Cisco Identity Services Engine (ISE) vs. Cisco Meraki MX

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Cisco Identity Services Engine (ISE)
Score 8.9 out of 10
N/A
The Cisco Identity Services Engine (ISE) offers a network-based approach for adaptable, trusted access everywhere, based on context. It gives the user intelligent, integrated protection through intent-based policy and compliance solutions.N/A
Cisco Meraki MX
Score 9.1 out of 10
N/A
Cisco Meraki MX Firewalls is a combined UTM and Software-Defined WAN solution. Meraki is managed via the cloud, and provides core firewall services, including site-to-site VPN, plus network monitoring.
$595
per appliance
Pricing
Cisco Identity Services Engine (ISE)Cisco Meraki MX
Editions & Modules
No answers on this topic
MX64
$595
per appliance
MX67
$695
per appliance
MX68
$995
per appliance
MX84
$1,995
per appliance
MX100
$4,995
per appliance
MX250
$9,995
per appliance
MX450
$19,995
per appliance
Offerings
Pricing Offerings
Cisco Identity Services Engine (ISE)Cisco Meraki MX
Free Trial
NoYes
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
Cisco Identity Services Engine (ISE)Cisco Meraki MX
Considered Both Products
Cisco Identity Services Engine (ISE)
Chose Cisco Identity Services Engine (ISE)
Works and integrates really well with the secure firewall for RAVPN user authentication
Chose Cisco Identity Services Engine (ISE)
Forescoute and Cisco Identity Services Engine shared similar capabilities and deployment methods. Regarding the radius authentication with an administration license, Cisco Identity Services Engine gives easy and widely compatible solution than the Forescoute. We have faced some …
Chose Cisco Identity Services Engine (ISE)
These are two completely different products however there is some cross-over in terms of tracking endpoints on the network. These products would complement each other in as much as the Cisco Prime would be used to manage the network (and use ISE credentials to access network …
Cisco Meraki MX
Chose Cisco Meraki MX
The closest thing would be just a traditional Cisco router with a DMVPN network set up, but I haven't really interacted with anything on Meraki's level. The closest thing would just be a traditional Cisco router with a VPN network.
Chose Cisco Meraki MX
To Fortinet very similar, I always sell the easy patching and secure development.
Chose Cisco Meraki MX
I've used traditional ASAs with and without firepower, newer firepower only Cisco firewalls, and Fortinet FortiGate firewalls. I think Meraki stacks up pretty well to them with most features. I think managing the Meraki is much easier than all of them because of the …
Features
Cisco Identity Services Engine (ISE)Cisco Meraki MX
Firewall
Comparison of Firewall features of Product A and Product B
Cisco Identity Services Engine (ISE)
-
Ratings
Cisco Meraki MX
7.9
131 Ratings
9% below category average
Identification Technologies00 Ratings8.0126 Ratings
Visualization Tools00 Ratings8.4123 Ratings
Content Inspection00 Ratings8.1121 Ratings
Policy-based Controls00 Ratings7.9121 Ratings
Active Directory and LDAP00 Ratings7.5105 Ratings
Firewall Management Console00 Ratings7.4123 Ratings
Reporting and Logging00 Ratings7.4128 Ratings
VPN00 Ratings8.8122 Ratings
High Availability00 Ratings8.7124 Ratings
Stateful Inspection00 Ratings7.6117 Ratings
Proxy Server00 Ratings6.670 Ratings
Best Alternatives
Cisco Identity Services Engine (ISE)Cisco Meraki MX
Small Businesses
NinjaOne
NinjaOne
Score 9.1 out of 10
pfSense
pfSense
Score 9.4 out of 10
Medium-sized Companies
Cisco Meraki MX
Cisco Meraki MX
Score 9.1 out of 10
pfSense
pfSense
Score 9.4 out of 10
Enterprises
Cisco Meraki MX
Cisco Meraki MX
Score 9.1 out of 10
Palo Alto Networks Virtualized Next-Generation Firewalls - VM Series
Palo Alto Networks Virtualized Next-Generation Firewalls - VM Series
Score 9.5 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Cisco Identity Services Engine (ISE)Cisco Meraki MX
Likelihood to Recommend
8.8
(113 ratings)
9.1
(174 ratings)
Likelihood to Renew
9.6
(3 ratings)
8.7
(14 ratings)
Usability
7.0
(3 ratings)
8.4
(10 ratings)
Availability
9.0
(3 ratings)
9.0
(3 ratings)
Performance
9.0
(1 ratings)
9.0
(3 ratings)
Support Rating
7.0
(6 ratings)
8.3
(19 ratings)
In-Person Training
-
(0 ratings)
10.0
(1 ratings)
Online Training
-
(0 ratings)
7.0
(1 ratings)
Implementation Rating
9.0
(3 ratings)
7.0
(1 ratings)
Configurability
8.0
(1 ratings)
9.0
(1 ratings)
Contract Terms and Pricing Model
8.0
(2 ratings)
-
(0 ratings)
Ease of integration
6.0
(3 ratings)
7.0
(3 ratings)
Product Scalability
8.0
(1 ratings)
9.0
(141 ratings)
Vendor post-sale
10.0
(1 ratings)
9.5
(2 ratings)
Vendor pre-sale
9.0
(1 ratings)
9.3
(3 ratings)
User Testimonials
Cisco Identity Services Engine (ISE)Cisco Meraki MX
Likelihood to Recommend
Cisco
Cisco ISE integrates will with a Cisco solution such as firewalls, network switches and routers. It does an incredible job of granting access based on the role that an individual or groups have, and the ability to remove access to that individual or group is also east. In our environment ISE is used to authenticate external users that have access by vpn, and also to manage access to the large network infrastructure
Read full review
Cisco
It's very well suited for retail locations where you have a small footprint and it's a collapsed core design and it's connecting to a larger hub. We don't necessarily use them in our data centers just because they don't have the full capability we have. We use FTDs in our data centers, so we use a different Cisco product for that. So I would say they're really good at setting up sites quickly, getting them connected, protecting the traffic, and then they're a little weak in a data center right now.
Read full review
Pros
Cisco
  • The most beneficial thing that I love about it, there are tons of things that I love about ISE and that it does well, but the most fascinating that I feel about is its integration with DNA center or Catalyst Center using PX Grid as the protocol wherein ISE acts as a policy server for the entire campus hand in hand with Catalyst Center to make sure that the policy policy follows the user and also in the background hand in hand with DNA Center or Catalyst Center makes sure microsegmentation is implemented so that east west traffic is blocked and takes care of the campus.
Read full review
Cisco
  • The Cisco Meraki MX series is phenomenal at allowing us to remotely manage networks. So the devices usually act as the brain behind our client's networks, which makes it really, really easy for our team to take a look at what's going on in those client network environments, resolve any issues, and make sure that our client's networks are staying secure.
Read full review
Cons
Cisco
  • Trustsec needs more documentation and configuration best practice examples
  • The licensing model can be difficult to explain and understand for customers
  • Difficult to get an accurate benchmark to know exactly how many Cisco Identity Services Engine nodes and the size of the deployment should be
Read full review
Cisco
  • Inbuilt wireless does not support tunnel SSID mode. This has meant not all SSID in our organisation can be deployed at a MX site.
  • Whilst Inbuilt switch ports support dot1x, they do not report as well on our NAC server as on a MS switch or catalyst switch.
Read full review
Likelihood to Renew
Cisco
We are so very reliant on Cisco Identity Services Engine at this point that finding another solution would be a big hassle for us.
Read full review
Cisco
The simplicity and ease of use for the Meraki Dashboard make it an easy choice for our organization to renew our Meraki Enterprise Agreement. We will likely continue using the Meraki MC67-C, MX450, and other MX models in their catalog until we shift away from Meraki completely
Read full review
Usability
Cisco
For us the solution is very easily useable on its own. Perhaps that has to do because we started using ISE in the 1.2 days and have seen it grow during the years. Policy creation, etc. is all very visible and thus easy to use. Deployment of multiple nodes is also incredibly easy and flexible. You can easily add or remove nodes as you wish.
Read full review
Cisco
Some features simply aren't there, but the ones that are there are pretty easy to use. Sometimes it is easy to get lost when trying to find the specific device you want to work on, but that's mostly due to how rarely we have to go into the interface.
Read full review
Reliability and Availability
Cisco
We do have to occasionally reboot the servers when they get low on memory, but we're also a few versions behind. Availability has generally been pretty good though with no major outages in the time that we've had it implemented.
Read full review
Cisco
Meraki MX devices support high availability (HA) configurations, which ensures minimal downtime if one device goes offline. This feature has helped us maintain a stable and reliable network, even in cases of hardware failures. ince Meraki is cloud-managed, we've noticed that the cloud infrastructure is generally highly reliable, with minimal service interruptions or downtime. This makes it easier to manage the network remotely without significant availability concerns. Meraki automatically pushes firmware updates and patches, which helps maintain system stability without requiring manual intervention. These updates are rolled out in a manner that ensures minimal disruption to service.
Read full review
Performance
Cisco
yes it does. depending on where you coming from. Logs are pretty busy same as report. it also depending on devices count and design.
Read full review
Cisco
The interface is pretty responsive. The lower end devices are easy to overwhelm if you have a lot of throughput. Be sure the model you get is rated for the amount of traffic you will have. Overbuild if possible, otherwise you won't be fully leveraging the connection from your ISP.
Read full review
Support Rating
Cisco
Cisco support is second to none, both in terms of how you access support but also the knowledge of the individual support teams. If you focus on one technology and provide "manufacturer support" then you can rest assured that you are accessing Cisco's top individuals. I feel like this is a USP for Cisco support.
Read full review
Cisco
I haven't ever had a bad experience with Meraki support. On the few occasions where I wasn't understanding the UI or needed some clarification about what a setting actually would do, I contacted them and they were very quickly able to provide help. Returns are simple and fast, too. We had to return a defective device one time and they shipped the replacement before we had even un-racked the one that was faulty. Unlike many other vendors, they didn't ask use to a do long list of scripted diagnostics, they just took my word for it that the device was broken and sent out a replacement immediately
Read full review
In-Person Training
Cisco
No answers on this topic
Cisco
great when they offered it, really tested your knowledge with hands on and see what your peers from other orgs know. glad to see that we were ahead of the curve of what our peers knew
Read full review
Online Training
Cisco
Training can only cover certain areas, there are a lot of areas training just can't cover. You have to learn by doing it.
Read full review
Cisco
it was okay as it was moderated but still better than nothing and done via semi self paced webex meeting
Read full review
Implementation Rating
Cisco
I did participate in the implementation of Cisco ISE and while there were times when it was confusing and we had a lot of trial and error, overall the experience was fine.
Read full review
Cisco
Implementing Meraki MX devices in phases—starting with a pilot group or select branch offices—was invaluable. This allowed us to identify potential configuration issues, troubleshoot problems, and refine our setup before rolling it out company-wide. It also helped to get feedback from early users and adjust the deployment strategy accordingly. The SD-WAN capabilities in Meraki MX were essential for optimizing our WAN traffic and ensuring better application performance across various locations.
Read full review
Alternatives Considered
Cisco
I think all give some visibility of device monitoring and management, but Cisco Identity Services Engine gives a good way to manage more details about the device in a centralized way that gives a wider range of monitoring and control than the other softwares individually. I don't think Cisco Identity Services Engine eliminates the need for these other software as of now, but there is potential for Cisco Identity Services Engine to be able to take over more of these roles.
Read full review
Cisco
The Meraki Dashboard has been a lot more intuitive than CradlePoint NetCloud. We switched from CradlePoint to Cisco Meraki MX because we were already familiar with the interface which allowed us to be familiar with a single dashboard.
Read full review
Contract Terms and Pricing Model
Cisco
Cisco ISE was competitively priced and Cisco was able to leverage some of our existing contracts to help ease the purchase.
Read full review
Cisco
No answers on this topic
Scalability
Cisco
It's fully customised and comprehensive. only thing is you need to know what you want. Proper research and planning would save lots of time and effort .
Read full review
Cisco
When I first started with my company we had various infrastructure and a mix of tech. Since going to Cisco Meraki MX we have noticed better network performance and our new sites are much easier to bring online. Users have noticed an improvement in VPN connection and getting into all our systems.
Read full review
Return on Investment
Cisco
  • I don't know about negatives because we haven't seen it right now, but positive impact is one is the roadmap we have. And now since we are going ahead with doing the deployment of Cisco ISE, we see that we are getting closure to, so at the end of the day, we have to make sure that operationally we stay excellent. So that's where operational excellence comes in. Cisco ISE is basically addressing that for us. Right now we are in a situation if there is a WIFI issue or if there is an authentication issue, it gets really difficult to isolate the problem. But with Cisco ISE , this functionality is going to come in. So we believe that it would be a good ROI.
Read full review
Cisco
  • From a positive impact? Basically it allows us to set up shop very quickly. It allowed us to add sites to our network very quickly. From a negative perspective, I think the only thing is that I can see from a negative perspective is I have a preference to working with ACLI in terms of how I engage with the youth tool At the moment, the only way to actually engage with a tool is on a gui and sometimes what I'd actually like is more detailed information in terms of actual configuration that you'll actually get out of ACLI.
Read full review
ScreenShots