Listing Thumbnail

    Cisco Identity Services Engine (ISE)

     Info
    Deployed on AWS
    Cisco ISE on AWS provides secure network access control for IoT, BYOD, and corporate owned endpoints. Cisco ISE enables you to easily segment network access for employees, contractors, and guests across wired, wireless, and VPN connections to reduce risks and contain threats.
    4.4

    Overview

    Cisco Identity Services Engine (ISE) on AWS enables Network Access Control (NAC) service workloads to be deployed and managed from the cloud while ensuring the flexibility required to meet each organizations unique cloud strategy. With Cisco ISE on AWS, you can unify the policy management of your organization for endpoint access control and network device administration. Cisco ISE is equipped with rich APIs to automate policy and lifecycle management, bringing ease of deployment and automation to the forefront of your NAC operations.

    For GovCloud users launching directly from CloudFormation, please retrieve the Cisco Identity Services Engine (ISE) - GovCloud deployment template from the listing detail page linked below. https://aws.amazon.com/marketplace/pp/prodview-uvsybra7r3iug 

    For more information on Cisco ISE, please visit http://www.cisco.com/go/ise 

    Highlights

    • Gain visibility with context and control: Know who, what, where, and how endpoints and devices are connecting to your network to ensure compliance and limit risk, with or without the use of agents.
    • Extend zero trust to contain threats: Software-Defined Network segmentation shrinks the attack surface, limits the spread of ransomware, and enables rapid threat containment.
    • Accelerate the value of existing solutions: Integrate with other Cisco and third-party solutions to bring an active arm of protection into passive security solutions and increase your return on investment (ROI).

    Details

    Delivery method

    Delivery option
    Cisco Identity Services Engine (ISE)
    64-bit (x86) Amazon Machine Image (AMI)
    Cisco Identity Services Engine (ISE) - GovCloud

    Latest version

    Operating system
    Rhel 8

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Cisco Identity Services Engine (ISE)

     Info
    Pricing and entitlements for this product are managed through an external billing relationship between you and the vendor. You activate the product by supplying a license purchased outside of AWS Marketplace, while AWS provides the infrastructure required to launch the product. AWS Subscriptions have no end date and may be canceled any time. However, the cancellation won't affect the status of the external license.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Vendor refund policy

    Please contact your Cisco Sales Team for refund or cancellation policy information

    Custom pricing options

    Request a private offer to receive a custom quote.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    64-bit (x86) Amazon Machine Image (AMI)

    Amazon Machine Image (AMI)

    An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.

    Version release notes

    https://www.cisco.com/c/en/us/td/docs/security/ise/3-4/release_notes/b_ise_34_RN.html 

    In ISE 3.4 Patch 4, support has been added for the following instance types:

    • c7i.4xlarge
    • m7i.2xlarge
    • m7i.8xlarge
    • m7i.16xlarge

    Additional details

    Usage instructions

    For instructions on how to install Cisco ISE using an AMI, see the following Cisco ISE Installation Guide: https://www.cisco.com/c/en/us/td/docs/security/ise/ISE_on_Cloud/b_ISEonCloud/m_cisco_ise_on_aws_pc.html 

    Support

    Vendor support

    BYOL: Cisco TAC provides support based on purchased licenses and support contract from Cisco or an authorized Cisco Reseller

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    4.4
    98 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    26%
    65%
    7%
    2%
    0%
    0 AWS reviews
    |
    98 external reviews
    External reviews are from G2  and PeerSpot .
    Mohamed Fouad

    Zero trust access has protected our network and posture checks now control every device joining

    Reviewed on Dec 22, 2025
    Review provided by PeerSpot

    What is our primary use case?

    My main use case for Cisco Identity Services Engine (ISE)  is providing MAC technology and Network Admission Control, which allows us to enforce authentication for users as we implement Zero Trust for cybersecurity to enhance our cybersecurity.

    Also, the great feature of Cisco Identity Services Engine (ISE)  is using posture, which allows us to deploy conditions per the device or checklist for any request to join a device to our network and also profiling.

    For a specific example of how I'm using Cisco Identity Services Engine (ISE) for network admission control or posture assessment in my environment, we have implemented the AAA and 802.1X integrating Cisco Identity Services Engine (ISE) with our edge switches, so any user wanting to join the network must first enter a username and password from the domain controller. After this, the switch will ask Cisco Identity Services Engine (ISE) for this user, and Cisco Identity Services Engine (ISE) will ask the domain controller if this user already exists or not. Based on the existence of the username and password provided, we can permit or deny access. We are also providing posture assessment on the device, checking if antivirus is enabled, the version of antivirus, and if it is updated or not, along with whether it is allowing our service, for example, confirming if the required service is open or disabled. After evaluating these conditions, we either allow the device to join our network or deny access.

    What is most valuable?

    The best features that Cisco Identity Services Engine (ISE) offers are its usability. MAC solution or MAC technology and Network Admission Control as a native technology are very difficult, but Cisco Identity Services Engine (ISE) makes it easier for users to have MAC technology with a simplified GUI and a stable product.

    The GUI and usability stand out for me compared to other solutions I've seen, such as Meraki and ClearPass  from HP.

    Cisco Identity Services Engine (ISE) has powerful integration capabilities, and we have already integrated it with WSA, also implementing the PXGrid feature from Cisco to enhance integration with our WSA and ESA .

    Cisco Identity Services Engine (ISE) has positively impacted my organization by protecting our network from unauthorized access, providing guest access for our guests, managing all switches, and allowing us to implement TACACS on Cisco Identity Services Engine (ISE), where we can monitor the admins of the switches without needing to create admin accounts on every switch.

    What needs improvement?

    Cisco Identity Services Engine (ISE) could be improved by allowing us to switch back to the legacy license, as the new license model is more complicated, and Cisco Identity Services Engine (ISE) does not provide a legacy-based license.

    For how long have I used the solution?

    I have been using Cisco Identity Services Engine (ISE) for about six months.

    What do I think about the stability of the solution?

    The most powerful benefit of Cisco Identity Services Engine (ISE) is its stability.

    What do I think about the scalability of the solution?

    The most notable aspect of Cisco Identity Services Engine (ISE) is its scalability. You can run an all-in-one deployment and switch to distributed mode as your company grows, relying on Cisco Identity Services Engine (ISE) to support your scalability needs.

    How are customer service and support?

    TAC support from Cisco is a notable feature; it provides very professional support, and you can rely on them to resolve issues effectively. I would rate the customer support a ten.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    Cisco Identity Services Engine (ISE) is the only solution I have used.

    How was the initial setup?

    I have noticed measurable improvements in security and efficiency since implementing Cisco Identity Services Engine (ISE), as we have increased security significantly compared to before and everything has changed in security after we implemented it.

    What was our ROI?

    I have seen a return on investment as we save time controlling all switches using Cisco Identity Services Engine (ISE) TACACS, and we also save money because we increased security, stopped incidents, and reduced breaches and security breaches.

    What's my experience with pricing, setup cost, and licensing?

    My experience with pricing, setup cost, and licensing indicates that the legacy license of Cisco Identity Services Engine (ISE) is more usable and affordable. I believe Cisco needs to reconsider their new license model.

    Which other solutions did I evaluate?

    I did not evaluate other options before choosing Cisco Identity Services Engine (ISE).

    What other advice do I have?

    My advice for others looking into using Cisco Identity Services Engine (ISE) is to be well-prepared before implementing a MAC solution by checking all of Cisco Identity Services Engine (ISE)'s features and deciding what you want to implement, such as posture, profiling, or access control with 802.1X. The GUI and usability stand out for me compared to other solutions I've seen, such as Meraki and ClearPass  from HP. I would rate this review a ten overall.

    NicolasFigaro

    Has improved authentication management and simplified visitor network access

    Reviewed on Oct 07, 2025
    Review provided by PeerSpot

    What is our primary use case?

    I am working with switches, wireless, and SD-WAN solutions, but regarding the opinion itself, it depends what one would like to get.

    For what we do, the most useful feature in Cisco Identity Services Engine (ISE)  is RADIUS authentication. We are using the guest portal as well, the Wi-Fi guest portal capability from Cisco Identity Services Engine (ISE) .

    The Wi-Fi guest portal feature allows us to give access to non-company devices on the locations we have for visitors.

    We use the Cisco Identity Services Engine (ISE) profiling feature to onboard new devices whenever they're connected and assign them the correct profiles. It was mostly used when the ISE was deployed, but it's still used.

    The adaptability of Cisco Identity Services Engine (ISE) policy enforcement can fit to the site we have depending on which kind of devices we have on site and then the needs for authentication, granting access and then assigning each device into its correct network for segmentation.

    For what we're doing so far, it's quite easy for us; we are not doing too much complicated stuff, so it's quite easy for us to onboard a new site into the current policy we have.

    What is most valuable?

    The most useful feature in Cisco Identity Services Engine (ISE) is RADIUS authentication. We are using the guest portal as well, the Wi-Fi guest portal capability from Cisco Identity Services Engine (ISE).

    The Wi-Fi guest portal feature allows us to give access to non-company devices on the locations we have for visitors.

    We use the Cisco Identity Services Engine (ISE) profiling feature to onboard new devices whenever they're connected and assign them the correct profiles. It was mostly used when ISE was deployed, but it's still used.

    The adaptability of Cisco Identity Services Engine (ISE) policy enforcement can fit to the site we have depending on which kind of devices we have on site and then the needs for authentication, granting access and then assigning each device into its correct network for segmentation.

    For what we're doing so far, it's quite easy for us; we are not doing too much complicated stuff, so it's quite easy for us to onboard a new site into the current policy we have.

    Cisco Identity Services Engine (ISE) has simplified guest access management for us without compromising security for our organization.

    What needs improvement?

    The log capacity in Cisco Identity Services Engine (ISE) could be enhanced because today natively on the ISE can only have a look at the logs from the day before. You cannot search into the oldest logs; you have to use another tool for that. This can be blocking if you don't have any log consolidation solution. To do a search for an issue or something that happened two days ago, you cannot search directly in there.

    The capacity of Cisco Identity Services Engine (ISE) could be enhanced.

    Something between one week and one month for the log capacity would be nice.

    What do I think about the stability of the solution?

    Sometimes when we have upgrades or failovers with Cisco Identity Services Engine (ISE), we had some minor issues. It took something around two or three days before it came back to a stable situation.

    What do I think about the scalability of the solution?

    For the size of our company, Cisco Identity Services Engine (ISE) is a scalable solution. It's working fine.

    It's working fine because we are using many other Cisco products, so the interaction between Cisco tools is fine. However, you can have some latency issues depending on where your devices are. We don't have many devices spread on other geographies than EMEA; we have some of them in APAC, but for a really big deployment, scalability could force you to deploy more complex architectures. In this case, that would be the only drawback.

    How are customer service and support?

    I have contacted Cisco support.

    Their support is really good. Cisco support has pretty good teams for support and every time we had good answers and we could somehow solve the issues we had.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    The setup of Cisco Identity Services Engine (ISE) was done by a third party, by a subcontractor. It would be hard for me to tell you how easy or not it was because the person was used to deploy this product already, but it wasn't that long, so we migrated from the previous environment to the current one we are using. Deployment or upgrade was quite acceptable.

    Setup and migration of Cisco Identity Services Engine (ISE) took something around two weeks because this one is handling all the authentication we have worldwide. We took our time to make sure that migration was fine and we also merged. We had separated ISEs before, so we merged into a consolidated one, which is why it took more time.

    What other advice do I have?

    I haven't faced any other kind of issues or difficulties with Cisco Identity Services Engine (ISE).

    The biggest benefit of Cisco Identity Services Engine (ISE) as a product for me is that it is stable and reliable.

    On a scale of 1-10, I would rate Cisco Identity Services Engine (ISE) a 9.

    Bisrateab G.

    3 years of hands-on experience as an administrator managing Cisco Identity Services Engine (ISE) .

    Reviewed on Sep 19, 2025
    Review provided by G2
    What do you like best about the product?
    With 3 years of experience administering Cisco ISE, I find its biggest strengths are centralized access control, strong security enforcement, and clear visibility into network activity. It simplifies managing user, device, and guest access while integrating well with other security tools to strengthen overall network defense.
    What do you dislike about the product?
    he VPN gateway must be properly configured to prompt for and process password changes, since Cisco ISE only validates credentials against the identity source. If this setting is not enabled on the VPN device (such as ASA/FTD with AnyConnect), users won’t see a prompt to update expired passwords, even if Active Directory allows the change.
    What problems is the product solving and how is that benefiting you?
    Cisco ISE solves the challenge of controlling who and what connects to the network by providing centralized authentication, authorization, and accounting (AAA). It gives visibility into users and devices, enforces consistent security policies, and streamlines guest and BYOD access. For me as an admin, this means fewer security gaps, easier policy management, and stronger protection of critical resources without having to manage multiple disconnected tools.
    Rajesh K.

    Vulnerability enggine

    Reviewed on Jul 17, 2025
    Review provided by G2
    What do you like best about the product?
    Dynamic and context-aware access policies based on user, device type, time, and location.

    Profiling and posture assessment for both managed and unmanaged devices.

    Centralized policy management that scales across large distributed networks.
    What do you dislike about the product?
    Complexity in Configuration and Policy Design:
    ISE has a steep learning curve. Setting up policies—especially for large environments with multiple identity sources and posture checks—can become complex and time-consuming.
    What problems is the product solving and how is that benefiting you?
    Unauthorized Access Control
    It ensures that only authenticated and authorized users/devices can access specific network segments—reducing insider threats and lateral movement.
    John Ntambi

    Network access controls and policy management increase security visibility and control

    Reviewed on Jun 25, 2025
    Review provided by PeerSpot

    What is our primary use case?

    We use it for network access control.

    It isolates the bring your own devices and the guests from the corporate network. It also segregates connections when a user comes in and connects. There is a certain profile review that goes on to confirm that the device is allowed to access resources on the network.

    What is most valuable?

    The policies allow us to enforce certain rules on the network to be able to screen our users more effectively. It allows us to have more visibility to what the users are trying to do on the network, which really helps us know how to control them.

    There is value because it helps us secure the network and prevents certain things from happening which could cause financial loss. This demonstrates good value for money.

    What needs improvement?

    They should make their integrations with other manufacturers less restrictive. They should work on their integration with other vendors.

    The integrations with the switches and the wireless controllers are not really straightforward. There is what they call the best practice for them, but it may not be what we have on-premise. We have to find a workaround with certain configurations to make them work.

    For how long have I used the solution?

    We have been using the solution since 2021.

    What was my experience with deployment of the solution?

    I am just working with the switches and Cisco Identity Services Engine (ISE) .

    What do I think about the stability of the solution?

    It works and does what it is supposed to do. It is stable.

    What do I think about the scalability of the solution?

    It is pretty scalable.

    How are customer service and support?

    We have used customer service.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I have not used any previous solutions and am not sure about others.

    How was the initial setup?

    It is a bit complicated. The implementation took us about two months.

    What about the implementation team?

    It is deployed on-premises.

    What's my experience with pricing, setup cost, and licensing?

    I have not compared with other vendors, but the license is reasonably priced.

    The cost is about 100 million Ugandan shillings, which converts to approximately $30,000 per year.

    Which other solutions did I evaluate?

    I have considered trying Juniper and D-Link switches.

    What other advice do I have?

    I am only using the Cisco Identity Services Engine (ISE)  and the switches. Higher licensing is required for additional features. I rate this solution 8 out of 10.

    View all reviews