What is Cisco Identity service engine?
Show LessContact Details
Cisco Systems, Inc.
Located in United States, California, San Jose
Founded in 1984
- Free trial available
- Free version available
Top Industries Represented
Data from Grid Report for Network Access Control Software
View grid dataDeployment & Support
Deployment
- Cloud, Saas, Web-based
- Desktop-mac
- Desktop-Windows
- Desktop-Linux
- Desktop-Chromebook
- On Promise Windows
- On Premise Linux
- Mobile-Android
- Mobile-Iphone
- Mobile-Ipad
Support
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live Recap)
Training
- In Person
- Live Online
- Webinars
- Documentation
- Videos
Cisco Identity service engine Pricing
Check out our offers for each of our packages to get best out of the software
Visit us on our website to know more
Get a custom quote
Cisco Identity service engine Features
Primary Features
Access Controls/Permissions
Access control is a fundamental component of data security that dictates who's allowed to access and use company information and resources.
Dashboard
A dashboard is a type of graphical user interface which often provides at-a-glance views of key performance indicators relevant to a particular objective or business process.
Multiple Authentication Methods
Multiple Authentication Methods is an authentication method that requires the user to provide two or more verification factors to gain access to a resource such as an application, online account, or a VPN.
Policy Management
Policy Management refers to the creation, communication, and management of all the policies and procedures implemented by an organization.
Remote Access/Control
Remote access control refers to the ability to monitor and control access to a computer or network (such as a home computer or office network computer) anywhere and anytime.
Compliance Management
Compliance management is the ongoing process of monitoring and assessing systems to ensure they comply with industry and security standards, as well as corporate and regulatory policies and requirements.
Password Management
Password management is a system that allows users to store and access passwords securely.
Credential Management
Credential Management is an established form of software that is used for issuing and managing credentials as part of public key infrastructure (PKI).
Role-Based Permissions
Using a role-based access control system means that admins can sort employees or contractors into preexisting groups, or roles, which grant access to a defined set of resources.
Secondary Features
- Audit Management
- Audit Trail
- Real Time Monitoring
- Configuration Management
- Authentication
- Service Level Agreement (Sla) Management
Compare with Similar Products
Aruba secure
Device42
Sophos Firewall
Foxpass
Barracuda
Extreme Network
Forescout
Fortinet NAC
OPSWAT
portnox