TrustRadius: an HG Insights company

Cisco Identity Services Engine (ISE)

Score8.6 out of 10

192 Reviews and Ratings

What is Cisco Identity Services Engine (ISE)?

The Cisco Identity Services Engine (ISE) offers a network-based approach for adaptable, trusted access everywhere, based on context. It gives the user intelligent, integrated protection through intent-based policy and compliance solutions.

Media

Cisco Identity Services Engine (ISE)
#1 most frequent

Professional, Scientific, and Technical Services

759 installations of 3,506

Cisco ISE is being used currently for 802.1x on wireless and partial wired networks, guest services on wireless and wired, IoT authorization on wireless, and TACACS server for 4k network devices from various vendors. It solved the problems of having multiple authentication and integration into one dedicated deployment.

Senior Wireless Engineer, KAUST (5001-10,000 employees)

Verified Review

View more
#2 most frequent

Manufacturing

425 installations of 3,506

Cisco ISE is pretty good at understanding user behavior. We deployed there using on WIFI environment for authentication and certificate stuff. So it was a pretty good solution in order to have your network secure and in order to have the visibility of everything.

Security Analyst, Scania Latin America (1001-5000 employees)

Verified Review

View more
#3 most frequent

Information

299 installations of 3,506

Secures access to the network at its edge, leveraging 802.1x protocol and MAB. Provides Web Authentication to wireless Guest network. Two nodes, all-in-one, multi-site deployment. Two node deployment provides us required redundancy in case of failure and maintenance, e.g., ISE software updates. ISE allows to prevent unauthorized endpoint access to corporate resources, provides visibility and insight on network access.

Practice Lead EN, Comms-care (201-500 employees)

Verified Review

View more

Cisco Identity Services Engine - go to solution for network security

Use Cases and Deployment Scope

Cisco Identity Services Engine is an integral part of securing wireless and wired networks. I use Cisco Identity Services Engine primarily as a partner/consultant to secure K12 and SLED customers. These customers almost always have a universal need to tighten security for their corporate devices to verify that no one unauthorized can connect. The guest redirection feature is really useful and easy to setup, especially if the wireless environement is already a 9800 or meraki WLC. The beauty of Cisco Identity Services Engine is it really is a Swiss Army knife. Depending on the business need, you select the use case and work center and follow the flow of configuration. It may seem intimidating at first but there is really good documentation and community resources for all types of scenarios and networks. Cisco Identity Services Engine can be rolled out in phases depending on the comfort level of the implementation team, making it a lot more flexible than something like a firewall that requires tearing out the old and putting a new device in. Overall, I think Cisco Identity Services Engine is a flagship NAC solution and is a no brainer as the next step in securing any wireless and wired network.

Pros

  • Wired and wireless 802.1x
  • Guest portals and easy redirection mechanism
  • Flexible ways to build matching policies for all different types of traffic

Cons

  • Trustsec needs more documentation and configuration best practice examples
  • The licensing model can be difficult to explain and understand for customers
  • Difficult to get an accurate benchmark to know exactly how many Cisco Identity Services Engine nodes and the size of the deployment should be

Return on Investment

  • Secured access for student and staff devices
  • Provided a reliable means of guest redirection
  • Way to implement least privilege with authorization policies that are appropriate for the user accessing the resource

Our Experience with Cisco ISE

Use Cases and Deployment Scope

Cisco ISE creates a unified security ecosystem. We used across departments to enforce consistent access policies.

We are also managing guest WIFI using Cisco ISE. It provides customizable portals. Keeping guest traffic isolated from internal resources.

We are also using it for profiling & posturing of network devices

Pros

  • Profiling
  • Guest Access
  • Centralized policy management
  • Posturing

Cons

  • Non Cisco systems is less seamless.
  • Inconsistent Endpoint Detection
  • Better support for mobile and unmanaged devices
  • The licensing model is layered and often confusing

Return on Investment

  • Operational efficiency, and security resilience
  • IT cost savings via automation 30%
  • Downtime reduction(Network segmentation and threat containment reduce downtime by 30, 50%)

Alternatives Considered

FortiNAC

Other Software Used

Cisco Catalyst Center, Cisco Industrial Wireless Access Points, Cisco Secure Firewall

Cisco Identity Services Engine Rocks

Use Cases and Deployment Scope

We use Cisco Identity Services Engine for authentication for all our endpoints and network devices, we also use it for guest wireless connectivity. Currently, the product doesn't face any problems, but we are looking into integrating it with the Catalyst Center. We also are aware that our appliances are about to end of life on 2026 and we need to look for what to do if get them virtual or get them physical. I would like some advice.

Pros

  • Posturing
  • Authorization
  • Authentication

Cons

  • Adding device automatically
  • Include snmp 3 configured in the appliances
  • Rediscovery of wireless devices

Return on Investment

  • Cisco Identity Services Engine has saved us money as our environment is more secure
  • Saves us money as we don't need third party to take care of our security

Alternatives Considered

Cisco Catalyst Center

Other Software Used

Cisco Catalyst Center, Cisco Firepower 1000 Series, Cisco Catalyst 9800 Series Wireless Controllers

Cisco Identity Services Engine review

Use Cases and Deployment Scope

We use it for 802.1x to secure switch ports. We also use them for Meraki Access Point connections. The goal is to stop non employee devices from being plugged into the network. Increase the security to protect wired and wireless connections to the company network and reject random devices from the network.

Pros

  • Wired 802.1x
  • MAB
  • Wireless 802.1x

Cons

  • UI is not user friendly
  • Attributes are hard to find
  • Same menu options are available in different sections

Return on Investment

  • Helps increase security

Alternatives Considered

Aruba ClearPass

From A Cisco Identity Services Engine (ISE) User

Use Cases and Deployment Scope

My company uses Cisco Identity Services Engine (ISE) for identity verification and device security/authentication

Pros

  • Identity verification/Authentication
  • Provide network device security
  • Support troubleshooting

Cons

  • User interface can be cleaner
  • Analytic can be cleaner

Return on Investment

  • Cisco Identity Services Engine (ISE) has really helped with our access control solution. We are now able to do some segmentation on the network using Cisco Identity Services Engine (ISE) for our wireless enviroment

Other Software Used

Cisco ThousandEyes, Cisco Firepower 4100 Series, Cisco 1000 Series Aggregation Services Routers (ASR 1000)