Top Rated
45 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener'>trScore algorithm: Learn more.</a>
Score 9 out of 100
1 Rating
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener'>trScore algorithm: Learn more.</a>
Score 9.1 out of 100

Attribute Ratings

  • Cisco Identity Services Engine (ISE) and Kemp Flowmon ADS are tied in 1 area: Likelihood to Recommend

Likelihood to Recommend

9.1

Cisco Identity Services Engine (ISE)

91%
19 Ratings
9.1

Flowmon ADS

91%
1 Rating

Usability

7.3

Cisco Identity Services Engine (ISE)

73%
2 Ratings

Flowmon ADS

N/A
0 Ratings

Support Rating

6.0

Cisco Identity Services Engine (ISE)

60%
8 Ratings

Flowmon ADS

N/A
0 Ratings

Likelihood to Recommend

Cisco

Overall, management is not terrible if you have a stable network that is not overly complex. If you don't, this product will take considerable time to plan for an effective solution. I will say support is not very helpful, so if you need assistance after the initial sales rep assisted setup, good luck and be prepared to spend hours on the phone.
Read full review

Kemp Technologies

Flowmon ADS is a customizable anomaly detection solution with excellent scalability capabilities and quick integration into the organization environment. Flowmon ADS provides a large set of essential detections out of the box, which allows to quickly acquire an awareness of potential problems in the monitored network. Custom configuration, filters, and false-positive flagging make the system highly customizable for diverse environments. Powerful dashboards make summaries and reporting a breeze. We use the Flowmon Anomaly Detection System daily for event detection and incident handling. It provides high-quality detection methods with low false-positive rates.
Read full review

Pros

Cisco

  • Manage high-privilege access to communications equipment. It allows to be granular in the permissions, to have it integrated with the LDAP users and, most importantly, to audit what tasks each user performed.
  • Profile users and devices and assign privileges and access levels based on that combination. It greatly improves the user experience, since it does not depend on the network it is in, but on the access levels it has depending on the device. It also allows self-managed guest access with approval flow, which is essential for our business.
  • It has also allowed us to automate actions based on findings from StealWatch, Umbrella, AMP, etc.
Read full review

Kemp Technologies

  • Kemp Flowmon ADS provides a large set of essential detections out of the box, which allows us to quickly acquire an awareness of potential problems in the monitored network.
  • Custom configuration, filters, and false-positive flagging make the system highly customizable for diverse environments.
  • Powerful dashboards make summaries and reporting a breeze.
Read full review

Cons

Cisco

  • ISE could really make improvements on software updates and patches. The updates and patches typically take a very long time to install.
  • ISE could improve some of its technical documentation on how to implement certain features that ISE can offer.
Read full review

Kemp Technologies

  • Multi-license policy
  • Outdated GUI
  • Limited use of AI methods
Read full review

Pricing Details

Cisco Identity Services Engine (ISE)

Starting Price

Editions & Modules

Cisco Identity Services Engine (ISE) editions and modules pricing
EditionModules

Footnotes

    Offerings

    Free Trial
    Free/Freemium Version
    Premium Consulting/Integration Services

    Entry-level set up fee?

    No setup fee

    Additional Details

    Pricing Info

    Flowmon ADS

    Starting Price

    Editions & Modules

    Flowmon ADS editions and modules pricing
    EditionModules

    Footnotes

      Offerings

      Free Trial
      Free/Freemium Version
      Premium Consulting/Integration Services

      Entry-level set up fee?

      No setup fee

      Additional Details

      Capacity-based licensing per amount of monitored traffic.

      Usability

      Cisco

      For us the solution is very easily useable on its own. Perhaps that has to do because we started using ISE in the 1.2 days and have seen it grow during the years. Policy creation, etc. is all very visible and thus easy to use. Deployment of multiple nodes is also incredibly easy and flexible. You can easily add or remove nodes as you wish.
      Read full review

      Kemp Technologies

      No answers on this topic

      Support Rating

      Cisco

      Cisco support is second to none, both in terms of how you access support but also the knowledge of the individual support teams. If you focus on one technology and provide "manufacturer support" then you can rest assured that you are accessing Cisco's top individuals. I feel like this is a USP for Cisco support.
      Read full review

      Kemp Technologies

      No answers on this topic

      Alternatives Considered

      Cisco

      We are using a lot of other Cisco solutions, so the integration between them became much better and easier and also gave us a relatively easy way of implementing network automation. We have planned to implement Software define network with the Cisco DNA Center, so Cisco Identity Service Engine was a pre-requirement for this implementation. And finally, Microsoft Access needs to be decommissioned because of the end of life.
      Read full review

      Kemp Technologies

      Read full review

      Return on Investment

      Cisco

      • ISE has allowed us to handle the sticky problem of giving IoT/gaming student devises network access. It allows hands-off management for roughly 2,000 users.
      • Attempting to get posturing and profiling working consistently has been a bear. The workflow is so convoluted it took dozens of man-hours to get it working in a test environment.
      • Centralized TACACS access to NADs has shaved 10-20% of our time spent configuring various boxes.
      Read full review

      Kemp Technologies

      • Early detection of cyber security events and incidents.
      • Processing a large number of network flows on input (which means more than 60K flows per second)
      • Parameterization of detection methods.
      • The possibility to decide on the false-positive rate within the output of each method.
      Read full review

      Screenshots

      Add comparison