

Find out in this report how the two Cisco Security Portfolio solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
Direct comparisons with Forescout reveal up to 30% to 40% difference in cost savings.
I rate the technical support as one out of ten.
Cisco support has pretty good teams for support and every time we had good answers and we could somehow solve the issues we had.
Sometimes it's challenging to identify which support team is responsible for certain issues, which is a significant concern.
Cisco has good technical support, especially considering these are newer solutions compared to traditional routing and switching products.
Factors like architecture, business nature, and legal limitations such as GDPR affect it.
For a really big deployment, scalability could force you to deploy more complex architectures.
Cisco Secure Endpoint is definitely scalable.
Cisco Identity Services Engine (ISE) is considered very reliable and stable.
The stability of Cisco Identity Services Engine (ISE) is poor for certain use cases, like authentication.
Sometimes when we have upgrades or failovers with Cisco Identity Services Engine (ISE), we had some minor issues.
We have not encountered any problems.
The whole setup works well with Cisco access points and Cisco switches, but when you have multiple vendors in the environment, such as HP switches or access points like Aruba, you'll find they will not work well with Cisco Identity Services Engine (ISE).
Additionally, the product is vulnerable and has many bugs.
The log capacity in Cisco Identity Services Engine (ISE) could be enhanced because today natively on the ISE can only have a look at the logs from the day before.
The forensic capabilities need enhancement, especially for deep forensic data collection.
The license costs can range between $50,000 to $100,000 per year for enterprises.
Compared to other solutions like HPE ClearPass, Cisco is more costly, and the conversation suggests a possible forty percent price gap compared to competitors.
Making large organizational costs significant.
Cisco is aggressive in pricing, making it competitive and sometimes even cheaper than other good products like CrowdStrike, Microsoft Defender, or SentinelOne.
There is value because it helps us secure the network and prevents certain things from happening which could cause financial loss.
This solution ensures organizations have secure environments and also supports robust policy enforcement, allowing control over who has access to various parts of the network.
The adaptability of Cisco Identity Services Engine (ISE) policy enforcement can fit to the site we have depending on which kind of devices we have on site and then the needs for authentication, granting access and then assigning each device into its correct network for segmentation.
Cisco Secure Endpoint is very good in machine learning, which allows it to secure offline contents even if not connected to the internet.
| Product | Mindshare (%) |
|---|---|
| Cisco Identity Services Engine (ISE) | 20.7% |
| Cisco Secure Endpoint | 8.3% |
| Other | 71.0% |

| Company Size | Count |
|---|---|
| Small Business | 45 |
| Midsize Enterprise | 32 |
| Large Enterprise | 91 |
| Company Size | Count |
|---|---|
| Small Business | 21 |
| Midsize Enterprise | 14 |
| Large Enterprise | 21 |
Cisco Identity Services Engine offers robust authentication, posture profiling, guest and secure access, and dynamic policy management. Known for its seamless integration with Cisco tools and network access control features, it ensures secure device and user authentication across networks.
Cisco Identity Services Engine is renowned for its capabilities in managing authentication, guest access, and policy management through segmentation. Its TrustSec functionality, alongside RADIUS and TACACS+ support, provides enhanced security, further augmented by its ability to operate in diverse environments. Its scalability and integration with Cisco solutions aid in maintaining network visibility and access control. Challenges include the complexity of initial deployments, somewhat cumbersome documentation, and limited integration in multi-vendor environments. While encountering issues in stability and updates, the demand for better analytics and straightforward troubleshooting alongside cost-effective licensing is notable.
What are the key features of Cisco Identity Services Engine?Industries implement Cisco Identity Services Engine primarily for network access control, ensuring secure authentication and segmentation in both wired and wireless environments. Supporting policies like bring-your-own-device and compliance standards, ISE manages identity-based access control, especially beneficial for entities that require detailed user rights management and integration within enterprise networks.
Cisco Secure Endpoint offers robust endpoint security with real-time threat prevention and cloud-based management. It is designed for seamless integration with Cisco products, delivering comprehensive protection and ease of use.
Cisco Secure Endpoint provides real-time threat detection, analytics, and rapid response capabilities. Its ease of use, integrated features like sandboxing and Device and File Trajectory, and its incorporation with Talos make it effective for threat hunting and endpoint protection. With strong machine learning and seamless integration with other tools, it addresses threat prevention and network visibility. However, there is room for improvement in AI features, SIEM API integration, user interface simplification, and cost reduction. Enhanced dashboards, reporting, and support are also areas for potential enhancement.
What are the primary features of Cisco Secure Endpoint?In industries such as finance, healthcare, and manufacturing, Cisco Secure Endpoint is vital for maintaining endpoint security and malware protection. Organizations use it within managed security services, integrating with tools like Umbrella for DNS security. It provides visibility into malware activities and supports threat hunting for devices beyond corporate networks. Deployed on workstations, servers, and laptops, it efficiently logs and blocks malicious actions, ensuring a secure environment.
We monitor all Cisco Security Portfolio reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.