We performed a comparison between Cisco ISE (Identity Services Engine) and One Identity Manager based on real PeerSpot user reviews.
Find out what your peers are saying about Cisco, HPE Aruba Networking, Fortinet and others in Network Access Control (NAC)."SGTs are valuable because they make it easy to enforce policies, instead of pushing them across all the other platforms."
"Profiling is one of the most valuable features. We have a lot of different devices between cameras, access points, and laptops that get plugged in."
"In terms of features, I think they've done a lot of improvement on the graphical user interface — it looks really good right now."
"Assisting a larger number of users in gaining access and guiding them through the process of getting on Cisco ISE has been seamless."
"I found the CMDB Direct Connect in Cisco ISE 3.2 the most promising feature for my use case."
"There are a lot of integrations available with multiple vendors. This has made the solution easier to work with."
"It has all of the features available, in fact, more than what you need."
"So far, we have had no issues with the stability."
"It is flexible with APIs and the customizing of a portal."
"The portfolio view simplifies this process, eliminating the need to check through Tableau or other tools."
"It is a flexible because it is customizable. It allows you to build anything on top of it."
"The policy and role management features are superb. If you have a customer who is willing to go somewhere with role management, then the possibilities are endless with the product. It is well-structured, and the architecture is well-defined."
"The most valuable feature of One Identity Manager for me is its Designer tool."
"The tool is like a big Lego in which you can use the parts that make sense for your organization."
"The Data Importer is a great tool to create an ETL. It generates code which is easy to maintain later without the tool."
"The most valuable feature is the JML. Unlike other identity manager tools, the JML is more customizable, making it easier to find."
"There can be a little bit more integration between the controller management and ISE. There are two dashboards, you have the controller dashboards, and you have the ISE dashboard it would is a way to maybe integrate that into one. That would be great. It's not that bad. It would be easier if it could be combined into one dashboard."
"Some of the reporting could be improved."
"I don't see as many customers as I should adopting the onboarding feature. I think Cisco should make that process a lot easier and less intrusive on the end users' devices."
"In a future release, I would like to see network access control. That is something that customers seem to be looking for."
"With the recent release of the solution, we had a bunch of bugs and we had to delay our deployment. Other than that, the solution is good."
"Cisco ISE can become quite complex, especially with policy sets, the entire authentication process, and everything involved."
"Cisco ISE has numerous features that are impractical, and I won't utilize them since they require payment."
"Adding new devices was a little cumbersome. I haven't done it that many times, but I remember that adding new devices to the authentication piece of it was a little cumbersome. The way I was shown to do it, I thought it was odd because we had to go into the active device, copy the file down, export it, make some changes to it, and then reimport it as opposed to being able to click it and having a template to fill out."
"The initial setup was complex. We have a lot of different systems. The journey from implementing to joining all the systems was difficult."
"More integration with SAP and with the internet of things would be good. We also have system devices that we could manage as identities, so that would be a feature to add."
"The Metamodel is not developer-friendly, and the web designer customization could be simplified."
"Having new features for web developers in the One Identity Manager shop is an area for improvement. Another area for improvement in the tool is its ServiceNow connection as ServiceNow is a major ITSM system player, but the current out-of-the-box feature proposed by One Identity Manager can only make simple incident requests to the system. My company is now in full ICL design, so it prefers for all concerns or requests to be sent properly to ServiceNow, so my company can have better control over the incident requests and be able to sort those out. The tool fits all my needs today, except for the ServiceNow connector. That's the only additional feature I'd like to see in the next release of One Identity Manager."
"The web interface has room for improvement. It could be more performant and the design of the web interface is relatively complicated. It could be simplified."
"It is a large solution where you need to learn how to work in a certain way for it to provide the best benefit."
"Visually, I would like it to be more user-friendly."
"A room for improvement in One Identity Manager is its analytics. Though it's getting better from version to version, the analytics feature still needs improvement. I would appreciate more analytical features in the next release of One Identity Manager, so I can do a better analysis. Another vendor, for example, has a self-certification system where you can send people, then create a type of profile or screen for each person, and the person can see his entitlement and the risks behind that entitlement, so then the person makes a decision on whether he wants to keep or let go of it, and that's an out-of-the-box feature that would be good to see in One Identity Manager. Another feature I'd like to see in One Identity Manager that would be very interesting is integration with SIEM or any log collection product for both access and usage. For example, I'd be able to see that I have access to a particular application and also get information on how many times I've accessed it in the last year, last few months, etc. It's a feature that would be great to have in One Identity Manager."
More Cisco ISE (Identity Services Engine) Pricing and Cost Advice →
Cisco ISE (Identity Services Engine) is ranked 1st in Network Access Control (NAC) with 135 reviews while One Identity Manager is ranked 3rd in Identity Management (IM) with 74 reviews. Cisco ISE (Identity Services Engine) is rated 8.2, while One Identity Manager is rated 8.0. The top reviewer of Cisco ISE (Identity Services Engine) writes "Gives us that extra ability to assist the end user and make sure that we are making them happy". On the other hand, the top reviewer of One Identity Manager writes "The JML is customizable but the support team isn't strong". Cisco ISE (Identity Services Engine) is most compared with Aruba ClearPass, Fortinet FortiNAC, Forescout Platform, CyberArk Privileged Access Manager and Fortinet FortiAuthenticator, whereas One Identity Manager is most compared with SailPoint IdentityIQ, Oracle Identity Governance, EVOLVEUM midPoint, ForgeRock and One Identity Active Roles.
We monitor all Network Access Control (NAC) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.