Cisco Identity Services Engine (ISE) - go to solution for network security
Updated July 23, 2025

Cisco Identity Services Engine (ISE) - go to solution for network security

Joshua Williams | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with Cisco Identity Services Engine (ISE)

Cisco Identity Services Engine is an integral part of securing wireless and wired networks. I use Cisco Identity Services Engine primarily as a partner/consultant to secure K12 and SLED customers. These customers almost always have a universal need to tighten security for their corporate devices to verify that no one unauthorized can connect. The guest redirection feature is really useful and easy to setup, especially if the wireless environement is already a 9800 or meraki WLC. The beauty of Cisco Identity Services Engine is it really is a Swiss Army knife. Depending on the business need, you select the use case and work center and follow the flow of configuration. It may seem intimidating at first but there is really good documentation and community resources for all types of scenarios and networks. Cisco Identity Services Engine can be rolled out in phases depending on the comfort level of the implementation team, making it a lot more flexible than something like a firewall that requires tearing out the old and putting a new device in. Overall, I think Cisco Identity Services Engine is a flagship NAC solution and is a no brainer as the next step in securing any wireless and wired network.

Pros

  • Wired and wireless 802.1x
  • Guest portals and easy redirection mechanism
  • Flexible ways to build matching policies for all different types of traffic

Cons

  • Trustsec needs more documentation and configuration best practice examples
  • The licensing model can be difficult to explain and understand for customers
  • Difficult to get an accurate benchmark to know exactly how many Cisco Identity Services Engine nodes and the size of the deployment should be
  • Secured access for student and staff devices
  • Provided a reliable means of guest redirection
  • Way to implement least privilege with authorization policies that are appropriate for the user accessing the resource

Do you think Cisco Identity Services Engine (ISE) delivers good value for the price?

Yes

Are you happy with Cisco Identity Services Engine (ISE)'s feature set?

Yes

Did Cisco Identity Services Engine (ISE) live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Cisco Identity Services Engine (ISE) go as expected?

Yes

Would you buy Cisco Identity Services Engine (ISE) again?

Yes

Cisco Identity Services Engine is well suited for k12 and SLED customers who have a need for greater physical security. They don’t want anyone and everyone to have open access to the network or be able to plug a random device in.

Cisco Identity Services Engine isn’t good for customers that want a completely hands off approach to network administration. It requires a good deal of effort to implement initially and some ongoing effort to manage and optimize it on the backend. Some teams are just too lean or don’t have a large enough business to justify needing a solution that’s tailored towards networks of 50+ users.

Using Cisco Identity Services Engine (ISE)

Executive staff
HR manager
Practice managers
Administrative staff
Account managers
Support staff
Various engineer departments such as security, helpdesk, devops, enterprise, collaboration
3 - CCNA, CCNP, security, network administration, server and data center team to initially deploy and maintain the VM’s that ISE runs on.
Security analysis teams.
Helpdesk

  • Secure network access for wired and wireless
  • Guest onboarding
  • MDM integration
  • MAB for IOT
  • Configuring TEAP for stronger authentication using machine and user certs
  • Posturing
  • BYOD for users that don’t want to have their device managed by the MDM
  • Trustsec for segmentation

Comments

More Reviews of Cisco Identity Services Engine (ISE)