Walking on thin ISE - 802.1x and so much more
Overall Satisfaction with Cisco Identity Services Engine (ISE)
For many years, there has been a lack of focus on the security of the corporate Local Area Network. Typically as a user you could connect any devices onto a network via any free patch points, get an IP address and then potentially access network resources. With compliance and security in mind, this is now not considered an acceptable position and a consistent security posture need to be applied to any device connecting to any portion of the network whether it be wired or wireless.
Pros
- Dot1x NAC
- Profiling
Cons
- Posturing - there are many other MDM solutions in the marketplace
- Policy creation and libraries can be difficult to navigate
- Adds another layer of security on the LAN and wireless networks
- Ability to effectively manage Cisco network devices with the assurance that all actions are logged
These are two completely different products however there is some cross-over in terms of tracking endpoints on the network. These products would complement each other in as much as the Cisco Prime would be used to manage the network (and use ISE credentials to access network devices for example) and the Cisco ISE would ensure that only authorized users would have access to the network. Security is all about providing layers of defense on the network and it not about deploying single-point solutions and hoping that these can be relied on for sufficient security.
Do you think Cisco Identity Services Engine (ISE) delivers good value for the price?
Yes
Are you happy with Cisco Identity Services Engine (ISE)'s feature set?
Yes
Did Cisco Identity Services Engine (ISE) live up to sales and marketing promises?
Yes
Did implementation of Cisco Identity Services Engine (ISE) go as expected?
Yes
Would you buy Cisco Identity Services Engine (ISE) again?
Yes
Comments
Please log in to join the conversation