Filter Ratings and Reviews
Filter 22 vetted Cisco Identity Services Engine (ISE) reviews and ratings
Reviews (1-6 of 6)
Companies can't remove reviews or game the system. Here's why.
March 02, 2021
Cisco ISE began to be used to solve the problem of Wi-Fi authentication. Later the authorization and accounting capabilities were incorporated for the accesses of the technical equipment. We are currently rolling out the profiling features. All with a focus on security and user experience, seeking safer accesses, a higher level of control and auditing, [and] additionally a profiling based on user / device that allows simplifying administration and that people can perform their tasks regardless of the device they are using.
- Manage high-privilege access to communications equipment. It allows to be granular in the permissions, to have it integrated with the LDAP users and, most importantly, to audit what tasks each user performed.
- Profile users and devices and assign privileges and access levels based on that combination. It greatly improves the user experience, since it does not depend on the network it is in, but on the access levels it has depending on the device. It also allows self-managed guest access with approval flow, which is essential for our business.
- It has also allowed us to automate actions based on findings from StealWatch, Umbrella, AMP, etc.
- It could be integrated with third party products.
- The interface could be a bit more user friendly.
- Could be integrated with social networks for guest authentication.
November 09, 2020
For many years, there has been a lack of focus on the security of the corporate Local Area Network. Typically as a user you could connect any devices onto a network via any free patch points, get an IP address and then potentially access network resources. With compliance and security in mind, this is now not considered an acceptable position and a consistent security posture need to be applied to any device connecting to any portion of the network whether it be wired or wireless.
- Dot1x NAC
- Profiling
- Posturing - there are many other MDM solutions in the marketplace
- Policy creation and libraries can be difficult to navigate
November 03, 2020

Cisco Identity Services Engine segments our employees from our students through 802.1x authentication. Both on the wired and wireless network, with both PEAP and EAP-TLS authentication. We also provide Guest WiFi access through ISE, which is very useful for guest lectureres or any other visitors. Cisco ISE provides us a highly scalable and centrally manageable solution, providing us with a lot of insight regarding clients connected to our network.
- Endpoint profiling.
- Scalability.
- Flexibility.
- Visibility.
- Interface could use an update.
- Licensing/cost.
Cisco ISE is being used currently for 802.1x on wireless and partial wired networks, guest services on wireless and wired, IoT authorization on wireless, and TACACS server for 4k network devices from various vendors. It solved the problems of having multiple authentication and integration into one dedicated deployment.
- Wireless authentication with EAP
- Wireless guest management with hotspot
- Device Access management TACACS+
- Authentication for non-EAP, IoT Authorization, and iPSK
- The licensing model is difficult to understand as it has changed in 2020.
- Feature Documentation, how things should work, could be improved.
- Webinars available for all (official ones from Cisco).
February 11, 2020

ISE is NOT being used at my organization. The project started well, but quickly fell apart when we started planning the rollout beyond the initial phase. The difficulty for the consultant, who had tons of Cisco security certifications, to get answers in a timely fashion dragged out the process, with promise after promise not delivered. It wasn't necessarily the fault of the consultant.
- Guest services.
- Basic assignment of 802.1x devices on WiFi.
- Working with the existing network infrastructure tools.
- Mobile device mgmt integration.
We use ISE to provide access to networking devices and systems. We currently are using TACACS with AD authentication to authenticate to devices. We like having the ability to centrally control all our devices and log activities. When a new employee is added to their team's ACLs, they then are granted access to the devices they need.
- Centrally manages all devices in one place. It's never fun to have to manage multiple systems.
- Very solid platform. We haven't had any issues with things not working properly.
- Has built in profiles for many devices and systems. It really makes it quick to build out.
- Lot and lots of settings. if they could simplify the process or have a template that would make things easier.
- No batch edit. Would be nice to change settings of multiple devices at a time.
Cisco Identity Services Engine (ISE) Scorecard Summary
What is Cisco Identity Services Engine (ISE)?
A critical component of any zero-trust strategy is securing the workplace that everyone and everything connects to. So the vendor presents the Cisco Identity Services Engine (ISE) as a solution that enables a dynamic and automated approach to policy enforcement that simplifies the delivery of highly secure network access control. ISE empowers software-defined access and automates network segmentation within IT and OT environments.
Categories: Network Security
Cisco Identity Services Engine (ISE) Competitors
Cisco Identity Services Engine (ISE) Technical Details
Operating Systems: | Unspecified |
---|---|
Mobile Application: | No |