TrustRadius Insights for Cisco Intersight are summaries of user sentiment data from TrustRadius reviews and, when necessary, third party data sources.
Pros
Ease of Use: Users have appreciated the platform's simplicity in task execution and straightforward management, making their operations more efficient. For instance, the intuitive interface allows users to navigate seamlessly and complete tasks with ease.
Customizable Dashboard and Inventory Features: Users found the customizable dashboard and tag search inventory feature beneficial, as it provides them with a personalized experience tailored to their specific needs. This customization empowers users to prioritize important information and access relevant data quickly.
Centralized Management Capabilities: The centralized management aspect of the platform has been praised by users for enabling efficient orchestration and optimization recommendations, streamlining their processes effectively. By having all management tools in one place, users can easily oversee multiple aspects of their system without switching between different interfaces.
We use Cisco Intersight to manage the UCS servers. It solves the problem of managing multiple data centers via one management solution.
Pros
It solves the problem of managing multiple data centers via one management solution
Easy to install
Easy to use
Easy to explain the customer the benefits
Cons
I would like to improve the software quality with new updates. I've had a lot of bugs in Cisco Intersight in the past that resulted in the entire environment coming to a halt
Likelihood to Recommend
If a customer has multiple data centers no matter locally or around the world
VU
Verified User
Consultant in Customer Service (1001-5000 employees)
In our organization, We use Cisco Intersight to manage our UCS (unified computing system) Infrastructure and leverage Automation.
Pros
Easy to configure Dashboards
Perform System Updates
Virtualization View
Cons
Provide more insights for Virtualization
Likelihood to Recommend
If asked, I think I am likely to recommend Cisco Intersight to a colleague because, in my experience, Cisco Intersight is well suited for managing your data center
VU
Verified User
Administrator in Information Technology (1001-5000 employees)
We use Cisco Intersight to manage our UCS and Hyperflex clusters.
From Operations and management perspective it's a single pane to centrally manage all our clusters both DC and remote including HX clusters. Deploy, build and manage in single pane.
Pros
Raising Cisco TAC cases
Deploy HX clusters
Build HX clusters
Centralised Service profiles
Cons
Downloading software directly with 1 credentials
Likelihood to Recommend
Deployed multiple HX clusters from 1 single pane with policies.
We have been using Cisco UCS in legacy UMM (UCSM managed mode) for over 13 years. When Cisco released a newer generation of product (Cisco UCS-X), we were steered in the direction of Cisco Intersight Infrastructure Service and domains in Intersight Managed Mode. We use Cisco UCS domains in UMM to give us a single pane of glass of all our servers and domains, even though in UMM the domain is read-only. The base (free) features in Cisco Intersight Infrastructure Service give us all the features we need for our legacy domains (Connected TAC, auto Support Request generation and TAC's ability to extract log files). For the domains that we have built in UMM and then transitioned to IMM, the IMM Transition Tool has been indispensable. We found it easier to transition an existing domain with settings that have been in use for years, than configuring policies and profiles from scratch. We heavily rely on Cisco PowerTool commandlets to extract and configure settings on our UMM domains and service profiles and were concerned that we had to adopt usage of the Intersight API to get feature equivalency. This ended up not being an issue in Intersight Managed Mode, since all profiles (domain, server, chassis, etc) are associated with updating templates for each, and consume policies which can be reused. Being "nudged" to use server updating templates (this is the only option, whereas in UMM and Cisco UCS Central we always used initial templates only) allowed for a high level of standardisation in our footprint.
Pros
Standardising the environment by enforcing use of updating templates.
Show the difference on a profile between what has changed and what setting was last deployed.
Perform bulk deploy operation on profiles (like server profiles).
Policies underpin all settings (e.g. no more defining individual VLANs before being able to use them, or having to clean them up manually when they are no longer in use. You deploy a Domain VLAN policy that states which VLANs are configured on a domain (either standalone) or a domain profile template (if domains profiles are bound to an updating domain profile template).
Cons
It is difficult to spot an added or removed VLAN in an Ethernet Network Group Policy or VLAN Policy. The comparison widget will show you that something has changed, but if you have 100s of VLANs, the difference does not stand out. Workaround: we copy the data out and compare it in a text editor.
If you are transitioning from UMM to IMM, you lose some functionality like vNIC redundancy pairs.
It is not easy to map the UMM version 4.x server firmware version to the equivalent IMM version 5.x firmware version.
It is not possible to configure out-of-band management IP addresses on a per-domain basis. You have to configure these ranges via an IMC Access policy (which contains the IP address range/pool) on the server profile. This leads to "server profile template sprawl" where we have to maintain multiple server profile templates since our domains sit on different ranges, even though the servers are for the most part configured identically.
UCS domains in IMM only support one Ethernet Network Group Policy (VLAN group) per vNIC template.
Likelihood to Recommend
It is highly suited for an organisation pushing for a standardised and centralised configuration of settings using policies, profiles and templates. It is highly suited for customers used to legacy UMM that need to refresh their environment, but instead of deploying them in UMM (which is still possible), to take the time and effort to learn Cisco Intersight Infrastructure Service and IMM as well as familiarise themselves with the differences between UMM and IMM, and the issues in UMM which IMM addresses and improves upon. We deployed in UMM initially then transitioned to IMM with the transition too. I cannot think of a scenario where Cisco Intersight Infrastructure Service would not be suited. Even for small-scale deployments, it provides significant benefits. Maybe if you come from another server vendor management environment, the learning curve may feel steep (e.g. many new concepts and constructs that one has to master).
VU
Verified User
Engineer in Information Technology (10,001+ employees)