Network Architect at a tech vendor with 10,001+ employees
Vendor
Top 20
Has the ability to allow or deny hosts onto the network
Pros and Cons
  • "The ability to allow or deny hosts onto the network is valuable. It provides great security to the network environment."
  • "It could be more intuitive in terms of how to configure the policies."

What is our primary use case?

We mainly use it for endpoint security.

How has it helped my organization?

Cisco ISE has made our network more secure. 

It has saved the time of our security team. I can't say how much time it has saved because I'm on the network side, but I'd imagine it has saved quite a bit of time. It lets them sleep better at night.

It does a good job of securing our infrastructure from end to end so that we can detect and remediate threats, but I don't have a similar product to compare.

It hasn't helped to consolidate any tools. The customer is in the process of migrating from their current ACS to ISE. When they've done that, we'll consolidate that piece. This consolidation would provide a single pane of management versus multiple tools.

I'd imagine it has helped our organization improve its cybersecurity resilience, but the security team would know more about it.

What is most valuable?

The ability to allow or deny hosts onto the network is valuable. It provides great security to the network environment.

What needs improvement?

It could be more intuitive in terms of how to configure the policies.

Buyer's Guide
Cisco ISE (Identity Services Engine)
June 2024
Learn what your peers think about Cisco ISE (Identity Services Engine). Get advice and tips from experienced pros sharing their opinions. Updated: June 2024.
772,679 professionals have used our research since 2012.

For how long have I used the solution?

I've been using Cisco ISE for four years.

What do I think about the stability of the solution?

It's very stable.

What do I think about the scalability of the solution?

It's very scalable. We have deployed it globally.

How are customer service and support?

Their support is good. I'd rate them a seven out of ten.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

We didn't use any other solution previously. We went for Cisco ISE because we're a Cisco shop. It helps to have one vendor for network management and security.

What about the implementation team?

Cisco's Professional services did the installation. I wasn't involved in its installation, but they did a pretty good job.

What was our ROI?

I'd imagine we have seen an ROI, but I'm not involved in the pricing or purchasing. The security it provides gives peace of mind. That's a good return.

What other advice do I have?

My advice would be to do an evaluation of the product and purchase it.

I'd rate Cisco ISE an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Network Manager at a university with 501-1,000 employees
Real User
Top 20
Enables us to identify users and make appropriate decisions about where they can and cannot go
Pros and Cons
  • "The TACACS and RADIUS have been the most valuable features so far."
  • "Cisco ISE has almost all the features we are looking for now, but sometimes the configuration, such as the conditions, is a little difficult to understand and not so easy to navigate."

What is our primary use case?

We use it for the TACACS authentication, for administrator login to network devices, and the RADIUS service for VPN and wireless authentication.

Initially, we were looking for a single sign-on for administrators to log in to every network device, but we also wanted a good way to control remote user access for logging in. Later we started using it for VPN and wireless.

How has it helped my organization?

It gives us a better way to authenticate users. It helps us identify a user with their device to establish trust. When a remote user is trying to access network resources, we need to find out who they are and where they want to go and make an appropriate decision about where they can and cannot go.

Resilience in cyber security is very important. Without security, nothing else can happen.

What is most valuable?

The TACACS and RADIUS have been the most valuable features so far.

What needs improvement?

Cisco ISE has almost all the features we are looking for now, but sometimes the configuration, such as the conditions, is a little difficult to understand and not so easy to navigate.

For how long have I used the solution?

I have been using Cisco ISE (Identity Services Engine) for a few years.

What do I think about the stability of the solution?

It is stable.

How are customer service and support?

They have resolved my issues, but sometimes they have been slow.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We used to use Cisco ACS and that evolved to Cisco ISE.

How was the initial setup?

The initial deployment was not a process that was easy to understand. But after I completed it, looking back, I see it was reasonable. It's just hard to understand upfront. There is a steep learning curve.

I did the migration too late, so I couldn't do a direct migration and that meant I had to kind of rebuild it.

What was our ROI?

Security is something we need, but I don't think that there is a return on investment. It causes more delays to the regular workflow.

What's my experience with pricing, setup cost, and licensing?

The Essentials licensing is reasonable, but I would like the Premier version to be perpetual instead of a subscription.

What other advice do I have?

An idea we are looking into is associating it with the MAC address table, so that approved devices can log in to the more restricted network.

My advice is to attend training before going for it. Otherwise, it will not be easy to understand. Each product, from ACS to ISE, does similar things, but they do them in different ways.

I rate Cisco ISE a nine out of 10. If it could become a little bit easier to understand that would help.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Cisco ISE (Identity Services Engine)
June 2024
Learn what your peers think about Cisco ISE (Identity Services Engine). Get advice and tips from experienced pros sharing their opinions. Updated: June 2024.
772,679 professionals have used our research since 2012.
Chinthaka Kannangara - PeerSpot reviewer
Network System Engineer at VSIS
Real User
Allows you to control or restrict access on your network and has a scalable licensing structure
Pros and Cons
  • "The best features are the scalability and the license structure."
  • "The licensing documentation needs to be better."

What is our primary use case?

The solution is used for controlled access in the network, like if you want to restrict access.

The solution is deployed on-prem. I am an integrator of this solution.

What is most valuable?

The best features are the scalability and the license structure. The license structure is like a tier. If a customer doesn't actually want the highest features, then they can just start with the basic license package and upgrade it if their network is growing. For the smaller customers, they can start with the smaller plans and so on. If you have a financial customer or banking customer, they can go for the full features, and if it's not that critical, the customer can get the basic license package and implement that.

What needs improvement?

The licensing documentation needs to be better. We found some old documents describing the license names, like the Base license and Apex license. Cisco used both names. We have found that they changed the Advantage license and Premier License. If someone misunderstands that, they might end up with a hassle. I don't know if it's possible or not for Cisco to remove the older documents from the official website.

For how long have I used the solution?

We have been working with this solution for more than two years.

We were using two solutions on Cisco's network, so we had a few ISE plans in that network.

What do I think about the stability of the solution?

The solution is stable. We have maybe 4,000 users for the Next solution.

How are customer service and support?

We haven't used technical support very much, but in general, Cisco's support is always responsive.

How was the initial setup?

Initial setup was straightforward from our point of view because we have engineers who did that, so of course it was not an issue with us.

The accesses took maybe three or four months to complete, but the Next part took about three weeks.

For deployment and maintenance, the team was average sized. You need to follow the correct documents for deployment. There can be misunderstandings if you use old documentation.

What's my experience with pricing, setup cost, and licensing?

The licensing is subscription-based and based on the user account.

What other advice do I have?

I would rate this solution 8 out of 10. 

I would recommend this solution.

If someone is looking for a concrete solution to control the access, then ISE is a better solution.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Integrator
PeerSpot user
Network Engineer at a manufacturing company with 201-500 employees
Real User
Top 20
Allows us to create different vendor and employee access groups
Pros and Cons
  • "The policy sets give us more granular groups for end-user access."

    What is our primary use case?

    It's mostly for authentication to our network for our end-users.

    How has it helped my organization?

    It's allowed us to create groups for different vendors and for employees in various groups in our company, without giving everyone access.

    It has also given us a lot of extra security as the backbone of authentication for our VPN and wireless network.

    What is most valuable?

    The policy sets give us more granular groups for end-user access.

    For how long have I used the solution?

    I've been using Cisco ISE (Identity Services Engine) for five years.

    What do I think about the stability of the solution?

    The stability is really great. We haven't had any issues with it. We've had it for a long time. We ran an old version for three or four years without any issues.

    What do I think about the scalability of the solution?

    From what I have read, the scalability seems good. We haven't had to deal much with that. We have two nodes and about 2,000 sessions going at once.

    How are customer service and support?

    Technical support is very good. They've always been there to answer any questions, and if they don't know the answer they make sure to find someone who can give me the answer.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    Cyber security resilience has been at the top of our list since 2020 because we had so many people working from home and that increased as time went on. That opened our eyes.

    How was the initial setup?

    I was involved when we upgraded at the beginning of this year. It was pretty straightforward, although we reached out for outsourced help.

    What about the implementation team?

    We used a CDW consultant.

    What was our ROI?

    For us, the return on investment is that it gives us easy ways to divide up our end-users for authentication, especially for our VPN.

    What's my experience with pricing, setup cost, and licensing?

    The pricing seems fair. The licensing can be confusing, but it is still pretty good.

    Which other solutions did I evaluate?

    I was asked a couple of years ago, when we were having issues with ISE, if there were alternatives, and I said I didn't want to switch because we're so embedded in this solution already.

    What other advice do I have?

    Talk to someone outside of Cisco too, if you're thinking about ISE. That way, you can get all the information.

    We wanted to outsource some of our work because I only have two years of admin experience and another of our network engineers has about a year. This way, if the system goes down, we have a quick way to get it back up.

    I would tell leaders who want to add cyber security resiliency to make sure they include team members who are involved and not just make decisions on their own.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Associate Consultant at a computer software company with 201-500 employees
    Real User
    Streamlines security policy management and reduces operating costs
    Pros and Cons
    • "In terms of features, I think they've done a lot of improvement on the graphical user interface — it looks really good right now."
    • "An issue with the product is it tends to have a lot of bugs whenever they release a new release."

    What is our primary use case?

    Our use cases are based around dot1x. Basically wired and wireless authentication, authorization, and accounting. 

    In terms of administration, only our networking team uses this solution. Probably five to ten administrators manage the whole product. Their role pretty much is to make sure that we configure the use cases that we use ISE for — pretty much for authenticating users to the wired and wireless networks. We might have certain other advanced use cases depending on certain other business requirements, but their job is pretty much to make sure all the use cases work. If there are issues, if users are complaining, they log into ISE to troubleshoot those issues and have a look at the logs. They basically expand ISE to the rest of the network. There is ongoing activity there as well. The usage is administrative in nature, making sure the configurations are okay, deploying new use cases, and troubleshooting issues.

    How has it helped my organization?

    This solution has definitely improved the way our organization functions.

    What is most valuable?

    In terms of features, I think they've done a lot of improvement on the graphical user interface — it looks really good right now. ISE is always very complicated to deploy because it's GUI-based. So they came up with this feature called work centers, that kind of streamlines that process. That's a good feature in the product right now.

    What needs improvement?

    An issue with the product is it tends to have a lot of bugs whenever they release a new release.

    We've always found ourselves battling out one bug or another. I think, overall they need to form a quality assurance standpoint. ISE has always had this issue with bugs. Even if you go to a Cisco website and you type all the bug releases for ISE, you'll find a lot of bugs. Because the product is kind of intrusive, right? It's in the network. Whenever you have a bug, if something doesn't work, that always creates a lot of noise. I would say that the biggest issue we're having is with all the product bugs.

    Also, the graphical user interface is very heavy. By heavy, I mean it's quite fancy. It's equipped with a lot of features and animations that sometimes slow down the user interface.

    It's a technical product — I don't think a lot of engineers really need fancy GUIs. We pretty much look for functionality, but I think Cisco, for some reason, is putting an emphasis on its GUIs looking better. We always look for functionality over fancy features.

    We've had issues with different browsers, and sometimes it's really slow. From a functionality standpoint, we would rather the GUI was light and faster to navigate.

    ISE has a very good logging capability but because their GUI is so slow, we feel it's not as flexible or user-friendly as we would like it to be, especially when it comes to monitoring and logging. At the end of the day, we're implementing ISE for security. And that means visibility.

    Of course, you can export the data into other products to get that visibility, but we would like to have a better type of monitoring, maybe better dashboards, and better analytics capabilities within the product.

    Analytics is one thing that's really lacking. Even if you're to extract a report, it just takes a lot of time. So, again, that comes down to product design, but that's definitely an area for improvement. I think it does the job well, but they can definitely improve on the monitoring and analytics side.

    For how long have I used the solution?

    I have been using this solution since they released the first version over ten years ago.

    What do I think about the scalability of the solution?

    Scalability is pretty good, provided that you design it properly from the get-go. There are design limitations, depending on the platforms, especially the hardware platforms that you select. On the scalability front, it's not a product that can be virtualized very well — that's an issue. Because in the world of virtualization, customers are always looking for products that they can put in their virtual environments. But ISE is not a truly virtualized product, as in it doesn't do a lot of resource sharing.

    As a result, it's not truly virtualized. Although they do have the VM offering, it's not virtualization in the proper sense of the word. That's one limitation of the product. It's very resource-intensive. As a result, you always end up purchasing additional hardware, actual ISE physical servers. Whereas, we would like to have it deployed in virtual machines if it was better designed. I think when it comes to resource utilization, it probably isn't optimized very well. Ideally, we would like to have a better-virtualized platform.

    How are customer service and technical support?

    Tech support tends to be pretty good for ISE. We do use it extensively because of all of the bugs we encounter. 

    Mostly it's at the beginning of setting the whole environment up. Typically, once it's set up properly, it tends to work. But it's just that the product itself integrates with a lot of other products in the network. It integrates with your switches, with your APs, etc. So, it's a part of an ecosystem. What happens is, if those products experience bugs, then it kind of affects the overall ISE solution as well — that is a bit of a dependency. The ISE use cases are dependent on your network access devices, but that's just the nature of it. The only issue with support is you might have to open a ticket with the ISE team, but if you're looking at issues in your wireless network or switches, you might have to open another ticket with their tech team for switches. 

    For customers using Cisco, end-to-end, they should improve the integration and providing a seamless experience to the customer. But right now, they have to refer to other experts. They come in the call, but the whole process just takes some time.

    That's an area that they can improve on. But typically, I would say that the support has been good. We've been able to resolve issues. They are responsive. They've been good.

    Overall, I would give the support a rating of eight.

    How was the initial setup?

    The setup is not straightforward. It's complex. You need to have a high level of expertise.

    What's my experience with pricing, setup cost, and licensing?

    It's an expensive solution when compared to other vendors. It's definitely more expensive than ClearPass. It's expensive, but the issue, again, comes down to scalability. Because you can't virtualize the product, there's a lot of investment when it comes to your hardware resources. Your CapEx is one of the biggest issues here. That's something Cisco needs to improve because organizations are looking at reducing their hardware footprint. It's unfortunate that ISE is such a resource-intensive application to begin with. As it's not a properly virtualized application, you need to rely on physical hardware to get the best performance.

    The CapEx cost is high. When it comes to operational expenditure, it all depends on the features you're using. They have their tiers, and it all depends on the features you're using. The basic tier, which is where most of the functionality is, is relatively quite cheap. But if you're using some advanced use cases, you need to go to their higher tiers. So, I'm not too worried about operations costs. You need to buy support for the hardware: you need space, power, and cooling for the hardware-side. All of that adds up. So, that all comes down to the product design and they need to make sure it's properly scalable and it's truly virtualized going forward.

    Which other solutions did I evaluate?

    We've evaluated other products, for example, Aruba ClearPass. There's another product, Forescout, but the use case is a bit different.

    When it comes to dot1x authentication, I think it's ISE and Aruba ClearPass. Forescout also comes into the next space, but the use case is a bit different.

    We prefer ISE because, I think if you're using Cisco devices, it really kind of integrates your ecosystem — that's why we prefer ISE. When it comes to NAC or dot1x products, from a feature standpoint, ISE has had that development now for 10 to 11 years. So, we've seen the product mature over time. And right now it's a pretty stable and functional product. It has a lot of features as well. So, I think the decision is mainly kind of driven by the fact that the rest of the ecosystem is Cisco as well. From a uniform figure standpoint, the other product is probably the industry leader at this point in time for network admission control.

    What other advice do I have?

    The main advice would be in terms of upfront design — this is where a lot of people get it very wrong. Depending on the platforms you choose, there are restrictions and limitations on how many users. We've got various nodes, so how many nodes you can implement, etc. Also, latency considerations must be taken into account; especially if you're deploying it across geographically dispersed regions. The main advice would be to get the design right. Because given that directly interferes with the network, if you don't get your design right it could be disruptive to the network. Once you've got the proper design in place and that translates into a bit of material, the implementation, you can always figure it out. Getting it right, upfront, is the most important thing.

    Overall, I would give ISE a rating of eight out of ten. I don't want to give it a 10 out of 10 because of all the design issues. There is definitely room for improvement, but overall out there in the market, I think it's one of the best products. It has a good ecosystem. It integrates well with Cisco devices, but it also integrates with third-party solutions if you have to do that. It's based on open standards, and we've seen the ecosystem grow over the years. So, they're doing a good job in terms of growing the ecosystem and making sure ISE can work with other products, but there's definitely room for improvement on the product design itself — on monitoring, on analytics. 

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
    PeerSpot user
    Senior Enterprise Network Administrator
    Real User
    Top 20
    Helps us manage access to network devices for IT and end-users
    Pros and Cons
    • "It does a good job of establishing trust for each access request, no matter the source. It's also very effective at helping with the distributed network and at securing access."
    • "The UI and UX could be more seamless and easier to use."

    What is our primary use case?

    Our use case is managing access to network devices for IT as well as end-users. Making that seamless is the challenge we were looking to handle.

    How has it helped my organization?

    ISE made implementation and connecting things easy.

    What is most valuable?

    It does a good job of establishing trust for each access request, no matter the source. It's also very effective at helping with the distributed network and at securing access.

    What needs improvement?

    The UI and UX could be more seamless and easier to use.

    For how long have I used the solution?

    I've been using Cisco ISE (Identity Services Engine) for six years.

    What do I think about the stability of the solution?

    The stability of the solution is pretty good. I've only had a couple of issues.

    What do I think about the scalability of the solution?

    I've never tried to scale it up.

    We have it deployed in multiple locations with users across the US and Canada.

    How are customer service and support?

    I have never used the technical support.

    What other advice do I have?

    It's done the job that we put it in place to do.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Network Specialist
    Real User
    Improves internal security, great for authorization and authentication
    Pros and Cons
    • "Among the most valuable features is TACACS."
    • "The area where things could be improved is education. It's complicated to deploy initially because you have to know what you're getting into."

    What is our primary use case?

    I use it for licensing and profiling. It's like a "traffic cop." It's an endpoint user migration tool. It's also a TACACS server. It depends on what I'm using it for at the moment.

    For the applications it's authentication and then authorization into the network. It's the networks you're on and what AD gives you. Your profile is based in AD or an LDAP server. ISE talks to those two servers and says, "What groups do you belong to, and should you have access to those roles?" With ISE, if AD says you can have it, then go for it.

    I use it in big campus environments, anywhere that needs authentication and authorization to work with AD. It's a great tool for that, if you want to profile your network and you want to secure your network inside. We're not talking about firewalls but about what the tool can do for you, what it's designed for.

    How has it helped my organization?

    It has improved internal security, in-to-out, out-to-in. Without ISE, you can't posture or profile your network. Authorizations, authentications. ISE is not the only product that can do it, but it's a great tool.

    What is most valuable?

    Among the most valuable features is TACACS. Also, the rules and logging, but TAC is just as easy. Cisco TAC is great.

    What needs improvement?

    The area where things could be improved is education. It's complicated to deploy initially because you have to know what you're getting into. That's true with any customer. I don't know them so I have to learn about them. I have to figure it out, but there are very limited windows to do that. If a customer's going to hire you, you are the professional. You should know this already. You should come in with a base knowledge of what you need to do and, after that, grow with the customer. More education is how it can be improved.

    For how long have I used the solution?

    I have been using Cisco ISE (Identity Services Engine) since 2016. I usually come into an environment after everything is there already. Customers bring me in to fix things that are broken.

    What do I think about the stability of the solution?

    The stability of the solution depends on how you scale it. If you have set it up properly, it will be great. If you put all your eggs in one basket, in one part of the network, and that goes down, then you have lost everything.

    What do I think about the scalability of the solution?

    It's scalable. It can grow with your network. You can create new nodes or move everything from local to the cloud. It's easy to spin up a VM, so you can put it on a VM real quick and be done within a couple of days. But you have to know what you're doing. You can't just do it with the assumption that you can copy and just redeploy it. ISE doesn't work like that. It has to be done properly.

    How are customer service and support?

    Cisco's TAC is excellent. Cisco always has great support.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I previously used the older versions of the hardware that were the original predecessors to ISE.

    How was the initial setup?

    The deployment model for ISE depends on the customer: where their data centers are, what they can afford, and what type of maintenance agreements they have with Cisco's support. Are they on a VM or a physical device? Deployment depends on what we are trying to do and the environment.

    What other advice do I have?

    In terms of establishing trust for every access request, trust is only as good as the rules and definitions you build. Without that, you need not only to trust the device, you need the trust of the customer too. That's important.

    Trust is only eliminated when a customer wants the rules loosened. When the customer says, "This is too difficult, you're making it too hard," that is when exposure happens, things start collapsing, and there are breaches. You can't give the customer everything they want, because they don't know the consequences. You have to educate them. They need to know that the inconvenience of hitting "enter" to log in, and having it take three seconds or five seconds is because you'd rather have the machine and the network think before they let you on the network. A lot of times a customer will say, "If I'm hitting enter and it's not bringing me to where I need to be, then this is not a good solution." You have to educate them.

    The solution is like an iPad that someone set up for you. If they didn't do a good job setting it up, you're going to rate the tool as bad. A lot of times, I come in and it's already done and I have to fix the problems. There are times that I do create it from scratch and it works really well. 

    Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
    PeerSpot user
    Director of Engineering at a tech services company with 51-200 employees
    Real User
    Allowed us to pull in multiple authentication databases, then centralize them into a captive portal system
    Pros and Cons
    • "It has allowed us to pull in multiple authentication databases, then centralize them into a captive portal system."
    • "Documentation is probably the worst part of the software."

    What is our primary use case?

    We use it for Community WiFi and TACACS authentication. It is service provider authentication, both for the core infrastructure and Community WiFi.

    We were looking to solve captive portal and centralized authentication with Cisco ISE.

    How has it helped my organization?

    It has allowed us to pull in multiple authentication databases, then centralize them into a captive portal system.

    It is important for our organization that the solution considers all resources to be external. It treats them with minimum trust.

    What is most valuable?

    Integration is a big factor. That has really been the driving force behind it.

    What needs improvement?

    Documentation is probably the worst part of the software.

    For how long have I used the solution?

    I have been using it for about five years.

    What do I think about the stability of the solution?

    It is very stable. I would rate the stability as 10 out of 10.

    What do I think about the scalability of the solution?

    We don't use its scalability. I would rate it as five out of 10.

    How are customer service and support?

    The technical support is good. I would rate them as six out of 10.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    We previously used an open-source solution. We switched for vendor support and scalability.

    What was our ROI?

    We don't monetize this solution.

    What's my experience with pricing, setup cost, and licensing?

    It is fair.

    Which other solutions did I evaluate?

    We did not evaluate other options.

    What other advice do I have?

    It is worth checking out the integration that it provides. It is a strong platform.

    Cybersecurity resilience has not been that important for our organization.

    I would rate ISE as eight out of 10. It does exactly what it is supposed to do without much issue.

    Which deployment model are you using for this solution?

    Private Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
    PeerSpot user
    Buyer's Guide
    Download our free Cisco ISE (Identity Services Engine) Report and get advice and tips from experienced pros sharing their opinions.
    Updated: June 2024
    Buyer's Guide
    Download our free Cisco ISE (Identity Services Engine) Report and get advice and tips from experienced pros sharing their opinions.