

Find out what your peers are saying about Hewlett Packard Enterprise, Cisco, Fortinet and others in Network Access Control (NAC).
We also save money because we increased security, stopped incidents, and reduced breaches and security breaches.
Direct comparisons with Forescout reveal up to 30% to 40% difference in cost savings.
I rate the technical support as one out of ten.
Cisco support has pretty good teams for support and every time we had good answers and we could somehow solve the issues we had.
TAC support from Cisco is a notable feature; it provides very professional support.
You can run an all-in-one deployment and switch to distributed mode as your company grows, relying on Cisco Identity Services Engine (ISE) to support your scalability needs.
For a really big deployment, scalability could force you to deploy more complex architectures.
Factors like architecture, business nature, and legal limitations such as GDPR affect it.
The stability of Cisco Identity Services Engine (ISE) is poor for certain use cases, like authentication.
Cisco Identity Services Engine (ISE) is considered very reliable and stable.
Sometimes when we have upgrades or failovers with Cisco Identity Services Engine (ISE), we had some minor issues.
The whole setup works well with Cisco access points and Cisco switches, but when you have multiple vendors in the environment, such as HP switches or access points like Aruba, you'll find they will not work well with Cisco Identity Services Engine (ISE).
The log capacity in Cisco Identity Services Engine (ISE) could be enhanced because today natively on the ISE can only have a look at the logs from the day before.
Cisco Identity Services Engine (ISE) does not provide a legacy-based license.
The license costs can range between $50,000 to $100,000 per year for enterprises.
Compared to other solutions like HPE ClearPass, Cisco is more costly, and the conversation suggests a possible forty percent price gap compared to competitors.
Making large organizational costs significant.
Cisco Identity Services Engine (ISE) has positively impacted my organization by protecting our network from unauthorized access, providing guest access for our guests, managing all switches, and allowing us to implement TACACS on Cisco Identity Services Engine (ISE), where we can monitor the admins of the switches without needing to create admin accounts on every switch.
Cisco Identity Services Engine (ISE) offers authentication using RADIUS, enhancing network security by separating and segregating networks.
The adaptability of Cisco Identity Services Engine (ISE) policy enforcement can fit to the site we have depending on which kind of devices we have on site and then the needs for authentication, granting access and then assigning each device into its correct network for segmentation.
| Product | Market Share (%) |
|---|---|
| Cisco Identity Services Engine (ISE) | 22.4% |
| Aruba ClearPass | 21.6% |
| Fortinet FortiNAC | 16.1% |
| Other | 39.9% |
| Product | Market Share (%) |
|---|---|
| OpenText Identity Governance | 1.2% |
| SailPoint Identity Security Cloud | 14.6% |
| Microsoft Entra ID | 9.3% |
| Other | 74.9% |
| Company Size | Count |
|---|---|
| Small Business | 44 |
| Midsize Enterprise | 32 |
| Large Enterprise | 91 |
| Company Size | Count |
|---|---|
| Small Business | 9 |
Cisco Identity Services Engine offers robust authentication, posture profiling, guest and secure access, and dynamic policy management. Known for its seamless integration with Cisco tools and network access control features, it ensures secure device and user authentication across networks.
Cisco Identity Services Engine is renowned for its capabilities in managing authentication, guest access, and policy management through segmentation. Its TrustSec functionality, alongside RADIUS and TACACS+ support, provides enhanced security, further augmented by its ability to operate in diverse environments. Its scalability and integration with Cisco solutions aid in maintaining network visibility and access control. Challenges include the complexity of initial deployments, somewhat cumbersome documentation, and limited integration in multi-vendor environments. While encountering issues in stability and updates, the demand for better analytics and straightforward troubleshooting alongside cost-effective licensing is notable.
What are the key features of Cisco Identity Services Engine?Industries implement Cisco Identity Services Engine primarily for network access control, ensuring secure authentication and segmentation in both wired and wireless environments. Supporting policies like bring-your-own-device and compliance standards, ISE manages identity-based access control, especially beneficial for entities that require detailed user rights management and integration within enterprise networks.
OpenText Identity Governance provides robust access review capabilities, risk analysis, and intuitive dashboards. Its advanced role mining and dynamic grouping ensure efficient access management, supporting compliance through separations of duties.
OpenText Identity Governance enhances access management and auditing processes through features such as role mining, access certification, and separations of duties that support efficient management protocols. Though it excels in stability, scalability, and integration with Identity Management solutions, it requires improvements in installation, Workflow Designer, and cloud application connectors. Addressing stability issues and offering enhanced Identity Intelligence features are essential for competitive edge. The governance tool leverages automated reporting and approval workflows, aiding large environments in streamlining management tasks. Its ability to integrate closely with NetIQ Identity Manager facilitates internal audits, particularly in banking and governmental sectors.
What are the key features?OpenText Identity Governance sees deployment in industries like banking and government, where auditing and access management are critical. It aids in permission management and account discovery, utilized notably in regions such as Chile and Argentina. Organizations benefit from its integration with NetIQ Identity Manager to ensure proper account activation and deactivation, ultimately facilitating sector-specific compliance and auditing tasks.
We monitor all Network Access Control (NAC) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.