Cisco ISE Review
Overall Satisfaction with Cisco Identity Services Engine (ISE)
We initially rolled it out for TACACS for switching remote authentication, and then we switched from Microsoft Radius to ISE for the client authentications and policies.
Pros
- I would say the group policies have been the best part of it. We've been able to really secure our wireless network using it, so we integrate it with Meraki and then issue various policies to different user groups. So really lock down our network and make sure that people that shouldn't access areas of the network don't.
Cons
- I would say the interface, which it seems like Cisco is doing. They're improving some of the logging analytics. That's been a challenge is getting usable data to actually troubleshoot when things go wrong. There's a lot of areas where we have to go kind of all over the place. I would say that's the biggest area for improvement.
- I would say very positive. Like I said, just simplifying it, allowing us to roll out at scale.
I know we looked at ClearPass. ClearPass was the other solution we had looked at a long time ago, but haven't really looked back, so I don't remember too much about it.
Do you think Cisco Identity Services Engine (ISE) delivers good value for the price?
Yes
Are you happy with Cisco Identity Services Engine (ISE)'s feature set?
Yes
Did Cisco Identity Services Engine (ISE) live up to sales and marketing promises?
Yes
Did implementation of Cisco Identity Services Engine (ISE) go as expected?
Yes
Would you buy Cisco Identity Services Engine (ISE) again?
Yes


Comments
Please log in to join the conversation