We performed a comparison between Cisco ISE (Identity Services Engine) and NetIQ Identity Manager based on real PeerSpot user reviews.
Find out what your peers are saying about Cisco, HPE Aruba Networking, Forescout and others in Network Access Control (NAC)."The authorization and accounts inside of ISE are very useful for us."
"When we use ISE, one of the helpful things is that I can go through the dashboard and get every step along the way of how a device was authenticated. If it's failing, why did it fail? Why is it unauthorized? If there's an error, what is the error and how can I fix that error? If it's something that, if they should be passing, why are they failing?"
"The WiFi portal in Cisco ISE is very useful for WiFi customers."
"The RADIUS Server holds the most value."
"They have recently made a lot of improvements. My clients don't have much to complain about."
"Not having to trust devices and being able to set those levels of trust and more finely control our network is a benefit."
"Cisco ISE's profiling and posturing features ensure that all devices are compliant with regulatory authorities."
"The policy sets give us more granular groups for end-user access."
"I like the eDirectory feature."
"The most valuable features are Password Reset Alerts, Password Sync, and SQL connectors."
"The main value lies in the simplicity of implementation, as well as its customized look and feel."
"The most valuable feature of this solution has been the ability for us to integrate a lot of external systems, and the automatic transfer of a lot of identity information. Additionally, the customization is very good."
"The access request management has improved significantly in terms of its user interface. What sets it apart from competitors like SailPoint is that it's an event-based solution rather than schedule-based. That's a key differentiator."
"The product is easy to use."
"The most valuable feature of NetIQ Identity Manager for identity synchronization is the ability to provide users with all necessary access on day one through automated provisioning, facilitated by approval workflows."
"It's a very flexible tool, so you can synchronize multiple sources of data and you have multiple connections to various kinds of systems."
"Sometimes some of Cisco ISE's graphical interfaces could be a little bit smoother. However, with the different versions, the product is getting better and better."
"In order to make it a ten, it should be more user-friendly. You need somebody who is knowledgeable about it to use it. It's not easy to use. We have to rely heavily on technical support."
"They should improve their licensing. Licensing is always trouble with Cisco, and Cisco Identity Services Engine is no different. The way the product is licensed could be improved."
"There should be more visibility into TrustSec policy actions. When TrustSec blocks something or makes any kind of changes to the network, we don't always see that. We have to log into the switch itself, or we have to get some type of Syslog parsing to do that."
"I think some areas where ISE could be better are perhaps in the number of integrations that they offer from a virtual standpoint, as well as having a better and more comprehensive pathway for the customer to go from a physical environment to a virtual one."
"Some of the reporting could be improved."
"I don't like the fact that we can see the logs only for 24 hours. Maybe that happens because of the way we set it up."
"The price here in Brazil is very expensive."
"The interface is old and outdated, and the design software seems archaic."
"Areas for improvement are further enhancing the access granting process to reduce time and improve accuracy."
"It needs some modern features. They should improve and modernize their management interface. It has been created over years and by different persons. You can see different applications, different management consoles for different things. There should be an integrated interface."
"We have another system that is using the SAML system, and we also integrate with Active Directory only. If NetIQ Identity Manager can integrate directly, we would not need to use the Active Directory directory."
"If it could be operated in such a way that anybody could use it, with just the user interface, and there's no need for programming, then that would be a great improvement."
"NetIQ Identity Manager could improve by updating the user portal, it is out of date."
"The solution architecture is somewhat complex. For some components, the necessary resilience is not inherent."
"The integrations must be made easier."
More Cisco ISE (Identity Services Engine) Pricing and Cost Advice →
Cisco ISE (Identity Services Engine) is ranked 1st in Network Access Control (NAC) with 137 reviews while NetIQ Identity Manager is ranked 8th in User Provisioning Software with 17 reviews. Cisco ISE (Identity Services Engine) is rated 8.2, while NetIQ Identity Manager is rated 7.8. The top reviewer of Cisco ISE (Identity Services Engine) writes "Gives us that extra ability to assist the end user and make sure that we are making them happy". On the other hand, the top reviewer of NetIQ Identity Manager writes "If it works, Designer is a charm, but it can be a pain to keep updated". Cisco ISE (Identity Services Engine) is most compared with Aruba ClearPass, Fortinet FortiNAC, Forescout Platform, CyberArk Privileged Access Manager and Fortinet FortiAuthenticator, whereas NetIQ Identity Manager is most compared with SailPoint IdentityIQ, Microsoft Identity Manager, CyberArk Privileged Access Manager, Microsoft Entra ID and One Identity Manager.
We monitor all Network Access Control (NAC) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.