Find out what your peers are saying about Cisco, Hewlett Packard Enterprise, Fortinet and others in Network Access Control (NAC).
Direct comparisons with Forescout reveal up to 30% to 40% difference in cost savings.
I rate the technical support as one out of ten.
Sometimes it's challenging to identify which support team is responsible for certain issues, which is a significant concern.
Their resolution time is timely, and they provide solutions efficiently.
Factors like architecture, business nature, and legal limitations such as GDPR affect it.
There is a need to scale more effectively to accommodate a larger number of users and bulk users.
Regarding Fortinet FortiToken's scalability, we can purchase licenses according to our needs.
FortiToken is scalable and accommodates the needs for updates effectively.
The stability of Cisco Identity Services Engine (ISE) is poor for certain use cases, like authentication.
Cisco Identity Services Engine (ISE) is considered very reliable and stable.
FortiToken is stable, but there are some restrictions when it comes to supporting two-factor authentication in multi-factor environments.
The whole setup works well with Cisco access points and Cisco switches, but when you have multiple vendors in the environment, such as HP switches or access points like Aruba, you'll find they will not work well with Cisco Identity Services Engine (ISE).
Pricing can be more expensive compared to other vendors, and there is a significant price gap observed, which doesn't seem justified by some specific features.
Additionally, the product is vulnerable and has many bugs.
If I can receive it on email, it would be more flexible.
This would allow for broader distribution among a larger number of system admins and software engineers, which is currently not feasible with the existing hardware-only approach.
FortiToken should provide enhanced SMS services for those users who do not have smartphones.
Compared to other solutions like HPE ClearPass, Cisco is more costly, and the conversation suggests a possible forty percent price gap compared to competitors.
The license costs can range between $50,000 to $100,000 per year for enterprises.
The cost is about 100 million Ugandan shillings, which converts to approximately $30,000 per year.
Discounts are often provided to close deals, making it a cost-effective solution.
The pricing for FortiToken is not low; I regard it as medium-priced.
There is value because it helps us secure the network and prevents certain things from happening which could cause financial loss.
This solution ensures organizations have secure environments and also supports robust policy enforcement, allowing control over who has access to various parts of the network.
Cisco Identity Services Engine (ISE) is very good at device administration.
The main use case of FortiToken is that it is a hardware-based solution, providing secure two-factor authentication for administrators.
The solution is unique in catering to Fortinet, making it very useful and secure.
It is very user-friendly and easily integrates with various firewalls, making it convenient to use within diverse environments.
Cisco Identity Services Engine (ISE) offers comprehensive network access control and visibility, supporting features like 802.1X authentication, profiling, and posturing. It integrates with Microsoft and other Cisco products, facilitating robust security policies across distributed networks.
Cisco Identity Services Engine is a key player in network access control, offering centralized management and a user-friendly interface. It supports zero trust principles and provides strong authentication for wired and wireless networks. ISE's capabilities include granular security policies, enhanced device posturing, and seamless integration, bolstering security infrastructure. Users benefit from its dual authentication through EAP, simplifying access management across networks.
What are the key features of Cisco ISE?In industries like finance, healthcare, and education, Cisco ISE is pivotal for securing wired and wireless networks, implementing BYOD policies, and managing user access. Organizations leverage ISE for effective authentication and authorization, while maintaining compliance with industry security standards.
As we've seen, passwords alone don't keep unwanted guests out of your network. Password-only authentication has led to security breaches, malware infections, and policy violations. With two-factor authentication, a password is used along with a security token and authentication server to provide far better security. Authorized employees can remotely access company resources safely using a variety of devices, ranging from lpatops to mobile phones.
We monitor all Network Access Control (NAC) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.