Cisco ISE - Zero Trust Network Access Control
Updated January 25, 2022

Cisco ISE - Zero Trust Network Access Control

Chandan Singh Rathore | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Cisco Identity Services Engine (ISE)

We are using Cisco Identity Services Engine (ISE) in our organization for all users. It gives us endpoint visibility, which is connected in our infra, and zero trust access control, as per the defined rules and policies. We are using it to authenticate our users based on their role/process, before granting them access to our network.
  • Zero trust network access control.
  • Easy on-boarding.
  • Radius.
  • Security compliance.
  • Tacacs.
  • Simple Network Management Protocol (SNMP).
  • SSO can be improved.
  • Cost efficiency.
  • Automated onboarding.
  • AAA - authentication, authorization, and accounting.
  • Complete asset visibility.
  • Host checker.
  • Guest management.
  • Granular policy control.
  • Complete visibility.
  • Centralized management.
  • MDM support.
  • Zero trust network access control.
Cisco ISE is way ahead of other products when it comes to Network Access Control technology. With its granularity level controls and zero trust architecture, we can leverage its extensive policy enforcement to create rules based upon users/processes/machines. It gives so much flexibility to the IT Network team and a holistic view of all the assets connected in the infra.

Do you think Cisco Identity Services Engine (ISE) delivers good value for the price?

Yes

Are you happy with Cisco Identity Services Engine (ISE)'s feature set?

Yes

Did Cisco Identity Services Engine (ISE) live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Cisco Identity Services Engine (ISE) go as expected?

I wasn't involved with the implementation phase

Would you buy Cisco Identity Services Engine (ISE) again?

Yes

Cisco ISE is best suited for almost all types of infra, it doesn't matter whether it's small or large. It provides zero trust architecture and compliance checks on endpoints before allowing users to connect to the office network. We can automate the entire BOYD on-boarding process and guest management process to save time.