Cisco ISE (Identity Services Engine) Primary Use Case

BP
Lead Network Engineer at a educational organization with 1,001-5,000 employees

Today, we are performing wireless client authentication and using it as a captive portal for our guest wireless network. Eventually, I am hoping to roll into 802.1X for the wire.

In our organization, we have about 2,000 employees and 12,000 other end users whom we service.

View full review »
Bill Masci - PeerSpot reviewer
Senior Network Admin at Iridium

Our main use case right now is TACACS for device administration and authentication, as well as for user authentication on the network: wireless authentication, 802.1X, and wired authentication too, for RADIUS.

View full review »
Rohit-Joshi - PeerSpot reviewer
Head of IT Infrastructure at a tech vendor with 10,001+ employees

I am head of the IT infrastructure for a company. My company is a manufacturing company, based out of India. My company has between 3,000 to 5,000 users. 

Our solution is completely on-prem.

The domain under which my company works puts a lot of importance on cybersecurity. Our management gave us clear instructions that there should be an environment where there are zero trust policies applied.

We explored various solutions that could bring in zero trust. The first level of zero trust that we wanted to bring in is a zero trust network.

We reached out to Cisco at that time, and they told us about the things that can be done around the software-defined access and the integration of Cisco ISE. And that was the time when we started doing a lot of POCs to see which use cases we could use for it. That was when we got in touch with Cisco and they told us that this would offer us network-level zero trust. 

When I say zero trust architecture, the first thing is that we wanted to have a network authentication done on a certificate basis. That was the first use case, where the only versions in the network that have a domain-based certificate could be allowed to join my network. My enterprise network should not allow anybody from outside. That was the first use case. 

The second use case was that we had to do the posturing of my endpoints. I wanted to ensure that those which are connected to my network have proper antivirus and software installed, and the operating system is permissible. That is where we started to do the posturing part of it. 

The third use case is around the access part of it. We have multiple departments in our company, and we wanted to restrict the access of particular user groups to particular IT applications. 

View full review »
Buyer's Guide
Cisco ISE (Identity Services Engine)
April 2024
Learn what your peers think about Cisco ISE (Identity Services Engine). Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.
Brad Lossing - PeerSpot reviewer
Manager Network Operations at RAND Corporation

We use the product for TACACS, dot1x, authentication for some of our RADIUS devices, and authentication and authorization for our VPN clients.

View full review »
Vergin Mansour - PeerSpot reviewer
Network Engineer at a manufacturing company with 10,001+ employees

I am a Cyber System Engineer, specifically working on the network team.

We use Cisco ISE mainly for authentication, accounting, authorization, and monitoring different devices that we have on many different sites within our company. 

View full review »
Solomon Okonta - PeerSpot reviewer
Network Architect at Great Canadian Gaming Corp

We mainly use Cisco ISE for device authentication. We are now rolling out 802.1X.

View full review »
Wayne Cross - PeerSpot reviewer
Director of Cyber Security at Borden Ladner Gervais LLP

For Cisco ISE specifically, I manage the cybersecurity as well as the networking team. The networking team uses it to track statistics of users coming in and out of the network platform. We use it to track equipment, collect information on identity, and have the help desk leverage the telemetry to troubleshoot. It is part of our day-to-day operations.

This provided security for our sizeable law firm, which has offices across the entire country. Our lawyers like to be mobile. Around six or seven months ago, we started to roll out iPads and really adopted a mobile culture. One of the things that we wanted to do was to provide flexibility for lawyers to walk with a corporate laptop, or walk with their own personal laptop and still have the capabilities to log on and do what they want to do.

We also used it for the many meeting rooms we have. A lot of law firms have tons of meeting rooms, and we needed to secure some of those meeting rooms as well. The technology allowed us to roll 802.1X. We were able to secure ports in the meeting rooms and have a little bit more flexibility as to where users log in.

For example, a couple of years back, we wanted to secure all of the endpoints for the help desk and networking team and all of the backend team and ensure that, irrespective of where one goes with that laptop, when they log in, it'll automatically move them to a secure VLAN. With ISE, we were able to do that and monitor it.

View full review »
MI
Technical account manager at a tech services company with 201-500 employees

We were looking for secure network access.

View full review »
JS
Network Analyst at a mining and metals company with 10,001+ employees

I utilize Cisco ISE to access the switches on our network for monitoring configurations.

View full review »
Aaron-Brown - PeerSpot reviewer
Network Engineer at Universal Health Services, Inc.

We use ISE for TACACS and 802.1X authentication, wired and wireless. We also use ISE for our VPN authentication, as well as for different policies. We were trying to solve some security holes with Mac solutions, and ISE was a good fit.

View full review »
SL
Network Engineer at a financial services firm with 10,001+ employees

I use the product for AAA authentication.

View full review »
SM
IT Security manager at a energy/utilities company with 201-500 employees

This solution ties into our Cisco Duo and Cisco AnyConnect connections to help us authenticate against the active directory and Cisco Duo multifactor authentication. It takes metrics about the connections that are connecting it and allows us to set up a rule against them. For instance, if a Windows device is not all the way up to date, we can put a message up that says, "Before you're able to connect, please do your Windows updates as they haven't been done in six months."

As this solution allows AnyConnect to authenticate with the active directory in the backend, the users won't directly use it. Still, it will be in use throughout the login process into Cisco AnyConnect as a source of authentication.

With this solution, we don't require anyone for maintenance.

View full review »
Brad Davenport - PeerSpot reviewer
VP of Technical Architecture at Logicalis

Identity Services Engine for us has an incredible number of use cases, predominantly around identity and contact sharing within the enterprise or Endpoint onboarding for, authentication and authorization. Most recently, in the last few years, we've actually finally added device authentication and device management into that with the TACACS implementation. And now we have a comprehensive set of features to perform enterprise NAC, pure RADIUS authentication, and user authorization.

View full review »
Darren Hill - PeerSpot reviewer
Technical Consultant at a computer software company with 1,001-5,000 employees

I am a Senior Technical Consultant. I have worked in professional services as a Cisco Gold partner for the last ten years. 

I have been offering Cisco ISE for the last three to four years. We do small deployments, upgrades, and those types of things.

We see a lot of customers wanting to use Cisco ISE primarily for 802.1X wired and wireless and also for posture device administration, and guest access.

A lot of our customers who come to us do not have any sort of NAC solution in place at all. They don't have a RADIUS, they might have a Soft MPS or something along those lines, but Cisco ISE is far superior. It gives them far more visibility and the policies are more configurable. The ability to do dynamic access lists, dynamic VLAN environments, and that type of thing, and it just gives them a different level of security altogether.

View full review »
Adarge Ekholt - PeerSpot reviewer
Network Engineer at a university with 1,001-5,000 employees

I'm a network engineer. I've been at my company for about six years. 

We have about ten people on the networking team. We support up to 30,000 students. We've been using ISE for five or six years now.

Our primary use case is mainly to onboard students with the wireless authentication with our switches and network devices. 

View full review »
Laurence Mcbride - PeerSpot reviewer
Senior Business Systems Analyst at a financial services firm with 201-500 employees

Cisco ISE is our network access control solution. We use it to prevent unwanted devices from connecting to our physical network. We also use it for wireless access control on the corporate network, but not on our guest internet network. That difference is because we have Cisco Meraki on the guest wireless.

The solution is in twin private data centers and we did virtual servers, not physical appliances. They're on our VMware platform.

Our business is the lending half of banking only. There are no ATMs or customers coming in with deposits or credit cards. It's a commercial lending operation. We don't have a lot of foot traffic into our locations from our customers. Some might say we're a little overly worried about our physical network, because we're pretty physically secure already. However, we occasionally do customer appreciation events in our locations, at which point there could be 100 people waltzing in and out of any one of our buildings. That's when the regulators say, "That's why you need security." Ultimately, if you let your guard down in the world of security, you're going to get attacked. So, like it or not, we have to button it up.

View full review »
TA
Network Analyst at a healthcare company with 10,001+ employees

We use ISE for authentication, authorization, and access control. We use it to integrate and manage a lot of the access controls between our switches, routers, and pretty much all of our network infrastructure. We use ISE on-prem instead to manage all of our infrastructure.

View full review »
FA
Network Engineer at Lawrence Livermore National Laboratory

We're just using it for authentication to our network switches.

View full review »
Ashley Mead - PeerSpot reviewer
Sr Network Consultant at CAE Technology Services Limited

I often use Cisco ISE for guest portals to onboard devices. For example, if a company wants to allow their employees to bring their own devices, there's a large security risk. Cisco ISE can help with onboarding those devices and check whether they're up-to-date with security patches and whether they fit the criteria to join the network.

There's so much stress involved with the pressures of trying to make it easy for customers to use the product without constantly having to jump over security hurdles. On the other hand, there is the constant threat of cyber attacks. Balancing the two can be quite stressful for developers, engineers, and consultants.

Our main goal, as an intermediary between Cisco and our clients, is to help IT managers, IT engineers, and administrators have better days. There is a lot of pressure on IT staff, and by giving them the right tools and solutions, we can help them feel more empowered to do their job much more effectively and, therefore, feel proud of their work.

View full review »
AB
Network Architect at a tech vendor with 10,001+ employees

We utilize Cisco ISE for authentication by employing the AnyConnect Posture model to address vulnerabilities on the workstations. Additionally, we make use of TACACS.

View full review »
Roy Pinheiro - PeerSpot reviewer
IT Manager at a financial services firm with 1,001-5,000 employees

We use it for access control in our organization for network control and the guest portal of the guest users who access the wireless network.

View full review »
Jeffry Pereira - PeerSpot reviewer
Network Technical Lead at a energy/utilities company with 10,001+ employees

The company's use case for Cisco ISE is switch access. I'm from the high-performance compute side. I'm not the back office IT. I'm what they call GSIT. Their use cases are different but very similar.

View full review »
CN
Network Operations Supervisor at McCoy's Building Supply

When it comes to ISE, the main challenge that we were trying to address is with our retail environments. We don't have control over the physical access to all the ports and we didn't really have any network access control.

ISE has, and will continue to allow us to secure our edge environment at the retail stores. It's also going to provide more security as we are rolling out more wireless access.

We're expanding our footprint to just outside of the retail environment. For example, we're implementing wireless service in our lumber yards. As we progress, we really need to be focused on securing that, and ISE is going to allow us to do that.

View full review »
JN
Sr Wireless Network Engineer at a manufacturing company with 10,001+ employees

We use ISE primarily for RADIUS authentications on our wireless networks and VLAN segmentation for those users.

View full review »
Gustavo Pena - PeerSpot reviewer
Services Director at XByte SRL

We are working with packets and A011X. In some cases, we also do profiling.

We are using this solution because we wanted to improve security and reduce security gaps. This is mainly for our customers.

View full review »
EV
Senior Network Engineer at a tech consulting company with 11-50 employees

We primarily use Cisco ISE as a network access control solution. We do a lot of quarantine actions from our CSOC. We use the AnyConnect VPN by setting multiple deployments for dedicated purposes, where we use it to provide wireless.

View full review »
JC
Network Engineer II at a healthcare company with 10,001+ employees

We are on-prem at twelve separate sites with one main node.

We utilize Cisco ISE for authenticating both our employees and residents at our senior care center. We authenticate them either against LDAP or our network.

View full review »
GV
Sr. Architect at a pharma/biotech company with 10,001+ employees

Cisco Identity Service Engine (ISE) is used mostly for endpoints. If you want to know the profiling and what endpoints are connecting to your company, then ISE is a good solution because it has built-in signatures. Therefore, it knows what kinds of devices are getting added into the network.

You can install it with any cloud provider, e.g., AWS or Azure.

You can install ISE locally. If your site is critical, like in manufacturing, you need to make sure that ISE is a part of the local site. Usually, people install data centers, but you can also install at critical sites.

View full review »
Adam Boldin - PeerSpot reviewer
Network Architect at Tarrant Regional Water District

We use it for wired .1x, wireless authentication, VPN, and multi-factor authentication. We wanted to have a consistent experience for authentication and authorization of endpoints across the network, as well as security.

View full review »
Romildo Junior - PeerSpot reviewer
IT Business Manager at Telefónica

This solution provides access to the employees of the company.

View full review »
CT
Network Engineer at a comms service provider with 10,001+ employees

We currently use it for RADIUS and TACACS authentication, but we're moving to SD Campus Fabric. We're tying that in with DNA Center, making it flow with the wireless and authentications at the port, using .1X. That's where we're headed.

We have a 10-node deployment: two PSNs, four dedicated to TACACS and RADIUS, two dedicated to guest WiFi, and two dedicated to pxGrid.

View full review »
Batu Akalin - PeerSpot reviewer
Corporate Information Technology Security Manager at AG ANADOLU HOLDİNG A.S.

We use Cisco ISE for 802.1 network authentication.

View full review »
WG
Senior Network Engineer at a financial services firm with 10,001+ employees

We use Cisco ISE for device administration with TACACS.

View full review »
Mehran Reza - PeerSpot reviewer
Engineering Lead at Canadian Broadcasting Corporation

Cisco ISE is on the back end, and all our policies and security are on it. DNS centers and all our network backbone is integrated into Cisco ISE. So, the solution is pretty critical for us.

View full review »
Josh Calhoun - PeerSpot reviewer
IT Systems Engineer at Pierce County Information Technology

We utilize Cisco ISE for wireless user authentication, as well as authentication, authorization, and accounting for our network devices.

View full review »
EM
Network Engineer at a hospitality company with 10,001+ employees

One of our use cases is using it for authentication for the wireless. Our internal corporate network is using the Cisco ISE server to authenticate clients and make sure that we have the right clients on the wireless side, as well as on the wired side. We just introduced that about a year ago to make sure all our wired clients are our clients and not some "rando" plugging into the network.

View full review »
Andres Lopera - PeerSpot reviewer
Technical Leader at Línea Directa S.A.S / Aplicación e Ingreso

We use it for MAC Authentication Bypass, 802.1X authentication, and certification and validation against Active Directory. Because MAC devices can't be enrolled in the domain, we were doing a manual installation of certificates.

View full review »
Elshaday Gelaye - PeerSpot reviewer
Lead Technical Architec at Commercial Bank of Ethiopia

We use Cisco ISE to set different policies for various profiles. For example, someone on their own device has a different set of policies and postures than a person on a company machine. 

Currently, we are using Cisco's dictionary for both device and user authentication. When I say "device authentication," I mean we authenticate users who access network devices. 

We consider the running policy when users want to access a data center server. The user is forwarded to the ISE servers to be authenticated, and they're given a password defined on the ISE for them according to the policy.

We have two virtual servers with different rules. For example, one is used to authenticate and audit, and the other to authorize and authenticate. And since most of our centers don't support full ISE integration, we use only some features. That means not all our users are not authenticated via the ISE.

View full review »
Ahmed_Shalaby - PeerSpot reviewer
Senior Cyber Security Engineer at Beta Information Technology

I do the designing and implementation and hand it over to the customer. Sometimes, I provide support to the customer. The solution is used for network access control. I have implemented almost all the features of the product.

View full review »
SM
Cyber systems Engineer at a manufacturing company with 10,001+ employees

We use Cisco ISE Identity Services Engine currently for TACACS and posturing.

View full review »
WK
Senior Systems Engineer at Austro Control

We utilize Cisco ISE for network access control and employ RADIUS access for managing user control in our virtual environment.

View full review »
VikasKumar13 - PeerSpot reviewer
Associate consultant at HCL Technologies

We use it to secure our networks. We can secure our switches and wireless networks, basically everything.

We use it primarily for wireless security, but it can be used for many other things as well, like LAN and WAN security.

View full review »
SS
Network Manager at a healthcare company with 10,001+ employees

We use it for network access control. For security reasons, if a vendor plugs into our network, the port is automatically shut down because it's not authenticated to our network.

View full review »
AS
Data Engineer at a healthcare company with 5,001-10,000 employees

Right now we use Wireless.1X and TACACS for device management. It's in our wired network too, but only use it for MAC address bypass.

View full review »
SamBrown - PeerSpot reviewer
Network Engineer at a energy/utilities company with 1,001-5,000 employees

We use it for NAC and wireless, and for our TrustSec policy. These are the three primary use cases we have so far.

View full review »
AA
Senior Network Architect at Commercial Metals Company

We use it mostly for identity, authentication, and authorizations for wireless and wired. The challenges we were looking to address were mostly around the authorization and authentication of the users. We wanted to use the Identity Services Engine to make sure that the users accessing our network were authorized users, with the authentication happening before.

View full review »
WM
Network Engineer at a insurance company with 5,001-10,000 employees

We use the solution for RADIUS authentication, device authentication, and TACACS. We also use it for Wi-Fi and guest portals.

View full review »
PB
Network Security Engineer at Vienna Insurance Group Kooperativa

We are using it mainly for .1X authentication, and we also authenticate our VPN users, and we are doing some light profiling and posture.

We're trying to solve the problem where different users have different privileges in the network. And also we're trying to block some access from our least privileged users. Those are the main use cases for us.

We have on-prem virtual appliances and a distributed model.

View full review »
BS
Senior Systems Administrator at a manufacturing company with 10,001+ employees

Right now, we are doing all wireless through ISE. We have also started migrating to wired.

We have about 20 sites. By having enough node regionalization, we have been able to have all our sites utilizing it.

It is deployed to multiple locations. We have one in Mexico, one in Kelso, two in Asia, and then two in the US.

View full review »
JB
Network Services Engineer at a government with 51-200 employees

We use Cisco ISE to authenticate users or devices onto the network and then drop them into the appropriate VLANs to isolate them and maintain network segmentation.

View full review »
DM
Network Manager at a government with 201-500 employees

We use Cisco ISE for the authentication of wireless clients.

View full review »
PG
Principal Consultant at a computer software company with 1,001-5,000 employees

There's a variety of customer uses for Cisco ISE, which includes securing the edge of the network.

View full review »
MA
Senior Network Officer at a financial services firm with 1,001-5,000 employees

I use Cisco ISE for VPN and authentication.

View full review »
BB
ITS 1 at a government with 10,001+ employees

We use it as our complete NAC solution for both on the wire and wireless as well as guest wireless access and SGTs.

We have five hospitals. We have two service policy nodes at every hospital. We have a deployment at every hospital site.

View full review »
SC
Infrastructure and Cybersecurity Manager at George Washington's Mount Vernon

We have two servers and they're both VMs. Every network system is issued a certificate and each device coming onto the network has to be on the domain with an active AD user logging into it. It needs an up-to-date AMP, which is our Cisco malware and virus scan product and it also needs to have the most current Microsoft security updates and the three layers that we're using: The core VPN, the Network Access Manager and the ISE profiler. When it goes through all those different things on every port on the switch, there are commands for it to be able to go through an ACL so it knows what users are there, what server, and what devices have been put onto the domain. It can verify all that.

The user can then proceed on to the network. We've set it so that regular users are VLAN'd off and can only see the data network through ISE and are blocked from seeing the rest of the network. Depending on the department needs or other factors, we have cameras for security which are on a different VLAN, and they can see those. We also have something for O&M where the AC guy can see the AC equipment, and we can prevent all the VLAN's from being viewed by everybody.

We are customers of Cisco and I'm the infrastructure and Cyber security manager.

View full review »
Md Manirul Islam - PeerSpot reviewer
Assistant general manager at Beximcocomputers

We primarily use the solution for network access control solution and network device access management. The solution comes with features like posturing.

View full review »
OB
IT Architect at a tech services company with 501-1,000 employees

At first, Cisco ISE was a replacement for only ACS RADIUS. It was mostly for remote access VPNs and Wi-Fi. That was it, and later, it evolved into a complete ACS replacement, so it's for both TACACS and RADIUS. Nowadays, we also deploy .1X quite a lot. 

View full review »
HV
Network engineer at Bimbo Bakeries USA

We use it for our AAA authentication through Active Directory. We also use it a lot to verify command line history.

We have ISE in the data center environment with redundancy, and we use it for authentication for all our devices. We have access to our third-party vendors, and for the new projects, we all use ISE. It's an awesome enterprise product for on-premises or for cloud-based deployments.

View full review »
HP
Client Manager at a tech vendor with 10,001+ employees

We have been authenticating our company's employees and certifying that they are in compliance. We have to certify our employees in regards to compliance, having all the necessary protections in our infrastructure for their endpoints, notebooks, laptops, and mobile phones.

We have implemented it across the entire company in every area and department at every single level of our organization.

So far, it has been on-premises. We are still working to expand it to integrate with multiple cloud providers, like AWS.

View full review »
Sait Kilinc - PeerSpot reviewer
Manager of IT at a financial services firm with 10,001+ employees

We use it for the identification of our devices, users, and wireless users.

View full review »
Jeff Burdette - PeerSpot reviewer
Cyber Security Administrator at a aerospace/defense firm with 11-50 employees

We use it for identity services, profiling, and locking down devices.

We're an airport, so when anybody plugs in a device, it's obviously a really big security point for us.

View full review »
JB
Network Engineer at a financial services firm with 201-500 employees

We use it for Cisco device TACACS authentication and .1X security. 

View full review »
CH
Principal consulting architect at a tech vendor with 10,001+ employees

The primary use cases include customer environments, BYOD, posture assessment, and dot1x for wireless and wired networks.

View full review »
LP
Network engineer at a financial services firm with 1,001-5,000 employees

We use it for network device administration and for user access.

View full review »
DH
IT Manager at Shanta Mining

I am not certain if I am using the latest version. It is the one which is made for TV. 

We use the solution to access control. Prior to any device being authenticated on the network, a person must login to the solution's site for authentication purposes. 

View full review »
CP
Associate Director of Network Tower at Happiest Minds Technologies

My clients are small to enterprise-size companies using this networking solution. One of my clients is a leading pharmaceutical manufacturing company, providing genetic medicine. The network they have has approximately 5,000 device inventory. Additionally, I have a couple of clients in the banking industry in the USA that has quite a large networking infrastructure using this solution.

View full review »
MA
Associate Consultant at a computer software company with 201-500 employees

Our use cases are based around dot1x. Basically wired and wireless authentication, authorization, and accounting. 

In terms of administration, only our networking team uses this solution. Probably five to ten administrators manage the whole product. Their role pretty much is to make sure that we configure the use cases that we use ISE for — pretty much for authenticating users to the wired and wireless networks. We might have certain other advanced use cases depending on certain other business requirements, but their job is pretty much to make sure all the use cases work. If there are issues, if users are complaining, they log into ISE to troubleshoot those issues and have a look at the logs. They basically expand ISE to the rest of the network. There is ongoing activity there as well. The usage is administrative in nature, making sure the configurations are okay, deploying new use cases, and troubleshooting issues.

View full review »
Vusa Ndlovu - PeerSpot reviewer
Security Solution Architect at Nexio South Africa

We're using version 3.1, which is very stable. There have been a lot of improvements.

View full review »
BN
Senior Software Engineer with 501-1,000 employees

We use ISE for security group tagging in terms of guests and visitors who access the network to make sure that they actually go through this to control their privilege access to ensure they don't actually access the internal network, etc. 

Our clients use ISE as a form of security policy management so that users and devices between the wired, wireless, and VPN connections to the corporate network, can be managed accordingly.

Take a house for example. Sometimes you need to access a room via a certain keyhole, so you use a key that is unique to that door. With ISE, you can segment this process in terms of policy management based on the security tag. You actually grant the user access based on the tagging.

That's the IT trend — saving a lot on operating costs to manage the different users and access methods.

Within our company, we have roughly 200 employees using this solution.

View full review »
AV
Solution Architect Telecom at a manufacturing company with 10,001+ employees

We primarily use the solution for user authentication and wireless segmentation of users for actual radius purposes.

View full review »
ChrisWanyoike - PeerSpot reviewer
Network Infrastructure Specialist at Central-Bank-Kenya

Mainly the use case of the solution is for ensuring that the corporate staff gets access to their authorized systems. 

Another use case is for contractors to get access to the authorized systems. Those are the ones that hope to assist in the maintenance or for authorized admissions to the network.

We do also use it for remote access, for example, VPN's and also for wired and wireless access to the network.

View full review »
RO
Manager of Systems Architecture at a computer software company with 51-200 employees

We use it to ensure that any device that connects to our network or wireless environment is a company-owned asset and has all the security certificates. We aren't doing too much remediation. We just identify whether it's one of our assets and whether it's allowed.

View full review »
MB
Accounting Executive at a tech services company with 11-50 employees

The ISE product is used to make sure that folks can get access to the application servers that they need to get access to, let's say for accounting and another group like sales and marketing, they would have no business accessing each other's servers, those apps. So you would set up a policy that allows accounting to do what they have to do whether they're remote or on campus and then the sales and marketing folks could never access that. They are totally blocked. It's a virtual firewall, basically.

View full review »
BN
Senior Software Engineer with 501-1,000 employees

We are resellers. We provide and deploy solutions for our customers.

Cisco ISE (Identity Services Engine) helps the operation to automate.

View full review »
AP
OPCO IT Manager at MTN

We use this solution to protect the network especially when someone brings their own device and to lock out access to anybody connecting to the network. Also to make sure that the people connect to the correct VLAN. So, mainly for security wifi access so that when people want to connect to our wifi they have to log in using their credentials.

View full review »
SN
Sr Manager Infrastructure at a financial services firm with 5,001-10,000 employees

My main uses are device administration, wireless access authentication, and ethernet access.

View full review »
NH
IT Manager at cmc

We use this solution for network security.

View full review »
MN
Network Architect at a tech vendor with 10,001+ employees

We mainly use it for endpoint security.

View full review »
WH
Network Manager at a university with 501-1,000 employees

We use it for the TACACS authentication, for administrator login to network devices, and the RADIUS service for VPN and wireless authentication.

Initially, we were looking for a single sign-on for administrators to log in to every network device, but we also wanted a good way to control remote user access for logging in. Later we started using it for VPN and wireless.

View full review »
Chinthaka Kannangara - PeerSpot reviewer
Network System Engineer at VSIS

The solution is used for controlled access in the network, like if you want to restrict access.

The solution is deployed on-prem. I am an integrator of this solution.

View full review »
AW
Network Engineer at a manufacturing company with 201-500 employees

It's mostly for authentication to our network for our end-users.

View full review »
RM
Sr Consultant at a tech services company with 10,001+ employees

I'm using Cisco ISE for integration. We are currently using it for 82.X, but we are planning on using it for a different use case in the next couple of quarters.

View full review »
TB
Senior Enterprise Network Administrator

Our use case is managing access to network devices for IT as well as end-users. Making that seamless is the challenge we were looking to handle.

View full review »
JM
Network Specialist

I use it for licensing and profiling. It's like a "traffic cop." It's an endpoint user migration tool. It's also a TACACS server. It depends on what I'm using it for at the moment.

For the applications it's authentication and then authorization into the network. It's the networks you're on and what AD gives you. Your profile is based in AD or an LDAP server. ISE talks to those two servers and says, "What groups do you belong to, and should you have access to those roles?" With ISE, if AD says you can have it, then go for it.

I use it in big campus environments, anywhere that needs authentication and authorization to work with AD. It's a great tool for that, if you want to profile your network and you want to secure your network inside. We're not talking about firewalls but about what the tool can do for you, what it's designed for.

View full review »
FC
Director of Engineering at a tech services company with 51-200 employees

We use it for Community WiFi and TACACS authentication. It is service provider authentication, both for the core infrastructure and Community WiFi.

We were looking to solve captive portal and centralized authentication with Cisco ISE.

View full review »
MN
Chief ICT Specialist at a government with 10,001+ employees

We use it for SDA infrastructure. We have a challenge in recognizing different kinds of devices and that's what we are using ISE for in the SDA fabric.

View full review »
SI
Security Solutions Architect at GTS

We are a partner with Cisco and am a part of an information security team that uses Cisco to provide security policy management via network, device and wireless access. 

View full review »
JC
Project Manager at Projectnet

The company implemented the solution to keep track of wired and wireless devices.

View full review »
TP
Technical Systems Analyst at NJC

We use this solution to provide wireless for our residence halls and guest networks. We're also a college that works primarily off of iPads, so we have to be able to keep resident hall activity off of the network so that students can do their homework and class activities. We use the Services Engine to authorize all of them.

View full review »
Gerald Jimenez - PeerSpot reviewer
IT Operations Supervisor at Aboitiz Equity Ventures, Inc.

I primarily use ISE for segregating identities, IP addresses, and ports.

View full review »
DR
Head Cyber Security at a retailer with 10,001+ employees

One of the use cases was the certificate-based authentication for the endpoints. All the laptops and mobiles are embedded with certificates and once they get authenticated, then only they would be able to connect to the LAN. 

The other use case was the NAC use case wherein the integrity of the laptops and mobile and such were checked before the scan. They fulfill the policy requirements and then they are able to connect to the network.

The third use case was the consolidated access control management for all the network devices and security devices. 

View full review »
Joni Saputro - PeerSpot reviewer
System Engineer at Packet System Indonesia

We use the solution to secure the endpoint. Before the user connects to the network, it can be investigated whether to connect.

View full review »
ME
Smart Information and Communication Technology Engineering student at INPT

I'm an engineering student, studying smart information and communication technology.

View full review »
LR
Director of Security and Computer Risks at Eclipse Telecomunicaciones S.A. de C.V.

Our clients use Cisco ISE for security, especially in the finance industry.

View full review »
FA
Networks Lead Engineer at a mining and metals company with 1,001-5,000 employees

We primarily use the solution in our infrastructure.

View full review »
Brook Debebe Hailu - PeerSpot reviewer
Chief Technology Officer at Mehbub General Trading PLC

We use this solution for both wired and wireless network access control. We have deployed it in a bank, government offices, and some universities.

View full review »
it_user808431 - PeerSpot reviewer
Solutions Manager at EOH

We are a reseller of Cisco ISE. 

View full review »
DG
Sr.Manager at a energy/utilities company with 10,001+ employees

We use Cisco ISE for device authentication, such as auto switches, and wireless authentication.

View full review »
SS
Deputy Manager at Convergent Wireless Communications

I am a reseller. I provide solutions to our customers.

We used Cisco ISE for Wi-Fi implementation for one project at the International Airport.

View full review »
Can Aksaya - PeerSpot reviewer
Network Solutions Architect at turcom

Our customers use Cisco ISE (Identity Services Engine) as a network access control solution. Before they can get network access, you can do posture check, e.g. in the Windows version, or another version, then it is only after this posture check that the clients can enter the network.

View full review »
MK
Co-Founder & Director at VSAM Technologies

The solution is primarily used for Network management and Network Access Controls.

View full review »
MA
Supervisor IT Security at a government with 1,001-5,000 employees

We primarily use the solution for network admission control.

View full review »
RF
Information Security System Specialist at everis New Company Erifson

We use it to aid the tools that we make and to sponsor and get flow.

View full review »
JF
Works

My primary use case of this solution is for access control for authentication and for the authorization of wireless users.

View full review »
RD
Senior Network Administrator at a media company with 1,001-5,000 employees

We use Cisco ISE for authentication for VPN and network management.

View full review »
HA
Technology Manager at Advanced Integrated Systems

The primary use case is to have network access control and automation to integrate with the enterprise network. It also helps provide a method to make segmentations between users and enable access control.

View full review »
HA
Technology Manager at Advanced Integrated Systems

We are a system integrator and Cisco ISE is one of the products that we sell and implement at our customers side. I have built ISE's POC and provided training to our customers.

I also used real rent lab which was including; Active Directory integration, network access and core switches, access points, wireless access controller, and end points. (some end points have cisco client - anyconnect, and have not), and Web Server for creating wireless authentication portal solution end to end

The AAA features were awesome and have important attributes, and also the security groups (SGTs) concept to enforce policies for each group of users, regardless they coming via wired or wireless network devices. also i see the guest authentication is very rich and easy tom implement 

View full review »
Ntwrkengine0887 - PeerSpot reviewer
Senior Network Engineer at a comms service provider with 1,001-5,000 employees

We use Cisco ISE for network management, user access for enterprise clients, and advanced firewall support. We use Cisco ISE on domains and clients jointly with other network software utilities.

View full review »
PP
Owner at a tech services company with 11-50 employees

We use Cisco ISE to develop products for other people. We don't really use it in our system. We just buy it and implement it when our customers require ISE.

View full review »
EA
Principal ICT Assistant at a educational organization with 1,001-5,000 employees

My primary use case is network address translation and layer 4 filtering.

View full review »
SK
Security Engineer at a energy/utilities company with 201-500 employees

We use this solution to authenticate the domain users and if someone is not the domain user to make them a guest.

View full review »
DG
Technical Solutions Architect at a wholesaler/distributor with 201-500 employees

I am a reseller. We also implement solutions for our clients. Currently, we have a client who is doing a proof of concept with different clients of their own.

We sell this product to many different clients here in Mexico for both retail and manufacturing plants.

Our clients use Cisco ISE (Identity Services Engine) to secure the access of the users. It's a great tool for access control functions.

View full review »
AH
Network Administrator at a government with 51-200 employees

It's a network access manager.

View full review »
JL
Unified Networks at a program development consultancy with 11-50 employees

Our primary use case is to grant access to users, we deploy the bring your own device policy.

View full review »
EE
NOC Manager at a comms service provider with 51-200 employees

We are using Cisco ISE for limiting port access in our organization's building for wired and wireless networks.

View full review »
BE
Network Security Engineer at Data Consult

My primary use case of this solution is to protect the website from web attacks. 

View full review »
CR
Cyber Transport Specialist at a government with 10,001+ employees

We mainly use it for authenticating devices on our network.

View full review »
SZ
Team Lead Network Infrastructure at a tech services company with 1-10 employees

The solution is primarily used for authentification purposes. 

View full review »
PA
IT Specialist at Armstrong flooring, inc.

We use this solution to monitor and secure devices on our network.

View full review »
it_user683622 - PeerSpot reviewer
Presales Systems Engineer at a tech services company with 501-1,000 employees

Our company doesn't use Cisco ISE internally. We act as the solution reseller. Our business model is set up to provide a network-based approach for adaptable, trusted access to our clients. We provide our clients with intelligent, integrated protection through intent-based policy and compliance solutions.

View full review »
it_user690516 - PeerSpot reviewer
Manager - IT Security & Process Compliance at a tech services company with 1,001-5,000 employees

My primary use case for this solution is as a server for my networking devices.

View full review »
it_user866460 - PeerSpot reviewer
Architect of Security and Networking solutions (Presales and after sales) at a comms service provider with 1,001-5,000 employees

We are an ISP and we are working on providing ISP solutions for companies. For that reason, we are trying to deploy ISE or other technologies.

View full review »
AR
VP of IT at a tech services company with 51-200 employees

We are a solution provider and we provide Cisco products, including ISE, to our customers.

This product is used to facilitate the connection of a local network to wireless access. This allows us to restrict users and their access.

View full review »
it_user816279 - PeerSpot reviewer
Research Engineer with 1-10 employees
  • Wireless Control Solutions
  • Physical Port Access Control
  • Changing switch configuration records and account controls.
View full review »
Buyer's Guide
Cisco ISE (Identity Services Engine)
April 2024
Learn what your peers think about Cisco ISE (Identity Services Engine). Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.