We performed a comparison between Cisco ISE (Identity Services Engine) and RSA SecurID based on real PeerSpot user reviews.
Find out what your peers are saying about Cisco, HPE Aruba Networking, Fortinet and others in Network Access Control (NAC)."The most valuable feature is the provisioning of the device so as to ensure that they are compliant with the security policy that we need to have."
"Authentication is the most valuable feature because it puts our company at another level of security."
"Cisco ISE scales exceptionally well."
"The live logs and live sessions for troubleshooting are the most valuable features because they provide a detailed report of any issues."
"With NAC, the profiling feature is valuable. We're able to see what we have out there in the network and dynamically assign policies to it. We can then use that to enforce TrustSec policy or anything else with NAC."
"The features that do work, work well, and we use it on a daily basis."
"The most valuable feature is the integration with StealthWatch and DNA as one fabric."
"We found that the most valuable features associated with this tool are posture assessment, policy management, VLAN assignments, guest assignment, and BYOD services. In addition to these services, the Cisco IOS software switch configuration feature is another very valuable aspect of the policy and compliance solution."
"It is a scalable solution."
"I would say that the two-factor authentication and the ease of installation and configuration are the most valuable features of this solution."
"The most valuable features of RSA SecurID Access are push notifications, multifactor authentication, and ease of integration and deployment."
"I think it is really good when it comes to the hard token side of things."
"One of the most valuable feature is the ID soft token and hard token."
"An issue with the product is it tends to have a lot of bugs whenever they release a new release."
"Adding new devices was a little cumbersome. I haven't done it that many times, but I remember that adding new devices to the authentication piece of it was a little cumbersome. The way I was shown to do it, I thought it was odd because we had to go into the active device, copy the file down, export it, make some changes to it, and then reimport it as opposed to being able to click it and having a template to fill out."
"Cisco ISE is complex. The deployment and design of networks with it is so complex. If it could change it would be better."
"The interface could be more user-friendly and the ability to apply rules to MAC addresses, for example, if I wanted to allow a certain MAC address access at a particular time I cannot make this adjustment."
"It is a good product, but in order to use all of the functions of the product, you must have a good understanding of the product. You must know how to use and manage it. It is a little bit complicated to configure and manage. It must be simplified to make it easy to manage for end users. In the initial stage, we found ISE complicated for end users. It was not easy to manage it or to write authentication and authorization protocol. They must improve its management and make it easy for end users. The monitoring and reporting capabilities can be improved because end users want to quickly see what is happening in their network. There were some restrictions in working with other vendors. It should also have a better and easy integration with other vendors."
"The solution is not so user-friendly."
"Cisco ISE requires a lot of time-consuming administration."
"I would like for the next release to be easier to implement and to limit its dependencies around ISE, Windows, the network as a whole, etc."
"It doesn't offer an agent-based or reverse-proxy-based approach to integration, which could enhance its flexibility."
"The interface needs to improve a lot. It should be easier to manage and navigate."
"Sometimes, we encounter issues with other applications that are not compatible with RSA SecurID Access and require expert troubleshooting. At those times, we need additional support from an implementation perspective. This is an area where Oracle can improve as there is no substitute for reliable and efficient support."
"There are different compliances across the globe; RSA SecurID Access could be more complaint-based."
More Cisco ISE (Identity Services Engine) Pricing and Cost Advice →
Cisco ISE (Identity Services Engine) is ranked 1st in Network Access Control (NAC) with 135 reviews while RSA SecurID is ranked 8th in Authentication Systems with 9 reviews. Cisco ISE (Identity Services Engine) is rated 8.2, while RSA SecurID is rated 7.8. The top reviewer of Cisco ISE (Identity Services Engine) writes "Gives us that extra ability to assist the end user and make sure that we are making them happy". On the other hand, the top reviewer of RSA SecurID writes "Enhanced security, reliable, helpful technical support, and easy to install". Cisco ISE (Identity Services Engine) is most compared with Aruba ClearPass, Fortinet FortiNAC, Forescout Platform, CyberArk Privileged Access Manager and Fortinet FortiAuthenticator, whereas RSA SecurID is most compared with Yubico YubiKey, Microsoft Entra ID, PingID, Fortinet FortiToken and CyberArk Privileged Access Manager.
We monitor all Network Access Control (NAC) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.