We performed a comparison between Cisco ISE (Identity Services Engine) and Cisco Secure Endpoint based on real PeerSpot user reviews.
Find out in this report how the two Cisco Security Portfolio solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Cisco ISE integrates with everything else."
"The best feature of the Cisco ISE platform is that it is compatible with Microsoft products."
"Among the most valuable features is TACACS."
"The most valuable feature is the ASDM - the user interface makes it very easy to configure the firewall."
"ISE's most valuable feature is integration between IT and OTs."
"The posture assessment is a valuable feature because of the ability to do assessments on the clients before they connect to the network."
"It's easy to change and add policies."
"I've had no issues with scalability. I started using it on two campuses, and now I'm using it across the country and scaling it across subsidiaries in other countries."
"Real-time threat prevention using sandboxing, file trajectory, and retrospective security."
"Definitely, the best feature for Cisco Secure Endpoint is the integration with Talos. On the backend, Talos checks all the signatures, all the malware, and for any attacks going on around the world... Because Secure Endpoint has a connection to it, we get protected by it right then and there."
"Its most valuable features are its scalability and advanced threat protection for customers."
"The most valuable feature of the solution is its technical support."
"I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things that might happen. It should protect all kinds of things that might happen on the servers, things that I cannot see."
"The best feature that we found most valuable, is actually the security product for the endpoint, formerly known as AMP. It has behavioral analytics, so you can be more proactive toward zero-day threats. I found that quite good."
"It is a very stable program."
"Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."
"The interface is a little bit complex."
"There are always some things that I would request."
"In a future release, I would like to see network access control. That is something that customers seem to be looking for."
"Difficult to figure out the protocols and nodes in order to implement correctly."
"The solution could be more secure."
"I would like to see integration with other vendors, and the RADIUS integration needs to be improved a little bit."
"I don't see as many customers as I should adopting the onboarding feature. I think Cisco should make that process a lot easier and less intrusive on the end users' devices."
"Cisco ISE has almost all the features we are looking for now, but sometimes the configuration, such as the conditions, is a little difficult to understand and not so easy to navigate."
"I would like to see integration with Cisco Analytics."
"We would like to have an API integration with a SIEM solution, because as far as I know, it currently hasn't yet been released."
"This product has issues with the number of false positives that it reports."
"Due to the complexity of the technology that is used and its advanced threat detection capabilities, it is possible to encounter many delays in operation."
"The one challenge that I see is the use of multiple endpoint protection platforms. For instance, we have AMP, but we also have Microsoft Windows Defender, System Center Endpoint Protection, and Microsoft Malware Protection Engine deployed. So, we have a bunch of different things that do the same thing. What winds up happening is, e.g., if I get an alert for a potential incident or malware and want to pull the file, I'll go to fetch the file to analyze it. But, one of these other programs has already gotten it, so the file has already been quarantined by another endpoint protection system. AMP doesn't realize that and the file fetch fails, then you're left wondering what's going on."
"The initial setup is a bit complex because you need to execute existing antiviruses or security software that you have on your device."
"The initial setup of Cisco Secure Endpoint is complex."
"The integration of the Cisco products for security could be better in the sense that not everything is integrated, and they aren't working together. In addition, not all products are multi-tenant, so you can't separate different customer environments from each other, which makes it a little bit hard for a managed service provider to deliver services to the customers."
More Cisco ISE (Identity Services Engine) Pricing and Cost Advice →
Cisco ISE (Identity Services Engine) is ranked 1st in Cisco Security Portfolio with 135 reviews while Cisco Secure Endpoint is ranked 7th in Cisco Security Portfolio with 44 reviews. Cisco ISE (Identity Services Engine) is rated 8.2, while Cisco Secure Endpoint is rated 8.6. The top reviewer of Cisco ISE (Identity Services Engine) writes "Gives us that extra ability to assist the end user and make sure that we are making them happy". On the other hand, the top reviewer of Cisco Secure Endpoint writes "Single dashboard management, quick infrastructure threat detection, and high level support". Cisco ISE (Identity Services Engine) is most compared with Aruba ClearPass, Fortinet FortiNAC, Forescout Platform, CyberArk Privileged Access Manager and Fortinet FortiAuthenticator, whereas Cisco Secure Endpoint is most compared with Microsoft Defender for Endpoint, Cortex XDR by Palo Alto Networks, CrowdStrike Falcon, Check Point Harmony Endpoint and VMware Carbon Black Endpoint. See our Cisco ISE (Identity Services Engine) vs. Cisco Secure Endpoint report.
See our list of best Cisco Security Portfolio vendors.
We monitor all Cisco Security Portfolio reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.