The Cisco Identity Services Engine (ISE) offers a network-based approach for adaptable, trusted access everywhere, based on context. It gives the user intelligent, integrated protection through intent-based policy and compliance solutions.
N/A
FortiNAC
Score 8.0 out of 10
N/A
FortiNAC is a zero-trust access solution that oversees and protects all digital assets connected to the enterprise network, covering devices ranging from IT, IoT, OT/ICS, to IoMT. With network access control that enhances the Fortinet Security Fabric, FortiNAC delivers visibility, control, and automated response for everything that connects to the network. FortiNAC provides protection against IoT threats, extends control to third-party network devices, and orchestrates automatic response to a…
N/A
Palo Alto Networks Prisma Access
Score 8.3 out of 10
N/A
GlobalProtect™
delivers the protection of next-generation security platform to the mobile
workforce in order to stop targeted cyberattacks, evasive application
traffic, phishing, malicious websites, command-and-control traffic, and known
and unknown threats.
Since it mainly works best with the Cisco ecosystem, we prefer a single vendor if possible. It is more mature for example of FortiNAC. The support level of the vendor is better. The licenses are available in suites hence it can be included in a group of services so a richer …
Cisco ISE Leads in Certain Areas of integration with Cisco infrastructure (switches, firewalls, routers).Strong support for Zero Trust and regulatory compliance segmentation & dynamic access
Cisco ISE integrates will with a Cisco solution such as firewalls, network switches and routers. It does an incredible job of granting access based on the role that an individual or groups have, and the ability to remove access to that individual or group is also east. In our environment ISE is used to authenticate external users that have access by vpn, and also to manage access to the large network infrastructure
If you have a mid/large enterprise network and you need to comply with any of the IT security standards, FortiNAC will help you as it provides complete protection and will provide you needed reports, like logins, times, tries of unauthorized connections. All that can be passed to your existing siem or integrated with other forti products.
I still think Palo Alto Networks Prisma Access is the best SASE/SSE product out there. It just has such good granular controls and up to date security definitions that you can feel absolutely secure in your purchase. GlobalProtect was a lifesaver for me when COVID hit so yes I had to work my butt off to get it up and running quickly and as secure as I possibly could but it worked amazing and had excellent performance after we got it running and tied to MFA, certificates and security policies.
The most beneficial thing that I love about it, there are tons of things that I love about ISE and that it does well, but the most fascinating that I feel about is its integration with DNA center or Catalyst Center using PX Grid as the protocol wherein ISE acts as a policy server for the entire campus hand in hand with Catalyst Center to make sure that the policy policy follows the user and also in the background hand in hand with DNA Center or Catalyst Center makes sure microsegmentation is implemented so that east west traffic is blocked and takes care of the campus.
For us the solution is very easily useable on its own. Perhaps that has to do because we started using ISE in the 1.2 days and have seen it grow during the years. Policy creation, etc. is all very visible and thus easy to use. Deployment of multiple nodes is also incredibly easy and flexible. You can easily add or remove nodes as you wish.
I still say that Palo Alto Networks Prisma Access is the best. I love their GUI, their policies are easy to manage, the sales team is VERY helpful (especially when support is not). I still recommend them to everyone I talk to.
We do have to occasionally reboot the servers when they get low on memory, but we're also a few versions behind. Availability has generally been pretty good though with no major outages in the time that we've had it implemented.
Cisco support is second to none, both in terms of how you access support but also the knowledge of the individual support teams. If you focus on one technology and provide "manufacturer support" then you can rest assured that you are accessing Cisco's top individuals. I feel like this is a USP for Cisco support.
I think our system integrators lacks some competencies and this has led to an implementation that is still perfectible. (i.e. dedicating an interface for intra-cluster communication)
I think all give some visibility of device monitoring and management, but Cisco Identity Services Engine gives a good way to manage more details about the device in a centralized way that gives a wider range of monitoring and control than the other softwares individually. I don't think Cisco Identity Services Engine eliminates the need for these other software as of now, but there is potential for Cisco Identity Services Engine to be able to take over more of these roles.
The McAfee product really isn’t a great option. The configuration is a nightmare and requires a lot of time. The policy management has a high learning curve.
It's fully customised and comprehensive. only thing is you need to know what you want. Proper research and planning would save lots of time and effort .
I don't know about negatives because we haven't seen it right now, but positive impact is one is the roadmap we have. And now since we are going ahead with doing the deployment of Cisco ISE, we see that we are getting closure to, so at the end of the day, we have to make sure that operationally we stay excellent. So that's where operational excellence comes in. Cisco ISE is basically addressing that for us. Right now we are in a situation if there is a WIFI issue or if there is an authentication issue, it gets really difficult to isolate the problem. But with Cisco ISE , this functionality is going to come in. So we believe that it would be a good ROI.