We performed a comparison between BeyondTrust Endpoint Privilege Management and Cisco ISE (Identity Services Engine) based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."I find the comprehensive Privilege Access Management features valuable, including automation, and the ability to integrate with applications and the Windows operating system."
"The notable aspect is its ability to capture the application's behavior comprehensively and this thorough analysis is crucial for effective policy management."
"The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager."
"The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager."
"The privileged access management into sensitive systems is very valuable. That includes control from the endpoint all the way through to the managing of passwords and credentials that are used by the person to access the sensitive information. It's very useful, because nobody ever really maintains passwords for those endpoint systems. It's maintained in the Dropbox password file."
"It is straightforward. It is a good technology, and it is made to do one single thing."
"BeyondTrust has very good integrations with quite a lot of security vendors such as SailPoint, IBM, FortiGuard, Splunk, etc."
"The solution's least privilege enforcement has helped us ensure access is given to only the required people."
"Cisco ISE scales exceptionally well."
"Profiling is one of the most valuable features. We have a lot of different devices between cameras, access points, and laptops that get plugged in."
"Cisco offers automation, visibility, and control as well as third party integration capabilities."
"For me, the TACACS feature is the most valuable. I have also used Cisco ISE with LDAP, not with Active Directory. That works for me because I prefer LDAP versus Active Directory."
"The most valuable feature is 801.1x and another very good feature is the TACACS."
"The solution is great for establishing trust for every access request no matter where it comes from."
"The most important feature for us is visibility in terms of user connections. It's the ability to see what devices are online for a particular user that helps a lot with our troubleshooting."
"I like the automation of the collection of information."
"Reports to the end user."
"The initial setup was very difficult. Even if you are an expert in EPM, it is still very difficult."
"It should support XWindows Remote Desktop Access protocol for Linux/Unix."
"There is room for improvement in having the solution align more with standards. We're always shoehorning the product into the standards. It's not that it doesn't work for standards, it does. But Quick Start Policies are pretty close to what we need. The vendor needs to keep looking at GDPR, 27001, and 27701. That's why our clients buy the product."
"We faced some challenges with remote desktop sessions."
"We use a program to automate all of this, but it's not a default feature of BeyondTrust Endpoint Privilege Management."
"The product should improve its price."
"There are three types of endpoints. If we need to use them in the solution, then we need to purchase the licenses separately. The tool needs to improve its licensing."
"The Cisco wireless controller needs to add more than one physical port."
"There is room for improvement in its ability to allow end users to self-enroll their devices. Instead, you should be able to assign that permission by AD group, which is currently not available."
"If Cisco could grant more control, the features could be more focused on network and security administration, reducing the need for integration with other components."
"The upgrades could be better. Every time we try to do an upgrade, we have problems. It's a pain."
"The compliance and posture don't always work. They should make it more stable. With each upgrade, we lose some functionality. We have to wait for another upgrade."
"The tracking mechanism in Cisco ISE is relatively costly, especially its vendor-specific protocol."
"There can be a little bit more integration between the controller management and ISE. There are two dashboards, you have the controller dashboards, and you have the ISE dashboard it would is a way to maybe integrate that into one. That would be great. It's not that bad. It would be easier if it could be combined into one dashboard."
"Cisco ISE could be simplified somewhat. I would also prefer certificate-based authentication over confirmation-based authentication for all the processes. It's possible for us to do a workaround, but the process needs to be simplified."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
More Cisco ISE (Identity Services Engine) Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 5th in Privileged Access Management (PAM) with 28 reviews while Cisco ISE (Identity Services Engine) is ranked 1st in Network Access Control (NAC) with 138 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while Cisco ISE (Identity Services Engine) is rated 8.2. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of Cisco ISE (Identity Services Engine) writes "Gives us that extra ability to assist the end user and make sure that we are making them happy". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, CyberArk Privileged Access Manager, Delinea Secret Server, ARCON Privileged Access Management and Microsoft Defender for Endpoint, whereas Cisco ISE (Identity Services Engine) is most compared with Aruba ClearPass, Fortinet FortiNAC, Forescout Platform, CyberArk Privileged Access Manager and Portnox CORE.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.