Cisco ISE (Identity Services Engine) Benefits

Joe Feghaly
For device administration, all devices have multifactor authentication in collaboration with IT, so it secures access to all of our devices. For guest and wireless access, it's a matter of a lowly manager who we give access to the portal and he can assign access to the guests, so it's a very simple process now. It keeps IT focusing on their work, and gives the business people the right access. Also, with BYOD mobile users can work easier and in a more secure way. For the places in public access we're securing our network socket, so now not everybody can plug in and log into our network due to this feature. It's making it more secure for headquarters. View full review »
Security Engineer at a energy/utilities company with 201-500 employees
Before, our port would be wide open, anyone could come to the network and put their laptop into the port or any device and they would be able to get the IP. Now, if someone tries to connect to our network through an IU port or internet, they will not be able to access it. Another way this solution has improved our organization is that when we integrate this with our OpenGate server we are able to identify and isolate the machine that is infected, or that is going to be infected. Plus, we had control on which device we can block in real-time and white list, or according to the MAC address, we can send this device to get an assigned IP from a special VLAN. View full review »
Alfred Polela
OPCO IT Manager at MTN
We give guests limited access to the internet when they come in so that access has been useful. Previously, we just used to give them the APN key which they would leave with. Now, we give them credentials to use that are for a limited period of time. View full review »
Learn what your peers think about Cisco ISE (Identity Services Engine). Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
430,585 professionals have used our research since 2012.
Max Ayoti
Supervisor IT Security at a government with 1,001-5,000 employees
Previously, what used to happen is that we use to have anyone - any user, a staff member or a non-staff member, consultant contractors, etc. able to connect to our line without authentication, which I think posed a security risk. We felt that whoever connected to our network should be authenticated. We should know the person. We should have visibility to see who was connecting to our network so that we can detect anomalies. Now, we have different profiles, of different users and staff and for contractors or others. So, depending on the profile, there's control on the access that you can get. View full review »
Network Administrator at a government with 51-200 employees
After the product was installed, no one could access the secure connection network. In order for any laptop or any endpoint device to attach to my network, it needs to be authorized or be certified to be connected. View full review »
Jose Tom
Manager - IT Security & Process Compliance at a tech services company with 1,001-5,000 employees
We have multiple metal devices from different places that use management, so we need to know who would be accessing all those devices and what changes are being done to those metal devices. With Cisco ISE we have visibility of all the changes happening on those devices. View full review »
Rogerio Farias Dos Santos
Information Security System Specialist at everis New Company Erifson
We distribute internet access to guests. It's the product to our environment. View full review »
Group Electrical Engineer Consultants at a comms service provider with 51-200 employees
Visitors can be granted access to the wifi network using their cellphones, notebooks or tablets in a very easy way. The ease of accessibility that anyone can have to the network is very quick and is a big improvement for our network. View full review »
Network Engineer at a comms service provider with 1,001-5,000 employees
We use Cisco ISE as our main controller for the management of clients that need to join our network. View full review »
Bachir Elsitt
Network Security Engineer at Data Consult
I use the F5 device on the DMZ zone of the firewall. A record will come to the virtual server on the F5. Then the F5 will upload the encrypted message to the server and decrypt this message. The firewall can see the traffic as unencrypted and we can mitigate the enemy and any attack from F5 and from the firewall. View full review »
IT Specialist at Armstrong flooring, inc.
Using this solution gives us the ability to allow proper access to the network. View full review »
Learn what your peers think about Cisco ISE (Identity Services Engine). Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
430,585 professionals have used our research since 2012.