Its a quite a powerful tool .. You can do everything from Guest Portal to 802.1x Auth , MAB etc Review collected by and hosted on G2.com.
Initially its very tough to find out where is the right option located. The GUI is somewhat complicated Review collected by and hosted on G2.com.
Cisco ISE devices allow identity managers many facilities when making several authentication mechanisms interoperable, such as AAA + (Radius and Tacacs), Directory Services (Active Directory and LDAP). This interoperability allows a fast, centralized and easy deployment of an identity management for acces to a large number of devices and network services. It is easy to use and fully scalable Review collected by and hosted on G2.com.
The recommended use of an ISE device must be in an enterprise environment beacuse the license are expensive. For small companies in a high investment. And it is unlikely that they will take advantage of all their functionalities. Review collected by and hosted on G2.com.
I like the flexibility within the system for meeting/solving complex business access challenges. On top of that the logging is excellent Review collected by and hosted on G2.com.
I preferred the old policy sets in ISE 2.2 and below compared to the new look/feel in 2.3 and above. Review collected by and hosted on G2.com.
It’s ability to handle AAA and radius configurations for remote devices.
Also it’s feature set when coming to dot1x and and policy creation allows for a lot of different customization for allow, blocking, or restricting access to your network with either BYOD or enterprise machines. Review collected by and hosted on G2.com.
The user interactive is almost overwhelming when you first look at it. There’s a lot of different menus and a lot of hidden/unintuitive menus and settings. Review collected by and hosted on G2.com.
The product worked as expected without any issues. The systems integrated with minimal impact to our users. Cisco Support was superb and always willing to help with any roadblocks that were found with the product itself. The logging is very clear. Whenever users say they can't authenticate, the reason is immediatly listed in the logging dashboard. The policy configuration can also be done in any way you like. It's easy to structure and has quite a lot of predefined objects/actions. Review collected by and hosted on G2.com.
Requires 3rd party implementation initially and also updates tend to introduce other bugs and aren't always as useful as they would seem. Automatic profiling could be improved more. Licensing model--too granular and greedy. MDM integration is a separate cost per user, etc., and is unreasonably expensive. Review collected by and hosted on G2.com.
I love the endpoints identity page in the software - it's one of the most used features for me. Review collected by and hosted on G2.com.
I'm not a huge fan about the new way to navigate the software and general set-up they use for getting around the program. Review collected by and hosted on G2.com.
I like Authentication and Posturing features of the Cisco ISE. Review collected by and hosted on G2.com.
Bit complex implementation. NAM file etc has to be created and pushed in each managed endpoint. Review collected by and hosted on G2.com.
I am finding MANY devices, in both variety and host count, that I never realized were there before.
I can view policies without that policy getting corrupted, which is a very real danger with ACS. Review collected by and hosted on G2.com.
There is a learning curve and the current official training material is not up to date. Review collected by and hosted on G2.com.
Cisco ISE now competes with any other product in the space because of its centralized and unified highly secure access control with ISE. Cisco's support was also top notch. When we have questions they are always available and willing to help us! Review collected by and hosted on G2.com.
The learning curve is steep and the initial setup is complex and requires a 3rd party company. Review collected by and hosted on G2.com.
This product is excellent for TACACS and RADIUS authentication as well as profiling various devices on our network. Review collected by and hosted on G2.com.
At times the interface can be a bit clunky and resource intensive. Review collected by and hosted on G2.com.