Cisco Identity Services Engine (ISE) - go to solution for network security
Overall Satisfaction with Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine is an integral part of securing wireless and wired networks. I use Cisco Identity Services Engine primarily as a partner/consultant to secure K12 and SLED customers. These customers almost always have a universal need to tighten security for their corporate devices to verify that no one unauthorized can connect. The guest redirection feature is really useful and easy to setup, especially if the wireless environement is already a 9800 or meraki WLC. The beauty of Cisco Identity Services Engine is it really is a Swiss Army knife. Depending on the business need, you select the use case and work center and follow the flow of configuration. It may seem intimidating at first but there is really good documentation and community resources for all types of scenarios and networks. Cisco Identity Services Engine can be rolled out in phases depending on the comfort level of the implementation team, making it a lot more flexible than something like a firewall that requires tearing out the old and putting a new device in. Overall, I think Cisco Identity Services Engine is a flagship NAC solution and is a no brainer as the next step in securing any wireless and wired network.
Pros
- Wired and wireless 802.1x
- Guest portals and easy redirection mechanism
- Flexible ways to build matching policies for all different types of traffic
Cons
- Trustsec needs more documentation and configuration best practice examples
- The licensing model can be difficult to explain and understand for customers
- Difficult to get an accurate benchmark to know exactly how many Cisco Identity Services Engine nodes and the size of the deployment should be
- Secured access for student and staff devices
- Provided a reliable means of guest redirection
- Way to implement least privilege with authorization policies that are appropriate for the user accessing the resource
Do you think Cisco Identity Services Engine (ISE) delivers good value for the price?
Yes
Are you happy with Cisco Identity Services Engine (ISE)'s feature set?
Yes
Did Cisco Identity Services Engine (ISE) live up to sales and marketing promises?
I wasn't involved with the selection/purchase process
Did implementation of Cisco Identity Services Engine (ISE) go as expected?
Yes
Would you buy Cisco Identity Services Engine (ISE) again?
Yes
Using Cisco Identity Services Engine (ISE)
Executive staff
HR manager
Practice managers
Administrative staff
Account managers
Support staff
Various engineer departments such as security, helpdesk, devops, enterprise, collaboration
HR manager
Practice managers
Administrative staff
Account managers
Support staff
Various engineer departments such as security, helpdesk, devops, enterprise, collaboration
3 - CCNA, CCNP, security, network administration, server and data center team to initially deploy and maintain the VM’s that ISE runs on.
Security analysis teams.
Helpdesk
Helpdesk
- Secure network access for wired and wireless
- Guest onboarding
- MDM integration
- MAB for IOT
- Configuring TEAP for stronger authentication using machine and user certs
- Posturing
- BYOD for users that don’t want to have their device managed by the MDM
- Trustsec for segmentation


Comments
Please log in to join the conversation