Overview
Cisco Identity Services Engine (ISE) on AWS enables Network Access Control (NAC) service workloads to be deployed and managed from the cloud while ensuring the flexibility required to meet each organizations unique cloud strategy. With Cisco ISE on AWS, you can unify the policy management of your organization for endpoint access control and network device administration. Cisco ISE is equipped with rich APIs to automate policy and lifecycle management, bringing ease of deployment and automation to the forefront of your NAC operations.
For GovCloud users launching directly from CloudFormation, please retrieve the Cisco Identity Services Engine (ISE) - GovCloud deployment template from the listing detail page linked below. https://aws.amazon.com/marketplace/pp/prodview-uvsybra7r3iugÂ
For more information on Cisco ISE, please visit http://www.cisco.com/go/iseÂ
Highlights
- Gain visibility with context and control: Know who, what, where, and how endpoints and devices are connecting to your network to ensure compliance and limit risk, with or without the use of agents.
- Extend zero trust to contain threats: Software-Defined Network segmentation shrinks the attack surface, limits the spread of ransomware, and enables rapid threat containment.
- Accelerate the value of existing solutions: Integrate with other Cisco and third-party solutions to bring an active arm of protection into passive security solutions and increase your return on investment (ROI).
Details
Unlock automation with AI agent solutions

Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Vendor refund policy
Please contact your Cisco Sales Team for refund or cancellation policy information
Custom pricing options
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
https://www.cisco.com/c/en/us/td/docs/security/ise/3-3/release_notes/b_ise_33_RN.htmlÂ
Below vulnerabilities are fixed in 3.3 Patch 7 Release:
Additional details
Usage instructions
For instructions on how to install Cisco ISE using an AMI, see the following Cisco ISE Installation Guide: https://www.cisco.com/c/en/us/td/docs/security/ise/ISE_on_Cloud/b_ISEonCloud/m_cisco_ise_on_aws_pc.htmlÂ
Resources
Support
Vendor support
BYOL: Cisco TAC provides support based on purchased licenses and support contract from Cisco or an authorized Cisco Reseller
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
Customer reviews
Has improved authentication management and simplified visitor network access
What is our primary use case?
I am working with switches, wireless, and SD-WAN solutions, but regarding the opinion itself, it depends what one would like to get.
For what we do, the most useful feature in Cisco Identity Services Engine (ISE)Â is RADIUS authentication. We are using the guest portal as well, the Wi-Fi guest portal capability from Cisco Identity Services Engine (ISE)Â .
The Wi-Fi guest portal feature allows us to give access to non-company devices on the locations we have for visitors.
We use the Cisco Identity Services Engine (ISE) profiling feature to onboard new devices whenever they're connected and assign them the correct profiles. It was mostly used when the ISE was deployed, but it's still used.
The adaptability of Cisco Identity Services Engine (ISE) policy enforcement can fit to the site we have depending on which kind of devices we have on site and then the needs for authentication, granting access and then assigning each device into its correct network for segmentation.
For what we're doing so far, it's quite easy for us; we are not doing too much complicated stuff, so it's quite easy for us to onboard a new site into the current policy we have.
What is most valuable?
The most useful feature in Cisco Identity Services Engine (ISE) is RADIUS authentication. We are using the guest portal as well, the Wi-Fi guest portal capability from Cisco Identity Services Engine (ISE).
The Wi-Fi guest portal feature allows us to give access to non-company devices on the locations we have for visitors.
We use the Cisco Identity Services Engine (ISE) profiling feature to onboard new devices whenever they're connected and assign them the correct profiles. It was mostly used when ISE was deployed, but it's still used.
The adaptability of Cisco Identity Services Engine (ISE) policy enforcement can fit to the site we have depending on which kind of devices we have on site and then the needs for authentication, granting access and then assigning each device into its correct network for segmentation.
For what we're doing so far, it's quite easy for us; we are not doing too much complicated stuff, so it's quite easy for us to onboard a new site into the current policy we have.
Cisco Identity Services Engine (ISE) has simplified guest access management for us without compromising security for our organization.
What needs improvement?
The log capacity in Cisco Identity Services Engine (ISE) could be enhanced because today natively on the ISE can only have a look at the logs from the day before. You cannot search into the oldest logs; you have to use another tool for that. This can be blocking if you don't have any log consolidation solution. To do a search for an issue or something that happened two days ago, you cannot search directly in there.
The capacity of Cisco Identity Services Engine (ISE) could be enhanced.
Something between one week and one month for the log capacity would be nice.
What do I think about the stability of the solution?
Sometimes when we have upgrades or failovers with Cisco Identity Services Engine (ISE), we had some minor issues. It took something around two or three days before it came back to a stable situation.
What do I think about the scalability of the solution?
For the size of our company, Cisco Identity Services Engine (ISE) is a scalable solution. It's working fine.
It's working fine because we are using many other Cisco products, so the interaction between Cisco tools is fine. However, you can have some latency issues depending on where your devices are. We don't have many devices spread on other geographies than EMEA; we have some of them in APAC, but for a really big deployment, scalability could force you to deploy more complex architectures. In this case, that would be the only drawback.
How are customer service and support?
I have contacted Cisco support.
Their support is really good. Cisco support has pretty good teams for support and every time we had good answers and we could somehow solve the issues we had.
How would you rate customer service and support?
Positive
How was the initial setup?
The setup of Cisco Identity Services Engine (ISE) was done by a third party, by a subcontractor. It would be hard for me to tell you how easy or not it was because the person was used to deploy this product already, but it wasn't that long, so we migrated from the previous environment to the current one we are using. Deployment or upgrade was quite acceptable.
Setup and migration of Cisco Identity Services Engine (ISE) took something around two weeks because this one is handling all the authentication we have worldwide. We took our time to make sure that migration was fine and we also merged. We had separated ISEs before, so we merged into a consolidated one, which is why it took more time.
What other advice do I have?
I haven't faced any other kind of issues or difficulties with Cisco Identity Services Engine (ISE).
The biggest benefit of Cisco Identity Services Engine (ISE) as a product for me is that it is stable and reliable.
On a scale of 1-10, I would rate Cisco Identity Services Engine (ISE) a 9.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Network access controls and policy management increase security visibility and control
What is our primary use case?
We use it for network access control.
It isolates the bring your own devices and the guests from the corporate network. It also segregates connections when a user comes in and connects. There is a certain profile review that goes on to confirm that the device is allowed to access resources on the network.
What is most valuable?
The policies allow us to enforce certain rules on the network to be able to screen our users more effectively. It allows us to have more visibility to what the users are trying to do on the network, which really helps us know how to control them.
There is value because it helps us secure the network and prevents certain things from happening which could cause financial loss. This demonstrates good value for money.
What needs improvement?
They should make their integrations with other manufacturers less restrictive. They should work on their integration with other vendors.
The integrations with the switches and the wireless controllers are not really straightforward. There is what they call the best practice for them, but it may not be what we have on-premise. We have to find a workaround with certain configurations to make them work.
For how long have I used the solution?
We have been using the solution since 2021.
What was my experience with deployment of the solution?
I am just working with the switches and Cisco Identity Services Engine (ISE)Â .
What do I think about the stability of the solution?
It works and does what it is supposed to do. It is stable.
What do I think about the scalability of the solution?
It is pretty scalable.
How are customer service and support?
We have used customer service.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have not used any previous solutions and am not sure about others.
How was the initial setup?
It is a bit complicated. The implementation took us about two months.
What about the implementation team?
It is deployed on-premises.
What's my experience with pricing, setup cost, and licensing?
I have not compared with other vendors, but the license is reasonably priced.
The cost is about 100 million Ugandan shillings, which converts to approximately $30,000 per year.
Which other solutions did I evaluate?
I have considered trying Juniper and D-Link switches.
What other advice do I have?
I am only using the Cisco Identity Services Engine (ISE)Â and the switches. Higher licensing is required for additional features. I rate this solution 8 out of 10.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Secure environments are ensured with robust network control and policy enforcement
What is our primary use case?
What is most valuable?
What needs improvement?
For how long have I used the solution?
What was my experience with deployment of the solution?
What do I think about the stability of the solution?
What do I think about the scalability of the solution?
How are customer service and support?
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
How was the initial setup?
What was our ROI?
What's my experience with pricing, setup cost, and licensing?
Which other solutions did I evaluate?
What other advice do I have?
Enhanced device administration hindered by complex deployment and security limitations
What is our primary use case?
I use Cisco Identity Services Engine (ISE)Â for wireless authentication and device administration.
How has it helped my organization?
Cisco Identity Services Engine (ISE)Â is good with device administration.
What is most valuable?
Cisco Identity Services Engine (ISE) is very good at device administration. This is one of the best features. Other than that, for the wireless authentication and network access control (NAC) use cases, it is not a solid product because there are better products for NAC than Cisco Identity Services Engine (ISE).
What needs improvement?
Cisco Identity Services Engine (ISE) needs to improve the profiling preauthentication. They are very poor in asset classification and should focus on improving the preauthentication profiling, especially for NAC use cases. This will give them a roadmap for software-defined access (SDA) use cases and network segmentation. Threat detection capabilities are very weak. Additionally, the product is vulnerable and has many bugs.
For how long have I used the solution?
I have been working with Cisco Identity Services Engine (ISE) for around four years or more.
What do I think about the stability of the solution?
The stability of Cisco Identity Services Engine (ISE) is poor for certain use cases, like authentication. Device administration runs smoothly. Authentication and NAC use cases do not. I would rate the stability as four out of ten.
What do I think about the scalability of the solution?
Scalability is limited. Factors like architecture, business nature, and legal limitations such as GDPR affect it. I would rate it as four or five out of ten.
How are customer service and support?
Technical support is poor. It heavily relies on a reactive approach, and resolving issues can take a long time. Simple issues can take 72 hours or more than six months for resolution. I rate the technical support as one out of ten.
How would you rate customer service and support?
Negative
Which solution did I use previously and why did I switch?
We also use Forescout. We use both Cisco Identity Services Engine (ISE) and Forescout simultaneously.
How was the initial setup?
The initial setup is challenging. For enterprises, it can take months due to VM setup requirements, poor tech support, and Cisco Identity Services Engine (ISE) having many bugs. Small setups might take a day, but larger enterprise setups are much longer.
What about the implementation team?
Cisco tech support and professional services are poor, lacking clear requirements and solutions.
What was our ROI?
The return on investment for Cisco Identity Services Engine (ISE) is difficult to gauge due to complexities. For enterprise customers, it comes at a lower cost and is comparatively cost-effective. Direct comparisons with Forescout reveal up to 30% to 40% difference in cost savings.
What's my experience with pricing, setup cost, and licensing?
Setup costs vary. Cloud solutions are expensive, while on-prem setups with shared environments are cheaper but not effective. Dedicated resources are needed due to the demanding nature of Cisco Identity Services Engine (ISE), making large organizational costs significant.Â
For small organizations, it's effective - not for larger ones.
Which other solutions did I evaluate?
We have evaluated and used Forescout alongside Cisco Identity Services Engine (ISE).
What other advice do I have?
For small setups and if the backend infrastructure is Cisco-based, Cisco Identity Services Engine (ISE) is suitable. However, for large organizations with mixed infrastructure, other solutions should be considered. I would rate it four out of ten based on my experience from the last year.
Which deployment model are you using for this solution?
Automation and real-time visibility aids in monitoring and troubleshooting issues with endpoints
What is our primary use case?
The primary use case of Cisco Identity Services Engine (ISE)Â is to serve as a security solution that can specify the endpoints in an organization for segmentation. This involves defining the reachability domain for each endpoint in an organization.Â
It automates pushing access lists or authorizations and offers profiling to define and manage endpoints. It provides profiling to help organizations define the type and points of the endpoints, building security rules, and providing health checks to ensure endpoints comply with rules.
How has it helped my organization?
The solution offers automation and real-time visibility, which aids in monitoring and troubleshooting issues with endpoints.Â
The product provides feedback about the network based on endpoint behavior, assisting in understanding the network's current state.
What is most valuable?
The solution is integrated with other Cisco devices and can offer automation for an organization, making deployments more dynamic and providing real-time visibility. It gives feedback on what is happening within the network and assists mostly with troubleshooting.Â
Additionally, it's considered highly reliable and scalable.
What needs improvement?
The licensing scheme is complex and could use enhancement to provide more options. Pricing can be more expensive compared to other vendors, and there is a significant price gap observed, which doesn't seem justified by some specific features. The complex licensing schema and the need for improvement in pricing are primary areas for improvement.
For how long have I used the solution?
The Cisco Identity Services Engine (ISE)Â has been deployed for a long time in various environments.
What do I think about the stability of the solution?
Cisco Identity Services Engine (ISE) is considered very reliable and stable. Although it is not one hundred percent reliable theoretically, in practice, it offers great reliability.
What do I think about the scalability of the solution?
The solution is described as very scalable, and there are minimal issues with scalability.
How are customer service and support?
Sometimes it's challenging to identify which support team is responsible for certain issues, which is a significant concern.
How would you rate customer service and support?
Positive
How was the initial setup?
Setup is not about deploying ISE itself, but rather about managing the number of switches and endpoints in the organization. After initial deployment, routine upgrades and backups are part of the normal process.
What about the implementation team?
A specific implementation team is not mentioned, but deployment complexity varies depending on the organization size and manpower available.
What's my experience with pricing, setup cost, and licensing?
Cisco ISE is more expensive but covers a lot of features. The pricing scheme could be improved. Compared to other solutions like HPE ClearPass , Cisco is more costly, and the conversation suggests a possible forty percent price gap compared to competitors.
Which other solutions did I evaluate?
Detailed mentions of other solutions include HPE ClearPass and Fortinet. However, these are mentioned for comparison purposes rather than as alternatives considered before using Cisco ISE.
What other advice do I have?
It is suggested to keep the review anonymous and refrain from making personal information public.
I'd rate the solution eight out of ten.