

Cisco Identity Services Engine and F5 BIG-IP Access Policy Manager compete in the access management solutions category. Cisco ISE seems to have the upper hand in Cisco environments due to its deep integration and feature set, while F5 APM provides superior session customization and cloud flexibility.
Features: Cisco ISE integrates with Cisco environments and offers features like 802.1X, TrustSec, and TACACS+. Its RADIUS feature supports Active Directory for user authentication, and it provides granular control over network access. F5 APM is praised for virtual IP creation, session customization, and seamless integration with various authentication protocols. It facilitates user session management and offers strong performance and reliability.
Room for Improvement: Cisco ISE's setup is complex with a steep learning curve, and there are issues with posture assessment stability and third-party integration. Its update process and interface could be improved. F5 APM requires better cloud support and post-acquisition service reliability, with calls for GUI improvements and easier identity provider integration.
Ease of Deployment and Customer Service: Cisco ISE is mainly used on-premises with hybrid cloud support, backed by knowledgeable TAC teams, although support can be slow and require multiple engineers. F5 APM also offers hybrid deployments, with feedback indicating a need for better documentation and faster support. Cisco ISE benefits from structured ATC partner support, while F5 APM users report a more self-driven setup.
Pricing and ROI: Cisco ISE has complex pricing with multiple tiers, potentially leading to high costs for large networks, yet offers ROI through robust network protection and integration. Licensing confusion is reported, and there’s a move toward subscription models. F5 APM’s pricing is high but simpler, with cost justified by its security features. Both solutions deliver security and operational ROI, though Cisco's complexity and pricing are more commonly discussed.
Direct comparisons with Forescout reveal up to 30% to 40% difference in cost savings.
I rate the technical support as one out of ten.
Cisco support has pretty good teams for support and every time we had good answers and we could somehow solve the issues we had.
Sometimes it's challenging to identify which support team is responsible for certain issues, which is a significant concern.
Even if they respond, they don't update me with the process or what's going on.
Most of the technical support is managed in-house due to our extensive experience with F5 products.
F5 technical support is responsive and helpful.
Factors like architecture, business nature, and legal limitations such as GDPR affect it.
However, you can have some latency issues depending on where your devices are.
The product's flexibility and company culture contribute to resolving these challenges.
I would rate the scalability of F5 BIG-IP Access Policy Manager (APM) between seven and eight.
Cisco Identity Services Engine (ISE) is considered very reliable and stable.
The stability of Cisco Identity Services Engine (ISE) is poor for certain use cases, like authentication.
Sometimes when we have upgrades or failovers with Cisco Identity Services Engine (ISE), we had some minor issues.
On a scale from one to ten for stability, I would rate F5 BIG-IP Access Policy Manager (APM) a ten.
Sometimes, the logs are not quite informational or easy to understand.
The whole setup works well with Cisco access points and Cisco switches, but when you have multiple vendors in the environment, such as HP switches or access points like Aruba, you'll find they will not work well with Cisco Identity Services Engine (ISE).
Pricing can be more expensive compared to other vendors, and there is a significant price gap observed, which doesn't seem justified by some specific features.
They are very poor in asset classification and should focus on improving the preauthentication profiling, especially for NAC use cases.
If I could copy and paste objects instead of picking and configuring them from scratch each time, it would be great.
The main improvement needed for F5 BIG-IP Access Policy Manager (APM) is to integrate into the cloud-delivered services from F5.
The ability to run the Anycast feature would be valuable, as the current solution only operates on-premises.
Compared to other solutions like HPE ClearPass, Cisco is more costly, and the conversation suggests a possible forty percent price gap compared to competitors.
The license costs can range between $50,000 to $100,000 per year for enterprises.
Cloud solutions are expensive, while on-prem setups with shared environments are cheaper but not effective.
F5 products are more expensive than other solutions but are valued for their quality and reliability.
Cisco Identity Services Engine (ISE) offers authentication using RADIUS, enhancing network security by separating and segregating networks.
There is value because it helps us secure the network and prevents certain things from happening which could cause financial loss.
The adaptability of Cisco Identity Services Engine (ISE) policy enforcement can fit to the site we have depending on which kind of devices we have on site and then the needs for authentication, granting access and then assigning each device into its correct network for segmentation.
APM is quite flexible for customers to use, providing secure remote access through various host-checking conditions for both machines and users.
It provides robust security and offers integration with multi-factor authentication systems, which is crucial for an organization's security policy.
A lot of features are useful to me, including mostly the authentication, SAML, or SSO, with no sign-on.
| Product | Mindshare (%) |
|---|---|
| Cisco Identity Services Engine (ISE) | 19.4% |
| F5 BIG-IP Access Policy Manager (APM) | 1.9% |
| Other | 78.7% |
| Company Size | Count |
|---|---|
| Small Business | 45 |
| Midsize Enterprise | 32 |
| Large Enterprise | 91 |
| Company Size | Count |
|---|---|
| Small Business | 9 |
| Midsize Enterprise | 2 |
| Large Enterprise | 9 |
Cisco Identity Services Engine offers robust authentication, posture profiling, guest and secure access, and dynamic policy management. Known for its seamless integration with Cisco tools and network access control features, it ensures secure device and user authentication across networks.
Cisco Identity Services Engine is renowned for its capabilities in managing authentication, guest access, and policy management through segmentation. Its TrustSec functionality, alongside RADIUS and TACACS+ support, provides enhanced security, further augmented by its ability to operate in diverse environments. Its scalability and integration with Cisco solutions aid in maintaining network visibility and access control. Challenges include the complexity of initial deployments, somewhat cumbersome documentation, and limited integration in multi-vendor environments. While encountering issues in stability and updates, the demand for better analytics and straightforward troubleshooting alongside cost-effective licensing is notable.
What are the key features of Cisco Identity Services Engine?Industries implement Cisco Identity Services Engine primarily for network access control, ensuring secure authentication and segmentation in both wired and wireless environments. Supporting policies like bring-your-own-device and compliance standards, ISE manages identity-based access control, especially beneficial for entities that require detailed user rights management and integration within enterprise networks.
F5 BIG-IP Access Policy Manager (APM) enhances access management by offering remote application access through SSL VPN, secure access verification, and login capabilities. Its user-friendly interface and robust security ensure efficient scalability and performance.
F5 BIG-IP APM serves enterprises by integrating multiple authentication protocols and supporting remote access via SSL VPN for secure application and network connections. Known for its strong performance and reliable scalability, APM allows custom policy management, facilitating load balancing and enhanced server management through virtual IP creation. It offers a secure bridge for users to connect to private networks while managing access through portals and enforcing compliance checks. Despite its efficient and user-friendly interface, APM has areas needing improvements such as updates for MacOS access, comprehensive reporting features, and simplifying the initial setup process. Better documentation and improved cloud integration are also areas for potential enhancement, alongside more efficient management and automation capabilities. Pricing and integration with other systems could be more competitive, and improvements in support response times would benefit users significantly.
What are the key features of F5 BIG-IP APM?In sectors like finance and healthcare, F5 BIG-IP APM ensures secure access management for sensitive data networks. Retailers utilize it to manage seasonal traffic efficiently with its load balancing and scalability, while educational institutions leverage its robust security and remote access features for faculty and students accessing campus networks remotely. These industries benefit from tailored policy management and comprehensive authentication integration to meet specific security and access needs.
We monitor all Network Access Control (NAC) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.