AI Buyer Insights:

Citigroup, a VestmarkONE customer evaluated BlackRock Aladdin Wealth

Michelin, an e2open customer evaluated Oracle Transportation Management

Wayfair, a Korber HighJump WMS customer just evaluated Manhattan WMS

Moog, an UKG AutoTime customer evaluated Workday Time and Attendance

Swedbank, a Temenos T24 customer evaluated Oracle Flexcube

Cantor Fitzgerald, a Kyriba Treasury customer evaluated GTreasury

Westpac NZ, an Infosys Finacle customer evaluated nCino Bank OS

Citigroup, a VestmarkONE customer evaluated BlackRock Aladdin Wealth

Michelin, an e2open customer evaluated Oracle Transportation Management

Wayfair, a Korber HighJump WMS customer just evaluated Manhattan WMS

Moog, an UKG AutoTime customer evaluated Workday Time and Attendance

Swedbank, a Temenos T24 customer evaluated Oracle Flexcube

Cantor Fitzgerald, a Kyriba Treasury customer evaluated GTreasury

Westpac NZ, an Infosys Finacle customer evaluated nCino Bank OS

List of Cisco Identity Services Engine (ISE) Customers

loading spinner icon

Apply Filters For Customers

Logo Customer Industry Empl. Revenue Country Vendor Application Category When SI Insight
Colorado Springs School District 11 Education 3598 $418M United States Cisco Systems Cisco Identity Services Engine (ISE) Identity and Access Management (IAM) 2016 n/a
In 2016, Colorado Springs School District 11 implemented Cisco Identity Services Engine (ISE) to address an aging authentication environment, pervasive BYOD device visibility challenges, and frequent email compromises affecting staff and students. The deployment used Identity and Access Management (IAM) controls to centralize network access decisioning across the district's 58 schools serving more than 23,000 students. The implementation emphasized ISE capabilities aligned with the Identity and Access Management (IAM) category, including network access control, device profiling and posture assessment, guest access workflows, and centralized policy enforcement. Cisco Identity Services Engine (ISE) was positioned as the district policy engine for wired and wireless access, enabling role based access and automated enforcement of device compliance prior to network admission. ISE was deployed alongside a broader Cisco security and collaboration portfolio that included Cisco Meraki switching and wireless, Cisco Duo for multifactor authentication, Cisco Umbrella for content filtering, and Cisco Secure Endpoint for endpoint protection. Operational coverage included district sites and school buildings and supported the district's BYOD policy, which scaled rapidly during the pandemic from about 15,000 to 50,000 devices under management. Governance and operational workflows were reoriented toward centralized policy administration, allowing IT to apply consistent access rules and device posture checks across sites and coordinate authentication and filtering controls for compliance needs. As part of the integrated Cisco deployment that included Cisco Identity Services Engine (ISE), the district reported enhanced protection for public and private data and elimination of hacked email incidents following the MFA rollout.
Daewoo Engineering & Construction Co Construction and Real Estate 5818 $8.9B South Korea Cisco Systems Cisco Identity Services Engine (ISE) Identity and Access Management (IAM) 2022 n/a
In 2022 Daewoo Engineering & Construction Co implemented Cisco Identity Services Engine (ISE) as part of a company wide deployment of the Cisco Catalyst Full Stack to secure the new Eulji Twin Tower and extend controls across headquarters, overseas subsidiaries, and domestic branches. The implementation is categorized under Identity and Access Management (IAM) and was timed with a broader network renovation to support hybrid work and improved connectivity for employees, tenants, and customers. Cisco Identity Services Engine (ISE) was provisioned to deliver integrated authentication and access control, centralized policy enforcement for wired and wireless access, and automation to reduce manual security operations. The deployment leveraged ISE capabilities for role based network access and device profiling to standardize onboarding for employees and guests, and to enable consistent access policies across network access layers. ISE was integrated into the wider Cisco stack, working alongside Cisco DNA Center for centralized orchestration and visibility, and interfacing with Cisco Catalyst 9300 and 9400 series switches, Cisco Catalyst 9800 wireless controllers, and Cisco Catalyst 9100 access points to enforce real time access decisions. The broader solution included Cisco ThousandEyes for application and internet monitoring while ISE provided the IAM layer, enabling coordinated operational monitoring and security controls across wired and wireless domains. Governance and operational model centralized access policy and incident handling through DNA Center and ISE, enabling automated workflows for policy changes and proactive problem resolution. The rollout supported a company wide scope and produced explicit results reported by the customer, including complete visibility into the network infrastructure and the ability to respond to network failures three times faster after the upgrade.
Federal Deposit Insurance Corporation (FDIC) Government 2025 $15.7B United States Cisco Systems Cisco Identity Services Engine (ISE) Identity and Access Management (IAM) 2017 n/a
In 2017, the Federal Deposit Insurance Corporation implemented Cisco Identity Services Engine (ISE) as part of its Identity and Access Management (IAM) tooling. The Cisco Identity Services Engine deployment was operated by network engineering teams and network technicians who used ISE in the context of FDIC network operations alongside Netcool, ServiceNow, InfoBlox IPAM, SolarWinds, and Ehealth for monitoring and ticketing workflows. The implementation focused on core Identity and Access Management (IAM) capabilities, including centralized authentication, authorization and accounting, 802.1X network access control, device profiling, guest access management, posture assessment and automated policy enforcement. Configuration work included policy set design, certificate based authentication support and role based access policies to govern access for servers, workstations, IP telephony equipment and other network appliances. Architecturally the ISE deployment was enforced at the network access layer across LAN and WAN infrastructure servicing Field and Regional office locations, with operational coverage extended into primary and backup datacenters. Operational tasks documented in support of the implementation included installation, configuration, troubleshooting and repair of network elements from Cisco and other vendors, ensuring connectivity of endpoints and enforcement points across distributed sites. Governance and operationalization emphasized documentation, mapping and process handoffs, with technicians creating and maintaining configuration artifacts, network maps and operational runbooks that tied ISE policy constructs into existing monitoring and ticketing processes. Day to day activities cited for the environment included ticket tracking, monitoring, incident isolation and routine configuration changes managed through established change and incident workflows.
FirstRand Insurance 3000 $500M South Africa Cisco Systems Cisco Identity Services Engine (ISE) Identity and Access Management (IAM) 2017 n/a
In 2017, FirstRand implemented Cisco Identity Services Engine (ISE), an Identity and Access Management (IAM) solution, to centralize network access control across its South Africa operations supporting approximately 3,000 employees. The deployment of Cisco Identity Services Engine (ISE) was positioned as the enterprise policy and posture engine for corporate and branch network access, covering wired and wireless authentication and device profiling. The implementation leveraged core Identity and Access Management (IAM) capabilities typical of Cisco ISE, including centralized policy administration, device profiling and classification, 802.1X authentication workflows, guest access management, and endpoint posture assessment. Configuration emphasis was on role based access control and conditional access policies tied to device posture and user identity, with RADIUS protocol enforcement and certificate based authentication used for stronger network access control. Operational coverage included IT security, network operations, and service desk workflows for onboarding and incident response across FirstRand sites in South Africa. Governance centered on a central policy repository in Cisco Identity Services Engine (ISE), formalized change control for policy updates, and operational runbooks for authentication failures and guest lifecycle management, providing a single control plane for network access policy administration.
Freshfields Bruckhaus Deringer Professional Services 4959 $1.8B United Kingdom Cisco Systems Cisco Identity Services Engine (ISE) Identity and Access Management (IAM) 2020 n/a
In 2020, Freshfields Bruckhaus Deringer implemented Cisco Identity Services Engine (ISE) as a central component of its Identity and Access Management (IAM) program. The deployment targeted a hybrid office infrastructure with execution support based in Manchester, and included a lead engineer responsible for rollout coordination and ongoing operational support. The Cisco Identity Services Engine (ISE) implementation emphasized core IAM functionality including device authentication, policy enforcement, and provisioning workflows aligned to 802.1X and RADIUS based access control. Operational responsibilities explicitly included support, administration and provisioning of Cisco ISE, with configuration work to standardize access policies and device profiling across wired and wireless estates. Integrations and architectural touchpoints were explicitly tied to Juniper and Cisco network gear used in office LANs, and the project was closely associated with a migration to Cisco DNA LAN for campus connectivity. The networking scope also included interoperability and connectivity considerations with Palo Alto firewalls using standardized templates, BGP peering from data center firewalls to Azure over ExpressRoute, and experience across other firewall platforms present in the estate. Governance and operational handover were part of the implementation, with documentation, handover and ongoing support activities performed to enable continuity within the security operations team. The engagement included sustained administration and provisioning work through Dec 2020 to Aug 2022, reflecting a transition from deployment into steady state operations for Identity and Access Management (IAM).
Transportation 585 $328M Italy Cisco Systems Cisco Identity Services Engine (ISE) Identity and Access Management (IAM) 2018 n/a
Government 5632 $341M United Kingdom Cisco Systems Cisco Identity Services Engine (ISE) Identity and Access Management (IAM) 2014 n/a
Banking and Financial Services 2535 $595M United Kingdom Cisco Systems Cisco Identity Services Engine (ISE) Identity and Access Management (IAM) 2016 n/a
Banking and Financial Services 205198 $83.7B United States Cisco Systems Cisco Identity Services Engine (ISE) Identity and Access Management (IAM) 2020 n/a
Showing 1 to 9 of 9 entries

Buyer Intent: Companies Evaluating Cisco Identity Services Engine (ISE)

ARTW Buyer Intent uncovers actionable customer signals, identifying software buyers actively evaluating Cisco Identity Services Engine (ISE). Gain ongoing access to real-time prospects and uncover hidden opportunities. Companies Actively Evaluating Cisco Identity Services Engine (ISE) for Identity and Access Management (IAM) include:

  1. University of Tennessee at Chattanooga, a United States based Education organization with 522 Employees
  2. Red River College, a Canada based Education company with 2600 Employees
  3. Lake B2B, a United States based Professional Services organization with 110 Employees

Discover Software Buyers actively Evaluating Enterprise Applications

Logo Company Industry Employees Revenue Country Evaluated
University of Tennessee at Chattanooga Education 522 $45M United States 2026-03-07
Red River College Education 2600 $630M Canada 2026-02-09
Lake B2B Professional Services 110 $11M United States 2026-01-14
Banking and Financial Services 1594 $390M United States 2025-10-20
Manufacturing 200 $50M United States 2025-02-20
FAQ - APPS RUN THE WORLD Cisco Identity Services Engine (ISE) Coverage

Cisco Identity Services Engine (ISE) is a Identity and Access Management (IAM) solution from Cisco Systems.

Companies worldwide use Cisco Identity Services Engine (ISE), from small firms to large enterprises across 21+ industries.

Organizations such as Wells Fargo, Federal Deposit Insurance Corporation (FDIC), Daewoo Engineering & Construction Co, Freshfields Bruckhaus Deringer and PROVIDENT FINANCIAL PLC are recorded users of Cisco Identity Services Engine (ISE) for Identity and Access Management (IAM).

Companies using Cisco Identity Services Engine (ISE) are most concentrated in Banking and Financial Services, Government and Construction and Real Estate, with adoption spanning over 21 industries.

Companies using Cisco Identity Services Engine (ISE) are most concentrated in United States, South Korea and United Kingdom, with adoption tracked across 195 countries worldwide. This global distribution highlights the popularity of Cisco Identity Services Engine (ISE) across Americas, EMEA, and APAC.

Companies using Cisco Identity Services Engine (ISE) range from small businesses with 0-100 employees - 0%, to mid-sized firms with 101-1,000 employees - 11.11%, large organizations with 1,001-10,000 employees - 77.78%, and global enterprises with 10,000+ employees - 11.11%.

Customers of Cisco Identity Services Engine (ISE) include firms across all revenue levels — from $0-100M, to $101M-$1B, $1B-$10B, and $10B+ global corporations.

Contact APPS RUN THE WORLD to access the full verified Cisco Identity Services Engine (ISE) customer database with detailed Firmographics such as industry, geography, revenue, and employee breakdowns as well as key decision makers in charge of Identity and Access Management (IAM).