Features: CyberArk strengthens security through comprehensive privilege management, efficient user access control, and automated credential management. Cisco ISE enhances network management with advanced policy enforcement, seamless integration capabilities, and reliable network visibility features.
Room for Improvement: CyberArk users suggest improving reporting and analytics, enhancing user interface intuitiveness, and expanding third-party integration options. Cisco ISE users highlight the need for simplifying feature complexity, improving integration documentation, and optimizing resource allocation.
Ease of Deployment and Customer Service: CyberArk offers a relatively straightforward deployment process and dependable customer service. Cisco ISE requires complex deployment but benefits from extensive documentation and proactive technical support, providing guidance through its intricacies.
Pricing and ROI: CyberArk presents competitive setup costs and a promising ROI, appealing to users focused on initial investment efficiency. Cisco ISE, while having higher initial costs, brings value through features that enhance network security and long-term investment potential.
I rate the technical support as one out of ten.
Sometimes it's challenging to identify which support team is responsible for certain issues, which is a significant concern.
They are helpful, but complex issues can take a long time to resolve, which can delay solutions for urgent customer issues.
They do not go into analyzing the issue.
CyberArk's customer service has improved recently and is now very responsive.
Pricing can be more expensive compared to other vendors, and there is a significant price gap observed, which doesn't seem justified by some specific features.
They are very poor in asset classification and should focus on improving the preauthentication profiling, especially for NAC use cases.
They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises.
The graphical user interface could be simplified and harmonized for better usability.
Upgrades require a lot of resources, as it impacts the entire organization.
Factors like architecture, business nature, and legal limitations such as GDPR affect it.
I would rate it a nine out of ten for scalability.
We started small and expanded it to an enterprise level, and are now moving to the cloud for further growth.
The SaaS version is more flexible, allowing easier scaling with increased users.
Compared to other solutions like HPE ClearPass, Cisco is more costly, and the conversation suggests a possible forty percent price gap compared to competitors.
Cloud solutions are expensive, while on-prem setups with shared environments are cheaper but not effective.
CyberArk is expensive compared to other products I know.
CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.
It is very expensive.
Cisco Identity Services Engine (ISE) is considered very reliable and stable.
The stability of Cisco Identity Services Engine (ISE) is poor for certain use cases, like authentication.
Proper fine-tuning and expertise ensure the product performs well.
Overall, the stability of the solution is high.
The solution is integrated with other Cisco devices and can offer automation for an organization, making deployments more dynamic and providing real-time visibility.
Cisco Identity Services Engine (ISE) is very good at device administration.
CyberArk Privileged Access Manager helps ensure data privacy because we now know who is using which credentials and at what time.
As a security professional, I have real-time visibility into ongoing sessions.
When you give access to a user, it monitors and detects if the user's behavior is unusual.
Cisco ISE is an all-in-one solution that streamlines security policy management and reduces operating costs. Cisco ISE delivers visibility and access control over users and devices across wired, wireless, and VPN connections.
Identity Services Engine enables enterprises to deliver secure network access to users and devices. It shares contextual data, such as threats and vulnerabilities, with integrated solutions from Cisco technology partners. You can see what is happening in your network, which applications are running, and more.
Features of Cisco ISE
Benefits of Cisco ISE
Cisco’s holistic approach to network access security has several advantages:
Support
You can get ISE as a physical or virtual appliance. Both deployments can create ISE clusters that create scale, redundancy, and requirements.
Licensing
Cisco ISE has four primary licences. Evaluation for up to 100 endpoints with full platform functionality. The higher tiers are Partner, Advantage and Essential.
Reviews from Real Users
"The user experience of the solution is great. It's a very transparent system. according to a PeerSpot user in Cyber Security at a manufacturing company.
Omar Z., Network & Security Engineer at an engineering company, feels that "The RADIUS Server holds the most value."
“Whether I deploy in China, the US, South Africa, or wherever, I can get all the capabilities. It allows me to directly integrate with 365, and from a communications point of view, that is a good capability," says Rammohan M., Senior Consultant at a tech services company.
Hassan A.,Technology Manager at Advanced Integrated Systems, says that "The most valuable feature is the integration with StealthWatch and DNA as one fabric."
CyberArk Privileged Access Manager is a next-generation solution that allows users to secure both their applications and their confidential corporate information. It is extremely flexible and can be implemented across a variety of environments. This program runs with equal efficiency in a fully cloud-based, hybrid, or on-premises environment. Users can now protect their critical infrastructure and access it in any way that best meets their needs.
CyberArk Privileged Access Manager possesses a simplified and unified user interface. Users are able to manage the solution from one place. The UI allows users to view and manage all of the information and controls that administrators need to be able to easily access. Very often, management UIs do not have all of the controls and information streamlined in a single location. This platform provides a level of visibility that ensures users will be able to view all of their system’s most critical information at any time that they wish.
Benefits of CyberArk Privileged Access Manager
Some of CyberArk Privileged Access Manager’s benefits include:
Reviews from Real Users
CyberArk Privileged Access Manager’s software stands out among its competitors for one very fundamental reason. CyberArk Privileged Access Manager is an all-in-one solution. Users are given the ability to accomplish with a single platform what might usually only be accomplished with multiple solutions.
PeerSpot users note the truly all-in-one nature of this solution. Mateusz K., IT Manager at a financial services firm, wrote, "It improves security in our company. We have more than 10,000 accounts that we manage in CyberArk. We use these accounts for SQLs, Windows Server, and Unix. Therefore, keeping these passwords up-to-date in another solution or software would be impossible. Now, we have some sort of a platform to manage passwords, distribute the inflow, and manage IT teams as well as making regular changes to it according to the internal security policies in our bank."
Hichem T.-B., CDO & Co-Founder at ELYTIK, noted that “This is a complete solution that can detect cyber attacks well. I have found the proxy features most valuable for fast password web access.”
We monitor all Network Access Control (NAC) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.