We performed a comparison between Cisco ISE (Identity Services Engine) and OneLogin by One Identity based on real PeerSpot user reviews.
Find out what your peers are saying about Cisco, HPE Aruba Networking, Fortinet and others in Network Access Control (NAC)."At the moment, ISE seems to integrate very well with a number of other technologies."
"One of the most important features is the authentication security for the individual connection to the network through their computer or laptop."
"It's keeping our company safe from rogue devices connecting to our network. From a security standpoint, there's peace of mind knowing that every device that connects is a good one."
"The solution enables us to do everything from one interface."
"The biggest value of ISE is that it can get so granular with gaming systems, versus IoT and BYOD."
"Member Access Control and the ability to integrate all Cisco wireless, Cisco networking, switches, routers, and firewalls."
"The policy sets give us more granular groups for end-user access."
"The interface is pretty easy to use."
"One aspect I particularly appreciate is their exceptional customer support whenever I've needed assistance."
"When it comes to access management, the solution's single pane of glass is extremely important. The single pane of glass for access management enables collaborative work between IT and security. We have access to certain applications that require device trust. Based on the role, we can access those applications through OneLogin Desktop."
"The solution's ability to save and manage of all my passwords is great."
"Ease of integration with AD."
"The most valuable feature is the ease with which we can manage the sign-on feature."
"Simplicity is the most valuable part of OneLogin."
"In my role, the most valuable features are two-factor authentication and self-service password reset. The most helpful feature for the institution as a whole is probably the single sign-on. As an IT director, I care about security and ease of use."
"It's super useful to have a single pane of glass when it comes to access management."
"Adding new devices was a little cumbersome. I haven't done it that many times, but I remember that adding new devices to the authentication piece of it was a little cumbersome. The way I was shown to do it, I thought it was odd because we had to go into the active device, copy the file down, export it, make some changes to it, and then reimport it as opposed to being able to click it and having a template to fill out."
"When I work with customers to do my knowledge transfer, they're really overwhelmed with the navigation of the product and the number of things you can do with it. From a user interface standpoint, Cisco could focus on making certain tasks a bit more guided and easier for customers to walk through. That is, a user-friendly interface and streamlined workflows would be great."
"I'm frustrated by the resource consumption and how many resources it needs to run. It takes a lot of RAM. It takes a lot of space and a lot of IO power. It's frustrating to do upgrades because it takes a long time."
"The intuitiveness of the user interface could be improved."
"Difficult to figure out the protocols and nodes in order to implement correctly."
"On the network services devices, when you click on filter, the filter comes up. However, when I type in a search and I want to click on something it defaults back to the main page. I keep having an issue with that, and I'm not doing anything wrong."
"Cisco could improve the GUIs on their hardware."
"We do tend to run into a lot of issues with ISE when it comes to bugs."
"They have downtime twice a year or once in six months. During the downtime, the SSO page did not come up. When users wanted to get to their email, they were redirected to the OneLogin page, but the page did not come up, and MFA and logins failed. It completely crippled us."
"having a RESTful implementation instead of RPC would have been more desirable."
"The tool must be made more robust."
"More off-hour support."
"OneLogin needs to increase the number of connectors available out of the box to connect to the different endpoints. The number of out-of-box connectors should be increased."
"OneLogin offers a Virtual LDAP feature that we utilize, although it differs slightly from traditional LDAP servers."
"While I initially used OneLogin's desktop feature to extend SSO, I discontinued it two years ago due to limitations."
"I would like better reporting from SmartFactor Authentication when a user is not able to sign in due to a new location, new IP, new device, et cetera."
More Cisco ISE (Identity Services Engine) Pricing and Cost Advice →
Cisco ISE (Identity Services Engine) is ranked 1st in Network Access Control (NAC) with 135 reviews while OneLogin by One Identity is ranked 7th in Identity and Access Management as a Service (IDaaS) (IAMaaS) with 16 reviews. Cisco ISE (Identity Services Engine) is rated 8.2, while OneLogin by One Identity is rated 8.6. The top reviewer of Cisco ISE (Identity Services Engine) writes "Gives us that extra ability to assist the end user and make sure that we are making them happy". On the other hand, the top reviewer of OneLogin by One Identity writes "Integrated well and had a single pane of glass, but downtime and pricing were issues for us". Cisco ISE (Identity Services Engine) is most compared with Aruba ClearPass, Fortinet FortiNAC, Forescout Platform, CyberArk Privileged Access Manager and Fortinet FortiAuthenticator, whereas OneLogin by One Identity is most compared with Auth0, Okta Workforce Identity, Microsoft Entra ID, LastPass and Imprivata OneSign.
We monitor all Network Access Control (NAC) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.