

Find out what your peers are saying about Cisco and others in Cisco Security Portfolio.
| Product | Mindshare (%) |
|---|---|
| Cisco Identity Services Engine (ISE) | 20.7% |
| Cisco Vulnerability Management (formerly Kenna.VM) | 2.5% |
| Other | 76.8% |

| Company Size | Count |
|---|---|
| Small Business | 45 |
| Midsize Enterprise | 32 |
| Large Enterprise | 91 |
Cisco Identity Services Engine offers robust authentication, posture profiling, guest and secure access, and dynamic policy management. Known for its seamless integration with Cisco tools and network access control features, it ensures secure device and user authentication across networks.
Cisco Identity Services Engine is renowned for its capabilities in managing authentication, guest access, and policy management through segmentation. Its TrustSec functionality, alongside RADIUS and TACACS+ support, provides enhanced security, further augmented by its ability to operate in diverse environments. Its scalability and integration with Cisco solutions aid in maintaining network visibility and access control. Challenges include the complexity of initial deployments, somewhat cumbersome documentation, and limited integration in multi-vendor environments. While encountering issues in stability and updates, the demand for better analytics and straightforward troubleshooting alongside cost-effective licensing is notable.
What are the key features of Cisco Identity Services Engine?Industries implement Cisco Identity Services Engine primarily for network access control, ensuring secure authentication and segmentation in both wired and wireless environments. Supporting policies like bring-your-own-device and compliance standards, ISE manages identity-based access control, especially beneficial for entities that require detailed user rights management and integration within enterprise networks.
Cisco Vulnerability Management (formerly Kenna.VM) provides a comprehensive approach to identifying, prioritizing, and mitigating vulnerabilities in IT environments, helping organizations to manage risk effectively.
Designed with advanced analytics, Cisco Vulnerability Management supports risk-based vulnerability management, enabling IT teams to focus on the most critical threats. This platform integrates seamlessly with existing security tools, offering a centralized solution for prioritizing vulnerabilities based on risk level. By aligning security efforts with business objectives, it ensures that resources are directed towards the most impactful areas of risk reduction.
What are the key features of Cisco Vulnerability Management?In industries like finance and healthcare, Cisco Vulnerability Management is crucial for maintaining stringent compliance standards. Its ability to integrate within complex IT ecosystems allows for flexible adaptation across sectors, ensuring that industry-specific vulnerabilities are effectively managed and mitigated.
We monitor all Cisco Security Portfolio reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.