No more typing reviews! Try our Samantha, our new voice AI agent.

Cisco Duo vs Fortinet FortiAuthenticator vs Yubico YubiKey comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Mindshare comparison

As of April 2026, in the Authentication Systems category, the mindshare of Cisco Duo is 4.8%, down from 9.9% compared to the previous year. The mindshare of Fortinet FortiAuthenticator is 4.1%, down from 8.2% compared to the previous year. The mindshare of Yubico YubiKey is 4.4%, down from 9.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Authentication Systems Mindshare Distribution
ProductMindshare (%)
Cisco Duo4.8%
Fortinet FortiAuthenticator4.1%
Yubico YubiKey4.4%
Other86.7%
Authentication Systems
 

Featured Reviews

Charles Slaustas - PeerSpot reviewer
Information Technology Contractor at Insight global
Supports seamless authentication for users across multiple organizations and personal portals
The features I use in Cisco Duo include Duo Pushes to confirm my identity to the device, and eventually as MFA security was increased, I actually had to use exchange passcodes. Sometimes, I have to go into the site and get into Cisco Duo to retrieve the passcode, and many of them have been two-factor, where the sites send a passcode that I have to enter into Cisco Duo. It has been more of the latter. I have not seen issues with lagging or crashing on Cisco Duo's end; it was usually on the client end, often because someone set up a bad upgrade or there were connection issues with the Cisco Duo cloud through the administrative site.
Sachin Vinay - PeerSpot reviewer
Assistant Manager-Networks at a university with 1,001-5,000 employees
Supports secure remote authentication and provides comprehensive user activity tracking
The most important feature is the security capability because it provides a substantial amount of security for admin-related activities. Fortinet FortiAuthenticator can be used from anywhere in the world, and the authenticator services function globally. This global accessibility is one of the critical advantages, particularly since admin features are critical and security is a real concern. With Fortinet FortiAuthenticator, secure usage of firewall services and related functions is achieved. A complete log of all users who access the authenticator setup is maintained. Monthly logs are reviewed to check for any unnoticed activities. Each authenticated user's complete activity history is recorded. This logging capability allows for providing access to more admin users while ensuring security is not compromised and all users can be monitored.
KM
Co-Founder at LBR Infosolutions
Robust authentication boosts security in restricted environments
Yubico YubiKey is highly valued for its anti-phishing feature, which prevents phishing of OTPs that are normally obtained through phones. The security features of Yubico YubiKey make it stand out among other MFA products in India, as it prevents anyone from accessing my password or PIN. Additionally, it supports receiving OTPs on phones.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable aspect is the authentication and the SSO."
"Duo Security gives us an additional layer of security that would give us added confidence that our network will be less likely to get hacked, compromised, or otherwise."
"I lead an IT organization that has a significant amount of technical debt, and we're not in a zero-trust architecture yet. I'm pushing in that direction. Duo helps me considerably with my identity in an environment where I don't have zero trust. It's helping me bridge the gap until I can build a zero trust architecture."
"The decision to choose Cisco Duo is based on the many features it offers that we did not find in other applications, and since we were already using Cisco for our other needs, it made sense not to switch to a competitor."
"Documentation is the most valuable feature, and if you ever have to reach out to them with a question, their support is also fantastic."
"Duo features benefit my company by making logins more secure and simpler. Everything is in one box, so we don't have multiple servers trying to do the same thing."
"It's fast; the whole process takes less time compared to other tools we've used before, which is very helpful."
"The two-factor authentication is valuable because that is the use case for which we are using it."
"The initial setup is a valuable point on Fortinet products. Most of the time, putting the theory into practice on the devices is quite friendly and straightforward. As long as you can read English you can find your way around the solution and make it work. This is a high value point on Fortinet - the way everything is laid out in the web UI is user-friendly and quite straightforward. The UI is quite simple."
"The ease of use is really nice. Using Authenticator, I've been able to actually work better on my authentication due to the fact that I have a single fabric to authenticate control from my firewall and on my access points. Authentication takes place from this area."
"The biggest advantages of Fortinet FortiAuthenticator are that it's easy to deploy, easy to manage, and the GUI is a very strong interface."
"This is a scalable product."
"The web feature is quite versatile. It serves as the sole server authenticator and is valuable not only with FortiGate products but also within the entire Forti system, making it highly useful for me."
"The solution is simple to deploy, simple to use, and user-friendly."
"This is a cost effective and flexible solution."
"The product enables SSO."
"YubiKey is a hardware security device with advanced security features."
"Yubico YubiKey is highly valued for its anti-phishing feature, which prevents phishing of OTPs that are normally obtained through phones."
"The most valuable feature of Yubico YubiKey is security."
"The most valuable feature of Yubico YubiKey is security."
"It's small and lightweight. Like a phone, it doesn't run out of battery. It also doesn't have to be unlocked. It doesn't break. Moreover, they're very durable and it's very convenient."
"The solution is simple to use and we have installed it in our clients' endpoints. The tool is just plug-and-play for the end user. The end user can just put in the key to the security computer and log in without any hassle. The solution is efficient, user-friendly, and easy to use."
 

Cons

"Conversational AI in Cisco Duo is limited in its current application."
"Cisco Duo can be improved by exploring a way to make it a more seamless integration and by deploying an in-house server."
"Compared to other vendors, Cisco Duo is on the pricey end."
"We use Yubikey for pushing it to the phones. Yubikeys can get expensive because people tend to lose those for some reason. Fifty dollars a device is pretty high."
"We found it difficult to integrate it into our broader product family of Microsoft tools and other applications used across our organization."
"They could just continue to add more integrations."
"I'd like to see it integrated into other applications. I know there are some integrations, but I haven't been able to explore that any further."
"We first deployed Duo Security for our company with the VPN, and afterward, about a year later, we implemented it for a customer of ours where we offered infrastructure as a service. When I tried to establish a VPN connection through Duo Security, it did not function well on that version, which was the latest one at the time. So, I had to make a copy of the machine and then implement Duo Security with the VPN because it did not function well with the newer version."
"For scalability, you need to size FortiAuthenticator properly. It's not 100%, maybe 80% on the scalable side."
"The hardware aspect of the solution could be improved. We are not really able to understand the hardware capabilities of the device."
"I would like to see more security features in reference to identity login or identity identification."
"Integration with FortiGate could be more fluid."
"One of our clients has faced a lot of issues with FortiAuthenticator. For example, one of the devices restarted by itself, and the database was corrupted."
"I would like to see some email options for Fortinet FortiAuthenticator."
"There is room for improvement in stability and support."
"If two-factor authentication is needed also for the end-devices, for example endpoints or servers, I think FortiAuthenticator is not yet the most mature solution."
"It's a hardware device, so it isn't cost-effective to use for all your accounts. You might have a hard time getting budget approval. It's better to take a strategic approach and use it only for critical accounts. You can use other forms of authentication for the rest."
"Yubico YubiKey is inconvenient. No one likes the idea of having to put a USB device into the system, having to remember to take it out, and having passwords."
"It would be better if the product can come up with a serial number for the keys. It would be nice if they had a numbering system as a configuration identity that would help the IT and technical teams to identify the keys because they look all the same. It would be more like putting a tag on them."
"Yubico YubiKey is inconvient. No one likes the idea of having to put a USB device into the system, having to remember to take it out, and having passwords. It may be very good for security but it is not great for people to use."
"Yubico YubiKey could be improved by allowing for centralized administration, which is not currently available in India."
"Currently, an area where the product lacks is in addressing service needs."
 

Pricing and Cost Advice

"Their pricing model is a little bit weird. Currently, there is no price advantage in signing up for yearly contracts. There are no additional costs to the standard licensing costs."
"My experience with pricing, setup costs, and licensing has been good, with no issues. I am pleased that the prices remained stable after Cisco acquired the solution."
"It is affordable for what's coming to the table with it, but in this day and age, the cost is looked at under a microscope, and companies need to very finely define what is needed versus what is critical. In some cases, it might not be cost-effective for a company to have it. In a lot of other cases, it is the cost of doing business."
"You pay per user when using this solution and the pricing is fair."
"It was very reasonable."
"Price wise, it's not cheap, but it's not expensive at all either. It's in the middle."
"I believe the licensing model is excellent as it offers flexibility to our customers, allowing them to adopt a crawl, walk, or run approach."
"The pricing is pretty competitive. It's pretty cheap. Anybody can adopt it."
"When we buy the Fortinet FortiAuthenticator device there is a comparison between price and security."
"You can pay as you go with them. You purchase a base license and add to it as needed."
"The solution is not very expensive."
"The cost of the license could be less expensive. The license is paid on a yearly basis."
"The platform is cost-effective as it does not require a separate license for SD-WAN functionality."
"The pricing is fair."
"The product could be more competitively priced."
"The customers need to pay for licenses, and some pay on a yearly basis while others pay on a three-yearly or five-yearly basis. Also, it is not an expensive solution."
"We paid 100 bucks for one Yubikey."
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
885,444 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
10%
Financial Services Firm
8%
Comms Service Provider
8%
Computer Software Company
7%
Computer Software Company
12%
Manufacturing Company
11%
Comms Service Provider
10%
Government
7%
Government
12%
Financial Services Firm
11%
Computer Software Company
9%
Manufacturing Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business42
Midsize Enterprise24
Large Enterprise54
By reviewers
Company SizeCount
Small Business38
Midsize Enterprise18
Large Enterprise11
No data available
 

Questions from the Community

How does Duo Security compare with Microsoft Authenticator?
We switched to Duo Security for identity verification. We’d been using a competitor but got the chance to evaluate Du...
What is your experience regarding pricing and costs for Duo Security?
I cannot speak to the financial planning of the organization, but I can confirm that Cisco Duo falls within the secur...
What needs improvement with Duo Security?
Areas that have room for improvement in Cisco Duo include pricing, as Cisco is quite expensive, and the fact that Cis...
What needs improvement with Fortinet FortiAuthenticator?
Fortinet FortiAuthenticator could benefit from some artificial intelligence functionality and resolution of some glit...
What needs improvement with Yubico YubiKey?
Yubico YubiKey could be improved by allowing for centralized administration, which is not currently available in Indi...
What is your primary use case for Yubico YubiKey?
I primarily use Yubico YubiKey ( /products/yubico-yubikey-reviews ) for authentication in environments such as Active...
What advice do you have for others considering Yubico YubiKey?
From an individual perspective, no improvements are required for Yubico YubiKey. However, at a corporate or enterpris...
 

Also Known As

Duo Security
FortiAuthenticator
YubiKey
 

Overview

 

Sample Customers

Information Not Available
Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
Google Inc., Salesforce, Novartis, Facebook, GitHub, CERN, Duke University, Code Enigma, Luther Burbank High School, ZorgSaam, Agfa, Santa Clara County Fire Department, Dyson Ltd, Portugal Telecom, Boral, Canonical Ltd
Find out what your peers are saying about Microsoft, Cisco, Fortinet and others in Authentication Systems. Updated: March 2026.
885,444 professionals have used our research since 2012.