Cisco Identity Services Engine (ISE)
Cisco Systems, Inc. | 3.4.0Linux/Unix, Red Hat Enterprise Linux 8 - 64-bit Amazon Machine Image (AMI)
Reviews from AWS Marketplace
0 AWS reviews
-
5 star0
-
4 star0
-
3 star0
-
2 star0
-
1 star0
External reviews
External reviews are not included in the AWS star rating for the product.
Good NAC solution
What do you like best about the product?
Radius and posturing module and profiling.
What do you dislike about the product?
GUI administrator issue after upgrade from 2.2 to 2.7
What problems is the product solving and how is that benefiting you?
Cisco ISE solving the profile and posturing for all endpoints and provide a good security.
- Leave a Comment |
- Mark review as helpful
Very good and useful software
What do you like best about the product?
I like that it makes you feel secure browsing through internet
What do you dislike about the product?
There is nothing I don't dislike I enjoy using this software.
What problems is the product solving and how is that benefiting you?
Is keeping my network and servers safe
Great for access management
What do you like best about the product?
It helps manage user access and create specific profiles. You can see when a user tries to access a profiles in real-time.
What do you dislike about the product?
The UI can get a bit confusing to navigate at the start.
What problems is the product solving and how is that benefiting you?
We have cornered and blocked access to our most vulnerable assets. We have used ISE as a security feature to our network as well.
easier to setup that originally thought
What do you like best about the product?
good documentation, fast deployment, was better that fortinac. I think that once you get comfortable with the interface it becomes quite an asset to a network infrastructure.
What do you dislike about the product?
interface is hard to understand right away, but that goes for all NAC products. I didnt like the new licensing style either. Also
What problems is the product solving and how is that benefiting you?
problem - 3rd party vendors deploying new hardware securely.
benefits ultimately is more automated deployments
say a vendor wants to deploy phones or ip cameras the deployment or sw port config is automated.
benefits ultimately is more automated deployments
say a vendor wants to deploy phones or ip cameras the deployment or sw port config is automated.
Best Security Policy Server in 2020
What do you like best about the product?
I have been using Cisco ISE for more than 8 years now. Its the best easy to manage and most robust security policy server. The best thing I like about ISE is its ease of use in intuitiveness. Its easy to deploy and very flexible with your security policies.
What do you dislike about the product?
There is nothing to dislike about ISE, its absolutely out of the world.There is no recommendation as the product is absolutely brilliant.
What problems is the product solving and how is that benefiting you?
We use ISE as our TACAS+ server for admin access on network devices. We use it for endpoint protection.
A must for Cisco users who want identity services
What do you like best about the product?
ISE is the de facto standard for identity services and network security. If you are a Cisco hardware user then there’s no better solution.
What do you dislike about the product?
ISE has a lot of complexity due to the inherent way 802.1x works. Different clients with authenticate in different ways and the user experience will not be equal across the board.
What problems is the product solving and how is that benefiting you?
Network security used to not exist at our site and with ISE we are able to verify every switch port is secure.
Control is everyting for us
What do you like best about the product?
Cisco ISE is scalable so that provides easy to use and nice customer support.
What do you dislike about the product?
We encountered some issues while setup process.
What problems is the product solving and how is that benefiting you?
My company selected this solution for network accession controlling. Before this solution any user in company were able to connect to our line without any authantication. after have this solution we could manage different profiles for each groups
Cisco ISE for 802.1x Authentication
What do you like best about the product?
Its a quite a powerful tool .. You can do everything from Guest Portal to 802.1x Auth , MAB etc
What do you dislike about the product?
Initially its very tough to find out where is the right option located. The GUI is somewhat complicated
What problems is the product solving and how is that benefiting you?
802.1x Auth for WLAN Users
Recommendations to others considering the product:
The product with proper hands on is exceptionally good
Identify and Secure
What do you like best about the product?
ISE is the glue for everything else. It works easily with all of the various network hardware - where users would be connecting (wired or wireless), as well as Active Directory (or any other external authentication system). It works on its own to create a BYoD wireless network, with the switches to provide more isolation, or even with DNA, ACI, AnyConnect, and other Cisco solutions to gain even more insight into devices and allowing micro-segmentation.
What do you dislike about the product?
It is VERY complicated to initially setup. Get some training and you STILL want to hire someone to assist. But its complications are largely because of all the granularity and options that you have. Once it is setup, it is fairly easy to navigate around and find the answers you may be looking for. But any new features you may want to enable go back to the initial "complicated" process.
What problems is the product solving and how is that benefiting you?
We've been using it for our BYoD Wireless network for years, as well as the Radius authentication for Production 802.1x WiFi users. This allowed us to migrate from ACS for the latter. For the BYoD, it permits us to have a single SSID for users to connect to -- with a corporate device there is a certificate along with the users' AD login that permits full access, personal devices lack the certificate but with AD credentials gain limited access to the network.
We are also working on enlarging the scope to include Wired NAC/segmentation. And future integration with Cisco DNA and ACI.
We are also working on enlarging the scope to include Wired NAC/segmentation. And future integration with Cisco DNA and ACI.
Recommendations to others considering the product:
Trial it. POC. Whatever. Get help in implementing and designing from the beginning. Factor it into the cost.
In addition, be aware that there are open APIs and databases of devices (like medical devices) ALREADY OUT THERE that Cisco can provide (for free) to speed along much of what you may attempt to do.
In addition, be aware that there are open APIs and databases of devices (like medical devices) ALREADY OUT THERE that Cisco can provide (for free) to speed along much of what you may attempt to do.
Cisco ISE stays at the forefront of the market with its new proposals.
What do you like best about the product?
The product worked as expected when we implemented it. Our existing Cisco devices integrated with minimal configuration and impact. Cisco Support was willing to help with any issues we encountered. Cisco ISE offers a very good logging engine that facilitates troubleshooting. Policy configuration can also be easily done in the user interface. When users have trouble connecting, it provides clear steps for resolution.
What do you dislike about the product?
The product updates have led us to find errors with limited gains from new features. The tool's automatic profiling feature could be improved further for more accurate discovery. The licensing model can be costly if implemented on a large scale.
What problems is the product solving and how is that benefiting you?
Cisco ISE provides us with network access control on our wireless and wired networks. It is based on policies that allow us to customize how devices are collected when we try to connect to our network. The product offers multiple ways to authenticate users, whether you only want MAB authentication, username-based authentication, and certificate use. Our implementation has been very easy and we can take advantage of several predefined templates provided by Cisco.
Recommendations to others considering the product:
This solution is generally easy to use and implement. When considering the product, ensure you have an accurate count of the number of users. I would consider the expense of this product against competitors for your user level when making the product selection.
showing 21 - 30