What do you like most about Cisco ISE (Identity Services Engine)?
Thanks for sharing your thoughts with the community!
We were originally a Cisco shop and Cisco ISE integrated well with our other Cisco switches and networks.
When you push out the policy, it is able to populate the entire network at one time.
It has all of the features available, in fact, more than what you need.
Typically, the installation is pretty simple.
The most valuable features are the NAC and the bundles that are available with Cisco ISE, such as Cisco ACS being integrated.
The ability to integrate our Cisco AnyConnect connections to the active directory has been great.
The way we can trust this solution is the most valuable. We have no issue with this product. It is a competitive product. You need to have a very good and deep knowledge of the product to take the full benefits of all the features, but it is a good product.
In terms of features, I think they've done a lot of improvement on the graphical user interface — it looks really good right now.
They have recently made a lot of improvements. My clients don't have much to complain about.
I like the guest access feature, which has been important for us.
Technical support is okay.
At the moment, ISE seems to integrate very well with a number of other technologies.
It is stable and easy to use.
One of the most important features is the authentication security for the individual connection to the network through their computer or laptop.
It's flexible and stable. It's been good as a standard environment to run.
The interconnection with the ecosystem and the ability to force rules all over the network are the most important features.
The most valuable feature is the integration with StealthWatch and DNA as one fabric.
The user experience of the solution is great. It's a very transparent system.
The implementation is very simple.
The solution cuts down on the repercussions of getting malware or ransomware.
The feature that I most like is that it can notify me whenever someone plugs in their device, which is not allowed. I get notifications for new laptop devices.
I think the user interface looks good compared to previous versions.
The features that do work, work well, and we use it on a daily basis.
The biggest value of ISE is that it can get so granular with gaming systems, versus IoT and BYOD.
Easy to use and provides good support
Using this solution gives us the ability to allow proper access to the network.
The best feature of the Cisco ISE platform is that it is compatible with Microsoft products.
Visitors can be granted access to the wifi network using their cellphones, notebooks or tablets in a very easy way. The ease of accessibility that anyone can have to the network is very quick and is a big improvement in our network.
In terms of scalability, you need to factor in your licenses. With a virtual platform, the scalability is more than sufficient. We have over one thousand users.
For guests we give them limited access to the internet when they come in so that access has been useful. Previously, we just used to give them the APN key which they would leave with. Now, we give them credentials to use that are for a limited period of time.
We found that the most valuable features associated with this tool are posture assessment, policy management, VLAN assignments, guest assignment, and BYOD services. In addition to these services, the Cisco IOS software switch configuration feature is another very valuable aspect of the policy and compliance solution.
After the product was installed, no one could access the secure connection network. In order for any laptop or any endpoint device to attach to my network, it needs to be authorized or be certified to be connected.
We have multiple metal devices from different places that use management, so we need to know who would be accessing all those devices and what changes are being done to those metal devices. With Cisco ISE we have visibility of all the changes happening on those devices.
The initial setup was easy. It took around one month. We did the installation part within half an hour to two hours but we found a couple of issues so we raised a case and once everything was resolved it was a month in total.
It is scalable because we use a network load balancer at the front of the PSN. It can be extended as we want to multiply. It's scalable to our environment. We have around 8,000 users and we are planning to expand it.
For device administration, all devices have multifactor authentication in collaboration with IT, so it secures access to all of our devices. For guest and wireless access, it's a matter of a lowly manager who we give access to the portal and he can assign access to the guests, so it's a very simple process now. It keeps the IT focusing on their work, and gives the business people the right access.
Which is better and why?
Let the community know what you think. Share your opinions now!