Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM).
Money saving is the main part because every organization tries to reduce their costs.
It enhances security by ensuring only the right person can access systems, even if their login credentials are compromised.
They offer support around the clock, and responses are generally quick.
Support is critical, especially when challenges arise related to PAM.
It takes a maximum of one hour to get a response for support-related issues.
Technical support from Fortinet deserves a rating of 10.
Customer service and support are excellent.
At times, some technical staff lack knowledge, which delays issue resolution.
The initial understanding of the environment is crucial, followed by a simple deployment process.
I find Fortinet FortiAuthenticator to be highly scalable, and I would rate it an eight out of ten for scalability.
Fortinet FortiAuthenticator should be sufficiently scalable.
The scalability of FortiAuthenticator is good, and I would rate it an eight on a scale of one to ten.
BeyondTrust Endpoint Privilege Management is very easy to use; if you know the process of cybersecurity, you will not experience downtime.
The appliances are stable, and there are no significant issues with backups or recovery.
It remains stable even when the number of concurrent users increases.
There is a need for better MQ integration with DevOps and improvements in architecture.
Technical support for BeyondTrust Endpoint Privilege Management should be an enterprise edition; whoever is working in the bank sector for security purposes needs to be 100% secure on the servers.
This product is highly ranked on Gartner, Peers, and other review sites.
For example, authentication for wireless users expires after 24 hours, requiring re-authentication daily.
I recommend Fortinet make its images migratable between environments.
The technical support could be improved as some staff lacks the necessary knowledge to assist effectively.
If a solution fits a customer's budget, considerations must be made that it may not have all the features of more expensive solutions.
Fortinet FortiAuthenticator is not overly expensive compared to other Fortinet subscriptions.
Another important aspect is the ability to move the solution to the cloud or install it on-premises, offering my customers flexibility.
When any unauthorized user makes an attempt, it notifies the administrators.
For security purposes in BeyondTrust Endpoint Privilege Management, when employees are working in the system, we can make a recording of the video, showing the modifications and configurations they made, allowing us to see everything.
The integration with FortiToken is outstanding, adding a layer of security for authentication.
We use multi-factor authentication for enhancing security.
The most valuable feature I find in FortiAuthenticator is web filtering.
Product | Market Share (%) |
---|---|
BeyondTrust Endpoint Privilege Management | 3.7% |
CyberArk Privileged Access Manager | 16.3% |
Delinea Secret Server | 7.5% |
Other | 72.5% |
Product | Market Share (%) |
---|---|
Fortinet FortiAuthenticator | 5.7% |
Microsoft Entra ID | 19.9% |
Okta Workforce Identity | 8.2% |
Other | 66.2% |
Company Size | Count |
---|---|
Small Business | 15 |
Midsize Enterprise | 3 |
Large Enterprise | 15 |
Company Size | Count |
---|---|
Small Business | 38 |
Midsize Enterprise | 17 |
Large Enterprise | 10 |
BeyondTrust Endpoint Privilege Management enables organizations to mitigate attacks by removing excess privileges on Windows, Mac, Unix/Linux and networked devices. Remove excessive end user privileges and control applications on Windows, Mac, Unix, Linux, and networked devices without hindering end-user productivity.
Key Solutions Include:
-ENTERPRISE PASSWORD SECURITY
Discover, manage and monitor all privileged accounts and SSH keys, secure privileged assets, and report on all privileged account activity in a single solution.
-ENDPOINT LEAST PRIVILEGE
Enforce least privilege across all Windows and Mac endpoints, gain visibility into target system vulnerabilities, and control access to privileged applications without disrupting user productivity or compromising security.
-SERVER PRIVILEGE MANAGEMENT
Gain control and visibility over Unix, Linux and Windows server user activity without sharing the root or administrator account.
-A SINGLE PLATFORM FOR MANAGEMENT, POLICY, REPORTING AND THREAT ANALYTICS
Utilize a single solution to manage PAM policies and deployment, understand vulnerability and threat analytics, and provide reporting to multiple stakeholders and complementary security systems.
Learn more at https://www.beyondtrust.com/privilege-management
Fortinet FortiAuthenticator is the primary secure point of approved access into the Fortinet network, authorizing users, reviewing access permissions, and relaying the information to all Fortigate devices for comparison with identity-based protocols. Fortinet FortiAuthenticator is a top-ranked authorization and SSO solution.
Appropriate secure access is fundamental to every role in an enterprise ecosystem. It is an integral function of every organization to ensure that every access and privilege is secure and to mitigate any possible risk to an organization. Approved users should only have access to the necessary information when they need it, from the appropriate location(s) to safeguard an organization's security at all times.
Fortinet FortiAuthenticator is available as an appliance, virtual machine, or in the cloud.
Fortinet FortiAuthenticator Methods
Reviews from Real Users
Ernesto C., Presales Engineer at a comms service provider, shares,
”Key Features and Benefits
Ibrahim M., Senior Network & Security Engineer at a tech services company, relates, "The initial setup is a valuable point on Fortinet products. Most of the time, putting the theory into practice on the devices is quite friendly and straightforward. As long as you can read English you can find your way around the solution and make it work. This is a high value point on Fortinet - the way everything is laid out in the web UI is user-friendly and quite straightforward. The UI is quite simple."
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.