Cisco ISE is an all-in-one solution that streamlines security policy management and reduces operating costs. Cisco ISE delivers visibility and access control over users and devices across wired, wireless, and VPN connections.
There are three levels of pricing: basic, plus, and apex. Basic satisfied our needs.
If you go directly with Cisco for the implementation it's very, very expensive.
There are three levels of pricing: basic, plus, and apex. Basic satisfied our needs.
If you go directly with Cisco for the implementation it's very, very expensive.
Get a risk-based view of your IT, security and compliance posture so you can quickly identify, investigate and prioritize your most critical assets and vulnerabilities.
It is slightly more expensive than other solutions in the same sphere.
The licensing costs for this solution are approximately $100,000 US, and I think that covers everything.
It is slightly more expensive than other solutions in the same sphere.
The licensing costs for this solution are approximately $100,000 US, and I think that covers everything.
Aruba ClearPass is a network access control (NAC) solution that provides a range of security and access management capabilities for wired, wireless, and VPN networks. ClearPass enables organizations to secure their networks and devices, enforce security policies, and provide secure access to network resources.
Licensing and pricing are extremely straightforward.
Cost is important. I switched because Aruba's costs were well below Cisco's.
Licensing and pricing are extremely straightforward.
Cost is important. I switched because Aruba's costs were well below Cisco's.
Forescout Platform provides today’s busy enterprise organizations with policy and protocol management, workflow coordination, streamlining, and complete device and infrastructure visibility to improve overall network security. The solution also provides concise real-time intelligence of all devices and users on the network. Policy and protocols are delineated using gathered intelligence to facilitate the appropriate levels of remediation, compliance, network access, and all service operations. Forescout Platform is very flexible, integrates well with most of today’s leading network security products, and is a very cost-effective solution.
Devices with multiple IP's count multiple times against your license count.
The ROI is priceless.
Devices with multiple IP's count multiple times against your license count.
The ROI is priceless.
Fortinet's FortiNAC is a network access control solution that provides visibility, control, and automated response for everything that connects to the network, enhancing the security fabric. FortiNAC protects against Internet of Things (IoT) threats, extends control to third-party devices, and orchestrates automated responses to a variety of networking events.
It's a subscription-based license, which is based on the usage and number of concurrent users.
The licensing fees are a little bit high.
It's a subscription-based license, which is based on the usage and number of concurrent users.
The licensing fees are a little bit high.
Appgate SDP is a network access control tool for local and remote access, multifactor authentication, and micro-segmentation. It is a flexible, robust, and configurable tool with good documentation, interface improvements, and ease of deployment.
It is a pretty expensive tool. It is maybe about $20,000 per year for a hundred users or so.
We pay $100 per user per month. One license for the site is around $17.
It is a pretty expensive tool. It is maybe about $20,000 per year for a hundred users or so.
We pay $100 per user per month. One license for the site is around $17.
I rate the price of Sophos Network Access Control a five out of ten.
Sophos Network Access Control is very cheap compared to other solutions like Cisco, Barracuda, and Palo Alto.
I rate the price of Sophos Network Access Control a five out of ten.
Sophos Network Access Control is very cheap compared to other solutions like Cisco, Barracuda, and Palo Alto.
Cloudpath Enrollment System is a software/SaaS platform that delivers secure wired and wireless network access for BYOD, guest users and IT-owned devices. It streamlines getting devices on the network and secures every connection with powerful encryption. Cloudpath software gives you granular policy control over what network resources users can access. It lets you deliver a great end-user experience and virtually eliminates helpdesk tickets related to network access. Choose from cloud-based or virtualized on-premises deployment. Cloudpath software supports any user, any device, and any network infrastructure.
The licensing of the solution is user-based and the price is good.
The cost was somewhere around $700 for the access points, however, there was a discount.
The licensing of the solution is user-based and the price is good.
The cost was somewhere around $700 for the access points, however, there was a discount.
Portnox CLEAR is the only cloud-native network access control (NAC) solution that unifies essential network and endpoint security capabilities: device discovery, network authentication, access control, network hardware administration, risk mitigation and compliance enforcement. As a cloud service, Portnox CLEAR eliminates the need for on-going maintenance such as upgrades and patches and requires no on-site appliances. As such, the platform can be easily deployed, scaled and managed by lean, resource-constrained IT teams across any corporate network - no matter how complex.
Pricing is quite reasonable.
The cost of Portnox Clear is reasonable.
Pricing is quite reasonable.
The cost of Portnox Clear is reasonable.
Vidder's PrecisionAccess screens both user and device to ensure they’re trusted before connecting them to protected applications — in three simple steps:
Tempered Networks leverages the Host Identity Protocol (HIP), a ratified open standard network security protocol recognized possibly the next big change in IP architecture. HIP enables a paradigm shift in networking that solves the broken trust model in IP networking by separating the role of an IP address as both host identity and location, where hosts are identified using permanent, location-independent cryptographic identities (CID). Now security is built-in from the beginning with verifiable authentication and end-to-end encryption.