Try our new research platform with insights from 80,000+ expert users
reviewer1905522 - PeerSpot reviewer
Client Manager at a tech vendor with 10,001+ employees
Real User
Jul 7, 2022
We can deep dive into each employees' usage according to our infrastructure needs
Pros and Cons
  • "There are a lot of integrations available with multiple vendors. This has made the solution easier to work with."
  • "If you have someone taking care of it, it can be quite easy to manage the solution. Otherwise, if you don't look after it and take care of it day-to-day, then it will become more complex to run."

What is our primary use case?

We have been authenticating our company's employees and certifying that they are in compliance. We have to certify our employees in regards to compliance, having all the necessary protections in our infrastructure for their endpoints, notebooks, laptops, and mobile phones.

We have implemented it across the entire company in every area and department at every single level of our organization.

So far, it has been on-premises. We are still working to expand it to integrate with multiple cloud providers, like AWS.

How has it helped my organization?

We have become more reliable because we do not have any vulnerabilities coming into our network, which is important since a lot of employees are using their own endpoints to connect to our infrastructure.

Every other time that we have a new employee, we need to make sure they have been using the latest version of the solution in order to connect to our infrastructure.

We have made our company more secure. As an IT guy, I have gained more importance to my company.

What is most valuable?

It is more about the features related to Apex. This is part of the solution where we can deep dive into each employees' usage according to our infrastructure needs.

There are a lot of integrations available with multiple vendors. This has made the solution easier to work with.

We use the management platform, which makes it easy for our IT to access and manage. 

For how long have I used the solution?

We have been working with it for about 10 years.

Buyer's Guide
Cisco Identity Services Engine (ISE)
December 2025
Learn what your peers think about Cisco Identity Services Engine (ISE). Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,259 professionals have used our research since 2012.

What do I think about the stability of the solution?

If you have someone taking care of it, it can be quite easy to manage the solution. Otherwise, if you don't look after it and take care of it day-to-day, then it will become more complex to run. However, if you have someone taking care of it, maintenance is not that difficult.

What do I think about the scalability of the solution?

The scalability is good and quite easy to do. If you have the licenses, then anything is possible.

We worked with customers. The last one that we worked with had 10,000 licenses, i.e., 10,000 endpoints. We started working with the corporate office, then we replicate to the distribution centers.

How are customer service and support?

As an IT integrator, it is quite easy to work with their technical support. We have the correct people to deploy it as well as receive good support from the Cisco Technical Assistance Center. I would rate the support as 10 out of 10.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We have been using ISE for a while. We didn't have another solution beforehand.

How was the initial setup?

We had to do some labs beforehand, in order not to breach the environment. The deployment was not too complex.

When we work with customers, it takes four or five hours. We start with a specific environment, then we replicate to other areas.

What about the implementation team?

We are a reseller. My professional services implemented it, which includes a tech lead, engineer, senior engineer, and project manager to work with the solution.

It is an easy solution to implement with the correct partner.

What was our ROI?

It is difficult to measure security breaches, but since we have not been attacked so far, it has paid for itself over the years.

Which other solutions did I evaluate?

We worked with Fortinet to look at their solution, but ISE was more reliable and had more integration with our product vendors. Also, it had a more affordable cost.

When compared with other vendors, like Forescout, for what we need, ISE has been more usable and accessible.

What other advice do I have?

Learn about the solution, then evaluate what devices it would be implemented with. I would amalgamate the devices and their versions with a systems integrator or partner who already has experience and will try only to replicate it, not to reinvent the wheel.

Part of our journey is getting everybody connected to the infrastructure and trying to avoid any breaches. We don't want to be vulnerable.

I would rate the solution as 10 out of 10.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller.
PeerSpot user
reviewer1895544 - PeerSpot reviewer
ITS 1 at a government with 10,001+ employees
Real User
Jul 3, 2022
Keeps people who shouldn't be on our network off our network
Pros and Cons
  • "We have seen ROI. It has done its job. It has protected us when we needed it to."
  • "I would definitely improve the deployment and maybe a little bit of the support. Our first exposure to ISE had a lot of issues."

What is our primary use case?

We use it as our complete NAC solution for both on the wire and wireless as well as guest wireless access and SGTs.

We have five hospitals. We have two service policy nodes at every hospital. We have a deployment at every hospital site.

How has it helped my organization?

We are a healthcare department. We deal with a lot of PHI so ISE is important. It is an integral part of keeping PHI safe.

The solution has helped with safety and keeping people who shouldn't be on our network off our network.

Cisco ISE works very well for establishing trust for every access request when it is deployed and running correctly. It is a great product. It does what it is supposed to do.

We know what is on our network because ISE is able to tell us.

What is most valuable?

The guest wireless works pretty smoothly. The SGTs came in very handy when we had to segregate traffic away from our network, even though it is part of our network. 

The SGT function would probably be the most used. This is mainly because we have a lot of vendors on our campuses but we need to keep them from seeing the traffic and being able to touch other areas of our network. Being able to use SGTs kind of keeps them in their own little lane away from us.

When it is deployed correctly, it is very helpful. It runs smoothly. It is just integrable to what we do.

What needs improvement?

I would definitely improve the deployment and maybe a little bit of the support. Our first exposure to ISE had a lot of issues. However, I have noticed as we have been implementing patches and upgrades that it has gotten a lot better.

For how long have I used the solution?

I have been using it for about four years.

What do I think about the stability of the solution?

With patches and a little bit of babysitting, it is totally stable now.

What do I think about the scalability of the solution?

It is easily scalable.

How are customer service and support?

The technical support is phenomenal. I have called and opened up a ton of tech cases. Eventually, you get the right engineer who can solve all your problems. I would rate them as eight or nine out of 10. It has gotten a lot better. If someone asked me about support two or three years ago, I would have probably given them five out of 10.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We didn't use a solution before ISE.

What was our ROI?

We have seen ROI. It has done its job. It has protected us when we needed it to.

What other advice do I have?

Make sure you have everything ready, including all your information. Make sure you know what you will profile and what will come on your network.

Get hardware nodes versus the VMs.

You definitely want resilience. You want to keep everything protected, especially in the day and age that we live in now. Information is power. Keeping our customers' and patients' information safe is our number one priority.

I would rate it as nine out of 10 because it has gotten better. I have seen it at its worst. Now, it is running a lot better. So, I have a better opinion of it than I did.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Cisco Identity Services Engine (ISE)
December 2025
Learn what your peers think about Cisco Identity Services Engine (ISE). Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,259 professionals have used our research since 2012.
Sait Kilinc - PeerSpot reviewer
Manager of IT at a financial services firm with 10,001+ employees
Real User
Jun 27, 2022
Enables us to control certificates of each device, preventing unauthenticated devices from entering our network
Pros and Cons
  • "The access policies, and all of the policies in Cisco ISE, are important to us."
  • "The user interface could be more user-friendly."
  • "The pricing is fair."

What is our primary use case?

We use it for the identification of our devices, users, and wireless users.

How has it helped my organization?

Unauthenticated devices are not allowed on our network and that has been an improvement for our company. With Cisco ISE, we control the certificates of each device so that devices have internet access. The solution has eliminated trust from our network architecture.

What is most valuable?

The access policies, and all of the policies in Cisco ISE, are important to us.

What needs improvement?

The user interface could be more user-friendly.

For how long have I used the solution?

I have been using Cisco ISE (Identity Services Engine) for about six years.

What do I think about the stability of the solution?

The stability has been perfect. Our company has been using it for more than 10 years and it's stable. It's really good.

What do I think about the scalability of the solution?

The scalability is also good.

How are customer service and support?

The customer service has been perfect.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not have a previous solution.

What's my experience with pricing, setup cost, and licensing?

The pricing is fair. We have a base license and an OpEx license.

Which other solutions did I evaluate?

We looked at other solutions, but that was a long time ago.

What other advice do I have?

I would recommend ISE to colleagues. We are happy with it and we want to use it in the cloud, next. Our on-prem devices go end-of-support in 2023 and we will try to use it on the cloud.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Andres Lopera - PeerSpot reviewer
Technical Leader at a retailer with 1,001-5,000 employees
Real User
Jun 23, 2022
We are very secure now because only corporate endpoints can be authenticated on our wireless
Pros and Cons
  • "Authentication is the most valuable feature because it puts our company at another level of security."

    What is our primary use case?

    We use it for MAC Authentication Bypass, 802.1X authentication, and certification and validation against Active Directory. Because MAC devices can't be enrolled in the domain, we were doing a manual installation of certificates.

    How has it helped my organization?

    We are a very secure enterprise now because only our corporate endpoints can be authenticated on our wireless. Before, any device could be connected to our production network. And the corporate endpoints have antivirus and anti-malware. Things are more and more secure.

    What is most valuable?

    Authentication is the most valuable feature because it puts our company at another level of security. It establishes trust for every access because we use only corporate endpoints. If somebody has another device, they can't connect it to the enterprise network because we haven't implemented bring-your-own-device yet. We have five warehouse buildings and all our operations are around logistics and that means external people don't come to our buildings.

    For how long have I used the solution?

    I have been using Cisco ISE (Identity Services Engine) for three years.

    What do I think about the stability of the solution?

    It's very stable.

    What do I think about the scalability of the solution?

    It's expensive to scale Cisco ISE, but our situation is stable so we don't need to scale it for now. In the future, we will need a more scalable solution.

    It is used for all our departments, all end-users, all corporate endpoints. And when we use MAC Authentication Bypass, we include printers and VIP cell phones.

    How are customer service and support?

    Tech support is very good.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We didn't have a previous solution.

    How was the initial setup?

    The deployment was a little complex, but not because of the solution. It was more an issue for our people because it was a mindset change.

    It took us about six months to deploy. Because we didn't have a previous solution, we just deployed it one department at a time across our four departments.

    What about the implementation team?

    We used an integrator, ITS Infocom. Experience-wise, it was very good. On our side, we had three people involved. 

    What was our ROI?

    Since implementing Cisco ISE, we haven't had any attacks against our application.

    What's my experience with pricing, setup cost, and licensing?

    Pricing is not a problem for Cisco because it has a lot of features and not much competition, although it's more expensive than other products. But if I do a cost-benefit analysis, Cisco provides high quality.

    Which other solutions did I evaluate?

    We looked at Aruba. Cisco ISE is much better.

    What other advice do I have?

    Be patient with the implementation. It can be very difficult for the clients, the people using it, because it requires a change of mindset.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Chinthaka Kannangara - PeerSpot reviewer
    Network System Engineer at a tech services company with 201-500 employees
    Real User
    Feb 1, 2022
    Allows you to control or restrict access on your network and has a scalable licensing structure
    Pros and Cons
    • "The best features are the scalability and the license structure."
    • "The licensing documentation needs to be better."

    What is our primary use case?

    The solution is used for controlled access in the network, like if you want to restrict access.

    The solution is deployed on-prem. I am an integrator of this solution.

    What is most valuable?

    The best features are the scalability and the license structure. The license structure is like a tier. If a customer doesn't actually want the highest features, then they can just start with the basic license package and upgrade it if their network is growing. For the smaller customers, they can start with the smaller plans and so on. If you have a financial customer or banking customer, they can go for the full features, and if it's not that critical, the customer can get the basic license package and implement that.

    What needs improvement?

    The licensing documentation needs to be better. We found some old documents describing the license names, like the Base license and Apex license. Cisco used both names. We have found that they changed the Advantage license and Premier License. If someone misunderstands that, they might end up with a hassle. I don't know if it's possible or not for Cisco to remove the older documents from the official website.

    For how long have I used the solution?

    We have been working with this solution for more than two years.

    We were using two solutions on Cisco's network, so we had a few ISE plans in that network.

    What do I think about the stability of the solution?

    The solution is stable. We have maybe 4,000 users for the Next solution.

    How are customer service and support?

    We haven't used technical support very much, but in general, Cisco's support is always responsive.

    How was the initial setup?

    Initial setup was straightforward from our point of view because we have engineers who did that, so of course it was not an issue with us.

    The accesses took maybe three or four months to complete, but the Next part took about three weeks.

    For deployment and maintenance, the team was average sized. You need to follow the correct documents for deployment. There can be misunderstandings if you use old documentation.

    What's my experience with pricing, setup cost, and licensing?

    The licensing is subscription-based and based on the user account.

    What other advice do I have?

    I would rate this solution 8 out of 10. 

    I would recommend this solution.

    If someone is looking for a concrete solution to control the access, then ISE is a better solution.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer. Integrator
    PeerSpot user
    IT Security manager at a energy/utilities company with 201-500 employees
    Real User
    May 20, 2021
    An authentication solution we can trust
    Pros and Cons
    • "The ability to integrate our Cisco AnyConnect connections to the active directory has been great."
    • "It would be nice if it could be configured easily by default."

    What is our primary use case?

    This solution ties into our Cisco Duo and Cisco AnyConnect connections to help us authenticate against the active directory and Cisco Duo multifactor authentication. It takes metrics about the connections that are connecting it and allows us to set up a rule against them. For instance, if a Windows device is not all the way up to date, we can put a message up that says, "Before you're able to connect, please do your Windows updates as they haven't been done in six months."

    As this solution allows AnyConnect to authenticate with the active directory in the backend, the users won't directly use it. Still, it will be in use throughout the login process into Cisco AnyConnect as a source of authentication.

    With this solution, we don't require anyone for maintenance.

    What is most valuable?

    The ability to integrate our Cisco AnyConnect connections to the active directory has been great. Also, as a source of authentication during the process of logging into Cisco AnyConnect has been very useful for us. 

    What needs improvement?

    It perfectly does everything we have been looking for it to do. I have not discovered any feature sets or items that are lacking. It's a much more functional product than the old Cisco ACS that it replaced. 

    That being said, during deployment, they shipped us the Cisco ISE with the 3.1 operating system, which was incompatible with the license that we had purchased, which would only allow us to go up to version 2.9. Because of this, we actually had to do a factory reset and a reload to the operating system — to an older version of the operating system. This required a very extensive process. We had to take out the Cisco ISE and put it into a factory reset mode to get it to roll back to the old operating system. If we were doing an upgrade, this would have been very simple, but as we were doing a downgrade, it was extremely complex and very labor-intensive. I was crawling through the server room, through wires, to plug things in, to get it to connect in the way that it needed to be connected with an external device in order to actually get it to roll back.

    I don't like that the licensing structure doesn't allow us to have the 3.1 operating system — it forces us to use version 2.9. If you don't want to pay a monthly or a yearly subscription fee, either that device should have come automatically with the 2.9 version operating system, or it should have been much easier to actually roll it back. Additionally, support should have realized that our license requires us to have the 2.9 operating system instead of the 3.1 operating system, which would have saved us a lot of time. 

    It would be nice if it could be configured easily by default. If you're configuring a Cisco device, you pretty much need the support of a CCNA-level technician to be able to do it. It would be nice if there was a default or a more simple way to do it. It's not really a requirement to use the device because you can purchase the premium support or you could get a CCNA in-house to do it. Just having that ability to say, "Hey, we want to set this up" without too many complications or without having to bring in support would be nice. 

    For how long have I used the solution?

    We've only been using this solution for the past three months. 

    What do I think about the scalability of the solution?

    The scalability reports that we could easily handle a million users. 

    How are customer service and technical support?

    I have been extensively involved with their technical support; their technical support is very good. They're more than willing to just jump on and do things for you. My only complaint is that at one point, we were trying to configure our single channel for Cisco Duo to be able to perform a password reset. Whenever we needed to look closely at another device, the support technician would say, "Hold on, let me bring in my expert on VPN; hold on, let me bring in my expert on Cisco ASA." We basically had to wait until we were able to get the Cisco Duo support agent, the Cisco ASA support agent, the Cisco VPN support agent, and the Cisco ISE support agent — all in the WebEx meeting at the same time.

    As far as I'm to understand, there are CCNAs that should have been able to do it, but they brought in the experts from each item instead of just directly doing it themselves — this made the whole process take longer. Still, they were able to do everything in a way that did not affect our live environment, even though it was on the same device. That was actually very nice because it meant that we could do it in the middle of the day instead of having to do things in the middle of the night.

    How was the initial setup?

    The initial setup was very simple. Everything was set up within an hour thanks to assistance from the onboarding teams from Duo and Cisco, and our network administrator. They got it set up and reviewed a bunch of options with us. It was a very easy and nice process.

    What about the implementation team?

    Implementation was achieved with in-house resources and premium onboarding support. The entire process only took an hour.

    What's my experience with pricing, setup cost, and licensing?

    We are running version 2.9 because version 2.9 of the ISE has a persistent license —it's a one-time payment. The latest version (3.1) is only available if you do a yearly subscription.

    It's a licensed physical device; there is no subscription. If you want the latest operating system, then you'll need to get an annual license.

    What other advice do I have?

    If you're planning on using this solution, my advice is to be sure you review the full feature set available and select what is important to your users. This way you'll be able to ensure that you'll have everything you want and need.

    Overall, on a scale from one to ten, I would definitely give this solution a rating of nine. 

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Md Manirul Islam - PeerSpot reviewer
    Assistant general manager at a tech services company with 51-200 employees
    Real User
    Nov 30, 2023
    Highly-Recommended Solution with Commendable Integration Capabilities
    Pros and Cons
    • "The valuable feature of the solution lies in its integration capabilities with other applications."
    • "The tracking mechanism in Cisco ISE is relatively costly, especially its vendor-specific protocol."

    What is our primary use case?

    We primarily use the solution for network access control solution and network device access management. The solution comes with features like posturing.

    What is most valuable?

    The valuable feature of the solution lies in its integration capabilities with other applications. This facilitates seamless operations like Microsoft migration across networks and call center management. The ability to segregate multiple domain users in the Access Network ensures efficient, logical management.

    What needs improvement?

    The tracking mechanism in Cisco ISE is relatively costly, especially its vendor-specific protocol. It would be beneficial if it could support open source or other devices with a similar checking mechanism, but unfortunately, it remains proprietary.

    For how long have I used the solution?

    I have been working with the solution for the past five years.

    What do I think about the stability of the solution?

    The solution is highly-stable. I rate it a perfect ten.

    What do I think about the scalability of the solution?

    The solution is scalable. We have three users for the Cisco ISE.

    How are customer service and support?

    Their customer service and support is excellent.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    The setup is straightforward. Effective planning is crucial for the setup of Cisco ISE. Placement of the virtual solution requires careful consideration of network accessibility from all branches. Different components may need placement in various areas in a large network. So, thoughtful planning for the architecture is important. It takes around two days for the deployment.

    What's my experience with pricing, setup cost, and licensing?

    Previously, Cisco ISE had a perpetual licensing model, but now they have shifted to a subscription-based licensing system. We now have to pay recurring costs. This change in the pricing model has presented challenges for many customers accustomed to the simplicity of the previous licensing model.

    What other advice do I have?

    I recommend this solution to all. Overall, I rate it a perfect 10.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
    PeerSpot user
    reviewer2212527 - PeerSpot reviewer
    IT Architect at a tech services company with 501-1,000 employees
    Real User
    Jun 21, 2023
    Enabled features that were not present or possible before but it needs a lot of resources to run
    Pros and Cons
    • "For customers, it's great. It has a GUI, so the customers themselves can edit ACLs or even modify the policies. It's also an all-in-one solution with RADIUS and TACACS."
    • "I'm frustrated by the resource consumption and how many resources it needs to run. It takes a lot of RAM. It takes a lot of space and a lot of IO power. It's frustrating to do upgrades because it takes a long time."

    What is our primary use case?

    At first, Cisco ISE was a replacement for only ACS RADIUS. It was mostly for remote access VPNs and Wi-Fi. That was it, and later, it evolved into a complete ACS replacement, so it's for both TACACS and RADIUS. Nowadays, we also deploy .1X quite a lot. 

    How has it helped my organization?

    It was a driver towards .1X. With the features that were there on the network side and the features that were there with Cisco ISE, it was way easier to go to .1X.

    It's the brain of many things. It's the brain for VPNs. In Cisco ISE, we control where the users are allowed to go. Customers are able to do that by themselves. It's the same for .1X. It's the heart of security.

    Cisco ISE improved our cybersecurity resilience. It enabled features that were not present or possible before.

    What is most valuable?

    For customers, it's great. It has a GUI, so the customers themselves can edit ACLs or even modify the policies. It's also an all-in-one solution with RADIUS and TACACS.

    What needs improvement?

    I'm frustrated by the resource consumption and how many resources it needs to run. It takes a lot of RAM. It takes a lot of space and a lot of IO power. It's frustrating to do upgrades because it takes a long time. Things are at a much smaller scale where we are than in the US. We even have smaller virtualization farms, so it takes a considerable amount of power and resources.

    For how long have I used the solution?

    We've been using this solution since its initial release. It was probably version 1.1 or 1.2.

    How are customer service and support?

    I don't remember opening a case for Cisco ISE except for the licensing problems, but several years ago, it took some time for people to get to the right way to solve the problem. I am not sure whether it was my inability to clarify the situation or whether it was a matter of poor training, but it was sometimes very painful.

    How was the initial setup?

    I've been working with this product for a while. It doesn't seem difficult. However, in terms of resources, it takes a while to get it running. I don't think it's necessary to be so resource-consuming and slow. That makes it complicated. 

    What's my experience with pricing, setup cost, and licensing?

    Pricing is where things got a bit more complicated. Previously, it was a one-time purchase and we just had to renew support. These days, there's a subscription model, which is supposed to be easier and cheaper as well, but it's more pricey. Customers are aware of that, and many vendors are going the same way. They are trying to go along with the new model.

    Which other solutions did I evaluate?

    We did consider other products, but it didn't make sense to go for any competing vendor because of the integration with other Cisco products. AnyConnect is the best VPN product I am aware of, and that's usually why we stick with Cisco.

    We also sell HPE products. We've deployed some HPE RADIUS solutions, but we prefer Cisco these days.

    What other advice do I have?

    To someone researching this solution who wants to improve the cybersecurity in their organization, I would tell them to first think about what they are trying to achieve and then think about Cisco ISE as a tool. It isn't a turnkey solution.

    It hasn't saved our IT staff's time. It was something that wasn't present before. It's an evolution that is necessary, but I wouldn't say it saves time.

    It did help us consolidate any tools or applications. It was either a replacement of some legacy products or it was an improvement where it introduced new features that were not present before, but it didn't help get rid of some of the other products. It was a new thing to place into the network.

    Overall, I'd rate Cisco ISE a six out of ten.

    Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
    PeerSpot user
    Buyer's Guide
    Download our free Cisco Identity Services Engine (ISE) Report and get advice and tips from experienced pros sharing their opinions.
    Updated: December 2025
    Buyer's Guide
    Download our free Cisco Identity Services Engine (ISE) Report and get advice and tips from experienced pros sharing their opinions.