Try our new research platform with insights from 80,000+ expert users
reviewer1905522 - PeerSpot reviewer
Client Manager at a tech vendor with 10,001+ employees
Real User
We can deep dive into each employees' usage according to our infrastructure needs
Pros and Cons
  • "There are a lot of integrations available with multiple vendors. This has made the solution easier to work with."
  • "If you have someone taking care of it, it can be quite easy to manage the solution. Otherwise, if you don't look after it and take care of it day-to-day, then it will become more complex to run."

What is our primary use case?

We have been authenticating our company's employees and certifying that they are in compliance. We have to certify our employees in regards to compliance, having all the necessary protections in our infrastructure for their endpoints, notebooks, laptops, and mobile phones.

We have implemented it across the entire company in every area and department at every single level of our organization.

So far, it has been on-premises. We are still working to expand it to integrate with multiple cloud providers, like AWS.

How has it helped my organization?

We have become more reliable because we do not have any vulnerabilities coming into our network, which is important since a lot of employees are using their own endpoints to connect to our infrastructure.

Every other time that we have a new employee, we need to make sure they have been using the latest version of the solution in order to connect to our infrastructure.

We have made our company more secure. As an IT guy, I have gained more importance to my company.

What is most valuable?

It is more about the features related to Apex. This is part of the solution where we can deep dive into each employees' usage according to our infrastructure needs.

There are a lot of integrations available with multiple vendors. This has made the solution easier to work with.

We use the management platform, which makes it easy for our IT to access and manage. 

For how long have I used the solution?

We have been working with it for about 10 years.

Buyer's Guide
Cisco Identity Services Engine (ISE)
October 2025
Learn what your peers think about Cisco Identity Services Engine (ISE). Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
868,787 professionals have used our research since 2012.

What do I think about the stability of the solution?

If you have someone taking care of it, it can be quite easy to manage the solution. Otherwise, if you don't look after it and take care of it day-to-day, then it will become more complex to run. However, if you have someone taking care of it, maintenance is not that difficult.

What do I think about the scalability of the solution?

The scalability is good and quite easy to do. If you have the licenses, then anything is possible.

We worked with customers. The last one that we worked with had 10,000 licenses, i.e., 10,000 endpoints. We started working with the corporate office, then we replicate to the distribution centers.

How are customer service and support?

As an IT integrator, it is quite easy to work with their technical support. We have the correct people to deploy it as well as receive good support from the Cisco Technical Assistance Center. I would rate the support as 10 out of 10.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We have been using ISE for a while. We didn't have another solution beforehand.

How was the initial setup?

We had to do some labs beforehand, in order not to breach the environment. The deployment was not too complex.

When we work with customers, it takes four or five hours. We start with a specific environment, then we replicate to other areas.

What about the implementation team?

We are a reseller. My professional services implemented it, which includes a tech lead, engineer, senior engineer, and project manager to work with the solution.

It is an easy solution to implement with the correct partner.

What was our ROI?

It is difficult to measure security breaches, but since we have not been attacked so far, it has paid for itself over the years.

Which other solutions did I evaluate?

We worked with Fortinet to look at their solution, but ISE was more reliable and had more integration with our product vendors. Also, it had a more affordable cost.

When compared with other vendors, like Forescout, for what we need, ISE has been more usable and accessible.

What other advice do I have?

Learn about the solution, then evaluate what devices it would be implemented with. I would amalgamate the devices and their versions with a systems integrator or partner who already has experience and will try only to replicate it, not to reinvent the wheel.

Part of our journey is getting everybody connected to the infrastructure and trying to avoid any breaches. We don't want to be vulnerable.

I would rate the solution as 10 out of 10.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller.
PeerSpot user
reviewer1895544 - PeerSpot reviewer
ITS 1 at a government with 10,001+ employees
Real User
Keeps people who shouldn't be on our network off our network
Pros and Cons
  • "We have seen ROI. It has done its job. It has protected us when we needed it to."
  • "I would definitely improve the deployment and maybe a little bit of the support. Our first exposure to ISE had a lot of issues."

What is our primary use case?

We use it as our complete NAC solution for both on the wire and wireless as well as guest wireless access and SGTs.

We have five hospitals. We have two service policy nodes at every hospital. We have a deployment at every hospital site.

How has it helped my organization?

We are a healthcare department. We deal with a lot of PHI so ISE is important. It is an integral part of keeping PHI safe.

The solution has helped with safety and keeping people who shouldn't be on our network off our network.

Cisco ISE works very well for establishing trust for every access request when it is deployed and running correctly. It is a great product. It does what it is supposed to do.

We know what is on our network because ISE is able to tell us.

What is most valuable?

The guest wireless works pretty smoothly. The SGTs came in very handy when we had to segregate traffic away from our network, even though it is part of our network. 

The SGT function would probably be the most used. This is mainly because we have a lot of vendors on our campuses but we need to keep them from seeing the traffic and being able to touch other areas of our network. Being able to use SGTs kind of keeps them in their own little lane away from us.

When it is deployed correctly, it is very helpful. It runs smoothly. It is just integrable to what we do.

What needs improvement?

I would definitely improve the deployment and maybe a little bit of the support. Our first exposure to ISE had a lot of issues. However, I have noticed as we have been implementing patches and upgrades that it has gotten a lot better.

For how long have I used the solution?

I have been using it for about four years.

What do I think about the stability of the solution?

With patches and a little bit of babysitting, it is totally stable now.

What do I think about the scalability of the solution?

It is easily scalable.

How are customer service and support?

The technical support is phenomenal. I have called and opened up a ton of tech cases. Eventually, you get the right engineer who can solve all your problems. I would rate them as eight or nine out of 10. It has gotten a lot better. If someone asked me about support two or three years ago, I would have probably given them five out of 10.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We didn't use a solution before ISE.

What was our ROI?

We have seen ROI. It has done its job. It has protected us when we needed it to.

What other advice do I have?

Make sure you have everything ready, including all your information. Make sure you know what you will profile and what will come on your network.

Get hardware nodes versus the VMs.

You definitely want resilience. You want to keep everything protected, especially in the day and age that we live in now. Information is power. Keeping our customers' and patients' information safe is our number one priority.

I would rate it as nine out of 10 because it has gotten better. I have seen it at its worst. Now, it is running a lot better. So, I have a better opinion of it than I did.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Cisco Identity Services Engine (ISE)
October 2025
Learn what your peers think about Cisco Identity Services Engine (ISE). Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
868,787 professionals have used our research since 2012.
Sait Kilinc - PeerSpot reviewer
Manager of IT at a financial services firm with 10,001+ employees
Real User
Enables us to control certificates of each device, preventing unauthenticated devices from entering our network
Pros and Cons
  • "The access policies, and all of the policies in Cisco ISE, are important to us."
  • "The user interface could be more user-friendly."
  • "The pricing is fair."

What is our primary use case?

We use it for the identification of our devices, users, and wireless users.

How has it helped my organization?

Unauthenticated devices are not allowed on our network and that has been an improvement for our company. With Cisco ISE, we control the certificates of each device so that devices have internet access. The solution has eliminated trust from our network architecture.

What is most valuable?

The access policies, and all of the policies in Cisco ISE, are important to us.

What needs improvement?

The user interface could be more user-friendly.

For how long have I used the solution?

I have been using Cisco ISE (Identity Services Engine) for about six years.

What do I think about the stability of the solution?

The stability has been perfect. Our company has been using it for more than 10 years and it's stable. It's really good.

What do I think about the scalability of the solution?

The scalability is also good.

How are customer service and support?

The customer service has been perfect.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not have a previous solution.

What's my experience with pricing, setup cost, and licensing?

The pricing is fair. We have a base license and an OpEx license.

Which other solutions did I evaluate?

We looked at other solutions, but that was a long time ago.

What other advice do I have?

I would recommend ISE to colleagues. We are happy with it and we want to use it in the cloud, next. Our on-prem devices go end-of-support in 2023 and we will try to use it on the cloud.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Andres Lopera - PeerSpot reviewer
Technical Leader at Línea Directa S.A.S / Aplicación e Ingreso
Real User
We are very secure now because only corporate endpoints can be authenticated on our wireless
Pros and Cons
  • "Authentication is the most valuable feature because it puts our company at another level of security."

    What is our primary use case?

    We use it for MAC Authentication Bypass, 802.1X authentication, and certification and validation against Active Directory. Because MAC devices can't be enrolled in the domain, we were doing a manual installation of certificates.

    How has it helped my organization?

    We are a very secure enterprise now because only our corporate endpoints can be authenticated on our wireless. Before, any device could be connected to our production network. And the corporate endpoints have antivirus and anti-malware. Things are more and more secure.

    What is most valuable?

    Authentication is the most valuable feature because it puts our company at another level of security. It establishes trust for every access because we use only corporate endpoints. If somebody has another device, they can't connect it to the enterprise network because we haven't implemented bring-your-own-device yet. We have five warehouse buildings and all our operations are around logistics and that means external people don't come to our buildings.

    For how long have I used the solution?

    I have been using Cisco ISE (Identity Services Engine) for three years.

    What do I think about the stability of the solution?

    It's very stable.

    What do I think about the scalability of the solution?

    It's expensive to scale Cisco ISE, but our situation is stable so we don't need to scale it for now. In the future, we will need a more scalable solution.

    It is used for all our departments, all end-users, all corporate endpoints. And when we use MAC Authentication Bypass, we include printers and VIP cell phones.

    How are customer service and support?

    Tech support is very good.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We didn't have a previous solution.

    How was the initial setup?

    The deployment was a little complex, but not because of the solution. It was more an issue for our people because it was a mindset change.

    It took us about six months to deploy. Because we didn't have a previous solution, we just deployed it one department at a time across our four departments.

    What about the implementation team?

    We used an integrator, ITS Infocom. Experience-wise, it was very good. On our side, we had three people involved. 

    What was our ROI?

    Since implementing Cisco ISE, we haven't had any attacks against our application.

    What's my experience with pricing, setup cost, and licensing?

    Pricing is not a problem for Cisco because it has a lot of features and not much competition, although it's more expensive than other products. But if I do a cost-benefit analysis, Cisco provides high quality.

    Which other solutions did I evaluate?

    We looked at Aruba. Cisco ISE is much better.

    What other advice do I have?

    Be patient with the implementation. It can be very difficult for the clients, the people using it, because it requires a change of mindset.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Chinthaka Kannangara - PeerSpot reviewer
    Network System Engineer at VSIS
    Real User
    Allows you to control or restrict access on your network and has a scalable licensing structure
    Pros and Cons
    • "The best features are the scalability and the license structure."
    • "The licensing documentation needs to be better."

    What is our primary use case?

    The solution is used for controlled access in the network, like if you want to restrict access.

    The solution is deployed on-prem. I am an integrator of this solution.

    What is most valuable?

    The best features are the scalability and the license structure. The license structure is like a tier. If a customer doesn't actually want the highest features, then they can just start with the basic license package and upgrade it if their network is growing. For the smaller customers, they can start with the smaller plans and so on. If you have a financial customer or banking customer, they can go for the full features, and if it's not that critical, the customer can get the basic license package and implement that.

    What needs improvement?

    The licensing documentation needs to be better. We found some old documents describing the license names, like the Base license and Apex license. Cisco used both names. We have found that they changed the Advantage license and Premier License. If someone misunderstands that, they might end up with a hassle. I don't know if it's possible or not for Cisco to remove the older documents from the official website.

    For how long have I used the solution?

    We have been working with this solution for more than two years.

    We were using two solutions on Cisco's network, so we had a few ISE plans in that network.

    What do I think about the stability of the solution?

    The solution is stable. We have maybe 4,000 users for the Next solution.

    How are customer service and support?

    We haven't used technical support very much, but in general, Cisco's support is always responsive.

    How was the initial setup?

    Initial setup was straightforward from our point of view because we have engineers who did that, so of course it was not an issue with us.

    The accesses took maybe three or four months to complete, but the Next part took about three weeks.

    For deployment and maintenance, the team was average sized. You need to follow the correct documents for deployment. There can be misunderstandings if you use old documentation.

    What's my experience with pricing, setup cost, and licensing?

    The licensing is subscription-based and based on the user account.

    What other advice do I have?

    I would rate this solution 8 out of 10. 

    I would recommend this solution.

    If someone is looking for a concrete solution to control the access, then ISE is a better solution.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer. Integrator
    PeerSpot user
    Rammohan Manike - PeerSpot reviewer
    Sr Consultant at Tata Consultancy
    Real User
    Top 20
    It works the same globally no matter where you deploy it
    Pros and Cons
    • "The core point is that Cisco ISE is the same globally compared to FortiAuthenticator. Whether I deploy in China, the US, South Africa, or wherever, I'm can get all the capabilities. It allows me to directly integrate with 365, and from a communications point of view, that is a good capability."
    • "Cisco ISE could be simplified somewhat. I would also prefer certificate-based authentication over confirmation-based authentication for all the processes. It's possible for us to do a workaround, but the process needs to be simplified."

    What is our primary use case?

    I'm using Cisco ISE for integration. We are currently using it for 82.X, but we are planning on using it for a different use case in the next couple of quarters.

    What is most valuable?

    The core point is that Cisco ISE is the same globally compared to FortiAuthenticator. Whether I deploy in China, the US, South Africa, or wherever, I'm can get all the capabilities. It allows me to directly integrate with 365, and from a communications point of view, that is a good capability. 

    What needs improvement?

    Cisco ISE could be simplified somewhat. I would also prefer certificate-based authentication over confirmation-based authentication for all the processes. It's possible for us to do a workaround, but the process needs to be simplified. 

    For how long have I used the solution?

    I've been using Cisco ISE for more than a year.

    What do I think about the stability of the solution?

    Cisco ISE is stable.

    What do I think about the scalability of the solution?

    I haven't really tried to scale ISE, but I don't think we'd face any challenges with hard gentle scaling.

    How are customer service and support?

    We have a good relationship with Cisco support. However, when they do a new release, they take their time. I don't have much of an issue with Cisco support itself, but working with their customer success team and those types of things can be a challenge. It's not just the response time. It's the total resolution time. They'll respond quickly, but when they get the particular fix, it's a challenge. 

    How was the initial setup?

    In the previous versions, the setup was okay. But as they add more capabilities, it gets more complicated to deploy and maintain the solution. We expect these complexities as part of the roadmap and evolution. We have to set the policy definitions manually because there is no discovery process to define what needs to be authenticated. When a new device is added, we might have to configure something so that it's integrated or set up some data flows of the service we need to do it. These are some of the maintenance activities that we must do to keep it live. We have a good IT team that numbers around 25 people and serves a decent number of customers.

    What's my experience with pricing, setup cost, and licensing?

    Customers respond to a low price. From the point of view of integration, Cisco ISE hikes up the cost of security, but otherwise, I think it should be okay.

    What other advice do I have?

    I rate Cisco ISE nine out of 10.

    Which deployment model are you using for this solution?

    Hybrid Cloud
    Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
    PeerSpot user
    reviewer779877 - PeerSpot reviewer
    Senior Software Engineer with 501-1,000 employees
    Reseller
    Good technology that works well with networks, routers and switches, but should include third-party integration
    Pros and Cons
    • "When you push out the policy, it is able to populate the entire network at one time."
    • "Third-party integration is important, as well as the continuous adaptation feature which is the AIOps. It would be helpful to include the AIOps."

    What is our primary use case?

    We are resellers. We provide and deploy solutions for our customers.

    Cisco ISE (Identity Services Engine) helps the operation to automate.

    What is most valuable?

    It works very well with the network, router, and switches. It is able to enforce the policy and assigns the traffic a Security Group tag.

    A Google user is able to enforce access throughout the router and switches ensuring the traffic going through has the same policy.

    When you push out the policy, it is able to populate the entire network at one time.

    It's quite good, the market is using this solution.

    What needs improvement?

    This solution has enhanced features that make it difficult to use. To make it easier, it should be made without PxGrid.

    It should be able to work with third-party routers and switches. We want to work in an environment where there are multi-vendors that require PxGrid.

    Their software-defined access is not easy to implement. You have to have a good understanding of how to implement it. It would be helpful if they could make it easier for the customer to adopt.

    Third-party integration is important, as well as the continuous adaptation feature, which is the AIOps. It would be helpful to include the AIOps.

    For how long have I used the solution?

    They are currently on version 3.1.

    What do I think about the stability of the solution?

    If the customer has more than 200,000 users, the performance becomes a bit laggy.

    What do I think about the scalability of the solution?

    In terms of scalability, it's available on the cloud, but I have not yet tested the features on the cloud.

    It is used mainly by our customers, who use it for their entire infrastructure. They have anywhere from 50,000 to 100,000 users.

    How are customer service and technical support?

    Technical support could be better. They outsource the support.

    We are brought all around the world, it is similar to following the sun.

    Which solution did I use previously and why did I switch?

    Currently, I am using SD-WAN (Software-Defined WAN) from Silver Peak.

    How was the initial setup?

    To complete the installation, you need to be technically knowledgeable. The setup could be easier.

    What's my experience with pricing, setup cost, and licensing?

    For the content, and the technologies it is made to be a bit more complex. 

    The technology is good, but to use some of the other features, and capabilities, they request that we purchase the Cisco DNA Center. As a result, the bundled price is a little high.

    Once you purchase the DNA, you will need the SNA then the license, overall it's very expensive.

    If, however, you implement Cisco ISE without the DNA and the SDA, the price is reasonable.

    What other advice do I have?

    To avoid running into any complications when getting this solution up and running, you should get technically trained and comfortable with it before applying it.

    I would rate Cisco ISE (Identity Services Engine) a seven out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer.
    PeerSpot user
    IT Security manager at a energy/utilities company with 201-500 employees
    Real User
    An authentication solution we can trust
    Pros and Cons
    • "The ability to integrate our Cisco AnyConnect connections to the active directory has been great."
    • "It would be nice if it could be configured easily by default."

    What is our primary use case?

    This solution ties into our Cisco Duo and Cisco AnyConnect connections to help us authenticate against the active directory and Cisco Duo multifactor authentication. It takes metrics about the connections that are connecting it and allows us to set up a rule against them. For instance, if a Windows device is not all the way up to date, we can put a message up that says, "Before you're able to connect, please do your Windows updates as they haven't been done in six months."

    As this solution allows AnyConnect to authenticate with the active directory in the backend, the users won't directly use it. Still, it will be in use throughout the login process into Cisco AnyConnect as a source of authentication.

    With this solution, we don't require anyone for maintenance.

    What is most valuable?

    The ability to integrate our Cisco AnyConnect connections to the active directory has been great. Also, as a source of authentication during the process of logging into Cisco AnyConnect has been very useful for us. 

    What needs improvement?

    It perfectly does everything we have been looking for it to do. I have not discovered any feature sets or items that are lacking. It's a much more functional product than the old Cisco ACS that it replaced. 

    That being said, during deployment, they shipped us the Cisco ISE with the 3.1 operating system, which was incompatible with the license that we had purchased, which would only allow us to go up to version 2.9. Because of this, we actually had to do a factory reset and a reload to the operating system — to an older version of the operating system. This required a very extensive process. We had to take out the Cisco ISE and put it into a factory reset mode to get it to roll back to the old operating system. If we were doing an upgrade, this would have been very simple, but as we were doing a downgrade, it was extremely complex and very labor-intensive. I was crawling through the server room, through wires, to plug things in, to get it to connect in the way that it needed to be connected with an external device in order to actually get it to roll back.

    I don't like that the licensing structure doesn't allow us to have the 3.1 operating system — it forces us to use version 2.9. If you don't want to pay a monthly or a yearly subscription fee, either that device should have come automatically with the 2.9 version operating system, or it should have been much easier to actually roll it back. Additionally, support should have realized that our license requires us to have the 2.9 operating system instead of the 3.1 operating system, which would have saved us a lot of time. 

    It would be nice if it could be configured easily by default. If you're configuring a Cisco device, you pretty much need the support of a CCNA-level technician to be able to do it. It would be nice if there was a default or a more simple way to do it. It's not really a requirement to use the device because you can purchase the premium support or you could get a CCNA in-house to do it. Just having that ability to say, "Hey, we want to set this up" without too many complications or without having to bring in support would be nice. 

    For how long have I used the solution?

    We've only been using this solution for the past three months. 

    What do I think about the scalability of the solution?

    The scalability reports that we could easily handle a million users. 

    How are customer service and technical support?

    I have been extensively involved with their technical support; their technical support is very good. They're more than willing to just jump on and do things for you. My only complaint is that at one point, we were trying to configure our single channel for Cisco Duo to be able to perform a password reset. Whenever we needed to look closely at another device, the support technician would say, "Hold on, let me bring in my expert on VPN; hold on, let me bring in my expert on Cisco ASA." We basically had to wait until we were able to get the Cisco Duo support agent, the Cisco ASA support agent, the Cisco VPN support agent, and the Cisco ISE support agent — all in the WebEx meeting at the same time.

    As far as I'm to understand, there are CCNAs that should have been able to do it, but they brought in the experts from each item instead of just directly doing it themselves — this made the whole process take longer. Still, they were able to do everything in a way that did not affect our live environment, even though it was on the same device. That was actually very nice because it meant that we could do it in the middle of the day instead of having to do things in the middle of the night.

    How was the initial setup?

    The initial setup was very simple. Everything was set up within an hour thanks to assistance from the onboarding teams from Duo and Cisco, and our network administrator. They got it set up and reviewed a bunch of options with us. It was a very easy and nice process.

    What about the implementation team?

    Implementation was achieved with in-house resources and premium onboarding support. The entire process only took an hour.

    What's my experience with pricing, setup cost, and licensing?

    We are running version 2.9 because version 2.9 of the ISE has a persistent license —it's a one-time payment. The latest version (3.1) is only available if you do a yearly subscription.

    It's a licensed physical device; there is no subscription. If you want the latest operating system, then you'll need to get an annual license.

    What other advice do I have?

    If you're planning on using this solution, my advice is to be sure you review the full feature set available and select what is important to your users. This way you'll be able to ensure that you'll have everything you want and need.

    Overall, on a scale from one to ten, I would definitely give this solution a rating of nine. 

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Buyer's Guide
    Download our free Cisco Identity Services Engine (ISE) Report and get advice and tips from experienced pros sharing their opinions.
    Updated: October 2025
    Buyer's Guide
    Download our free Cisco Identity Services Engine (ISE) Report and get advice and tips from experienced pros sharing their opinions.