Try our new research platform with insights from 80,000+ expert users

Cisco Identity Services Engine (ISE) vs ForgeRock comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Customer Service

Sentiment score
5.3
Cisco ISE support is praised for expertise but criticized for slow responses and inconsistent quality, especially with complex issues.
No sentiment score available
I rate the technical support as one out of ten.
 

Room For Improvement

Sentiment score
4.5
Cisco ISE requires improved integration, usability, and performance, with enhanced features and efficiency for better user adoption and experience.
No sentiment score available
They are very poor in asset classification and should focus on improving the preauthentication profiling, especially for NAC use cases.
 

Scalability Issues

Sentiment score
7.0
Cisco ISE is scalable for enterprises but requires proper design, planning, and hardware considerations for efficient deployment.
No sentiment score available
Factors like architecture, business nature, and legal limitations such as GDPR affect it.
 

Setup Cost

No sentiment score available
Cisco Identity Services Engine pricing is competitive but complex, with tiered licensing and additional costs potentially impacting smaller businesses.
No sentiment score available
Making large organizational costs significant.
 

Stability Issues

Sentiment score
7.7
Cisco Identity Services Engine is stable and reliable, with occasional update and scaling challenges, and generally effective support resolution.
No sentiment score available
The stability of Cisco Identity Services Engine (ISE) is poor for certain use cases, like authentication.
 

Valuable Features

Sentiment score
8.0
Cisco ISE provides robust network control, seamless Cisco integration, and enhances security with policy management, zero-trust, and BYOD support.
No sentiment score available
Cisco Identity Services Engine (ISE) is very good at device administration.
 

Categories and Ranking

Cisco Identity Services Eng...
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
140
Ranking in other categories
Network Access Control (NAC) (1st), Cisco Security Portfolio (1st)
ForgeRock
Average Rating
8.0
Reviews Sentiment
7.6
Number of Reviews
30
Ranking in other categories
Identity Management (IM) (11th), Access Management (6th), Customer Identity and Access Management (CIAM) (4th)
 

Mindshare comparison

Cisco Identity Services Engine (ISE) and ForgeRock aren’t in the same category and serve different purposes. Cisco Identity Services Engine (ISE) is designed for Network Access Control (NAC) and holds a mindshare of 29.2%, down 31.6% compared to last year.
ForgeRock, on the other hand, focuses on Access Management, holds 6.9% mindshare, up 6.5% since last year.
Network Access Control (NAC)
Access Management
 

Featured Reviews

Rohit-Joshi - PeerSpot reviewer
Enables us to ensure that any machine that comes into the network is patched and secure
Posturing is the most valuable feature. There are other tools available that can do some of their other features, like network authentication. The posturing was something because of the nature of the industry that we are in. There are people who go outside for work. Their machines are at times not in the network, and not patched properly. We don't know when they're going to come back, whether it is in a good state, whether it has antivirus, whether it's installed on those machines. Posturing is something that we have made our baseline policy that whenever a machine comes back to our network, it should have a certain level of the operating system and a level of security and antivirus installed. We couldn't have done this posturing without Cisco ISE. This is its greatest feature. It does help me to detect and remediate my network. It enables me to detect any external threat that comes to my network and remediate. If a machine comes into my network that does not qualify per my baseline policy, I have a policy that the machine gets redirected to where it can be patched and remediated. I can ensure that it is fully patched and secure. The entire idea of having ISE is to enhance cybersecurity resilience. The zero trust architecture was coined by the cybersecurity team itself. It was a task given to us in the infrastructure space to see how we can bring resilience into the cybersecurity network and ISE was the solution.
Trisha Bhola - PeerSpot reviewer
It's easier to customize and maintain our code
I worked on two different projects based on ForgeRock, and both are automated deployments. One is a UI-based deployment. It's an automated process using some scripts. The deployments are done through Octopus, so it's also automated. We first deploy the essential components of AM and then implement additional configurations like Amster Imports. After that, we import all the SAML Federation data and add some certificates. We have two teams of five and three team members working on the different deployment processes. One is working on the dev side, another is looking at the higher environment, and one is managing the data. In another project, I'm the only developer. We also deploy on the dev environments so that anyone can test new features, configurations, and client requirements. They can test it on the dev environment, but a team of four people manages higher environments. The Access Management component involves the most customization, which takes around 15 to 20 minutes because of the need to import the Amster configuration. If another deployment is simultaneously happening, it may be a little slower and take around 30 minutes. The other components, like the user data stores, take about five to seven minutes. It's another five to 10 minutes for Identity Management. After deployment, the maintenance is mostly checking for security vulnerabilities. If ForgeRock shares security vulnerabilities or advisories, we check to see if there is something inside we need to maintain. Other than that, we just install updates when they add features each month.
report
Use our free recommendation engine to learn which Network Access Control (NAC) solutions are best for your needs.
816,406 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
26%
Computer Software Company
15%
Financial Services Firm
8%
Government
7%
Financial Services Firm
23%
Computer Software Company
13%
Government
7%
Insurance Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Which is better - Aruba Clearpass or Cisco ISE?
Aruba ClearPass is a Network Access Control tool that gives secure network access to multiple device types. You can adapt the policies to VPN access, wired, or wireless access. You can securely ...
What are the main differences between Cisco ISE and Forescout Platform?
OK, so Cisco ISE uses 802.1X to secure switchports against unauthorized access. The drawback of this is that ISE cannot secure the port if a device does not support 802.1x. Cameras, badge readers, ...
How does Cisco ISE compare with Fortinet FortiNAC?
Cisco ISE uses AI endpoint analytics to identify new devices based on their behavior. It will also notify you if someone plugs in with a device that is not allowed and will block it. The user exper...
What do you like most about ForgeRock?
The most valuable features of ForgeRock are social login and data protection.
What is your experience regarding pricing and costs for ForgeRock?
Our company was considering switching back to Keycloak from ForgeRock, so as to not pay any license fees. ForgeRock also supports M-PIN and biometric features that Keycloak does not provide. My com...
What needs improvement with ForgeRock?
In the past, I saw that Splunk was integrated with a testing portal, and then it was integrated with Slack. I don't think ForgeRock directly supports integrations with Slack, making it an area wher...
 

Also Known As

Cisco ISE
ForgeRock Identity Platform, ForgeRock OpenIDM
 

Overview

 

Sample Customers

Aegean Motorway, BC Hydro, Beachbody, Bucks County Intermediate Unit , Cisco IT, Derby City Council, Global Banking Customer, Gobierno de Castilla-La Mancha, Houston Methodist, Linz AG, London Hydro, Ministry of Foreign Affairs, Molina Healthcare, MST Systems, New South Wales Rural Fire Service, Reykjavik University, Wildau University
Geico, Thomson Reuters, Salesforce, McKesson, Trinet, SKY, BNP Paribas, Deloitte, Capgemini, North Western University
Find out what your peers are saying about Cisco, HPE Aruba Networking, Fortinet and others in Network Access Control (NAC). Updated: October 2024.
816,406 professionals have used our research since 2012.