Most Helpful Review
Good stability and enables us to identify and isolate a machine that is infected or that is going to be infected
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Using this solution gives us the ability to allow proper access to the network.
The biggest value of ISE is that it can get so granular with gaming systems, versus IoT and BYOD.
Easy to use and provides good support
The best feature of the Cisco ISE platform is that it is compatible with Microsoft products.
We found that the most valuable features associated with this tool are posture assessment, policy management, VLAN assignments, guest assignment, and BYOD services. In addition to these services, the Cisco IOS software switch configuration feature is another very valuable aspect of the policy and compliance solution.
In terms of scalability, you need to factor in your licenses. With a virtual platform, the scalability is more than sufficient. We have over one thousand users.
Visitors can be granted access to the wifi network using their cellphones, notebooks or tablets in a very easy way. The ease of accessibility that anyone can have to the network is very quick and is a big improvement in our network.
For guests we give them limited access to the internet when they come in so that access has been useful. Previously, we just used to give them the APN key which they would leave with. Now, we give them credentials to use that are for a limited period of time.
The Password Upload Utility tool makes it easier when setting up a Safe that contains multiple accounts and has cut down the amount of time that it takes to complete the task.
For a while, there were individual IDs having privileged access. We wanted to restrict that. We implemented the solution so that it can be more of internal control. We can have session recordings happening and reduce our attacks.
There are no issues with scalability. Our clients are very happy to use the product.
We are maintaining compliance in PCI, SOX and HIPPA, which is a big thing. Auditors really like it, and it has made us stay compliant.
We are able to know who is accessing what and when; having accountability.
This solution is quite stable.
The most valuable feature is that it always provides flexibility, password quality and one-time user check-in and check-out.
I really like the PTA (Privileged Threat Analytics). I find this the best feature.
There should be a single button that can be pressed to dismiss all of the alarms at once.
I'd like to see an easier way to upgrade to larger versions, as well as more best practices that are easier to locate on their support page.
An area that could be improved is the agent. The challenge now is that agent and most of the computers have changed. They could think about agent-less deployment.
Cisco ISE is complex. The deployment and design of networks with it is so complex. If it could change it would be better.
There are issues with respect to the posture assessment function. It's been observed that customers are not receiving total access to the network because the assessment agent is glitchy and malfunctions from time-to-time. I would like to see refining of the compliance assessment and adding more detailed compliance of endpoints on the user end.
There can be a little bit more integration between the controller management and ISE. There are two dashboards, you have the controller dashboards, and you have the ISE dashboard it would is a way to maybe integrate that into one. That would be great. It's not that bad. It would be easier if it could be combined into one dashboard.
There should be an easier way to do the upgrades. There are a lot of steps to get to the next version from the previous version which ends up being a bit of the headache with the upgrade.
In order to make it a ten, it should be more user-friendly. You need somebody who is knowledgeable about it to use it. It's not easy to use. We have to rely heavily on technical support.
Currently, in Secure Connect, an end user is required to enter account information manually, and cannot save any of this information for future use.
Integration with the ticketing system should allow any number of fields to be used for validation before allowing a user to be evaluated and able to access a server.
The initial setup of CyberArk is a challenge if you do not have prior experience with it.
Make it easier to deploy.
I think having a distributed architecture would certainly help this solution.
There was a functionality of the solution that was missing. I had noticed it in Beyond Trust, but not in this solution. But, recently they have incorporated something similar.
If we could have some kind of out-of-the box feature that you can simply say "no" so they don't have to go into a development mode, that would a really helpful feature.
Tech support staff can be more proactive.
Pricing and Cost Advice
If you go directly with Cisco for the implementation it's very, very expensive.
In comparison to other products on the market, CyberArk is a more costly product.
This solution is considered to be more expensive than others out there on the market today.
I do not have any opinions to add about the pricing of the product.
No, I do not have any advice on the price of the product.
Network and security licenses are currently being managed by other outsource vendors, so they are facing some type of problems in the digital aspect.
With reducing the privileged account access, there has been a huge improvement. They are now bringing more accounts on a little at a time.
If you are looking at implementing this solution, buy the training and go to it.
Our risk is definitely significantly lower. Also, our resources are low.
out of 21 in Network Access Control
Average Words per Review
out of 22 in Privileged Access Management
Average Words per Review
Compared 41% of the time.
Compared 18% of the time.
Compared 8% of the time.
Compared 11% of the time.
Compared 10% of the time.
Compared 9% of the time.
Also Known As
|Cisco ISE||CyberArk Privileged Access Security, CyberArk Privileged Account Security, SSH Key Manager, Privileged Session Manager, Privileged Threat Analytics, Application Identity Manager, On-Demand Privileges Manager, Endpoint Privilege Manager|
|Identity Services Engine is a security policy management platform that automates and enforces context-aware security access to network resources. It delivers superior user and device visibility to support enterprise mobility experiences and to control access. It shares data with integrated partner solutions to accelerate their capabilities to identify, mitigate, and remediate threats.|
CyberArk is the trusted expert in privileged account security. Designed from the ground up with a focus on security, CyberArk has developed a powerful, modular technology platform that provides the industry's most comprehensive Privileged Account Security Solution.
Learn more about Cisco ISE (Identity Services Engine)
Learn more about CyberArk PAS
|Aegean Motorway, BC Hydro, Beachbody, Bucks County Intermediate Unit , Cisco IT, Derby City Council, Global Banking Customer, Gobierno de Castilla-La Mancha, Houston Methodist, Linz AG, London Hydro, Ministry of Foreign Affairs, Molina Healthcare, MST Systems, New South Wales Rural Fire Service, Reykjavik University, Wildau University||Rockwell Automation|
Comms Service Provider31%
Software R&D Company23%
Comms Service Provider15%
Financial Services Firm8%
Financial Services Firm28%
Software R&D Company25%
Financial Services Firm16%
Comms Service Provider10%