Fortinet FortiToken and CyberArk Identity are prominent security solutions competing in the identity management category. CyberArk Identity is considered superior due to its features, which users feel justify the higher cost.
What features are offered by Fortinet FortiToken in comparison to CyberArk Identity?Fortinet FortiToken users value its robust two-factor authentication, seamless integration with Fortinet products, and competitive pricing. CyberArk Identity is praised for its comprehensive identity management capabilities, including single sign-on, adaptive multi-factor authentication, and extensive security features. These functionalities give CyberArk Identity an edge.
What areas of improvement can be found in Fortinet FortiToken in comparison to CyberArk Identity?Users of Fortinet FortiToken suggest enhancing its reporting features, user management capabilities, and initial configuration process. CyberArk Identity users call for simpler configuration processes, enhanced mobile app performance, and improved user interface. FortiToken's areas for improvement are more technical, whereas CyberArk Identity's are more usability-focused.
How is the ease of deployment and customer service of Fortinet FortiToken in comparison to CyberArk Identity?Fortinet FortiToken's deployment is straightforward, although some find the initial configuration complex. CyberArk Identity receives mixed feedback on deployment; some find it straightforward, while others struggle with setup. Fortinet FortiToken users report quicker and more helpful support compared to CyberArk Identity, which offers more comprehensive onboarding.
What setup costs and ROI can be seen with Fortinet FortiToken in comparison to CyberArk Identity?Fortinet FortiToken is generally seen as cost-effective, with lower setup costs and solid return on investment. CyberArk Identity's initial costs are higher, but the extensive features and security enhancements provide a worthwhile ROI, making it a better long-term investment due to its advanced capabilities.
They resolved the problem immediately after I reported it, on the same day, within one hour.
They charge reasonable money for the features they provide.
There are times when there is a delay in handling my inquiries via email.
Their resolution time is timely, and they provide solutions efficiently.
We can use it on different phones and computers, demonstrating its scalability.
There is a need to scale more effectively to accommodate a larger number of users and bulk users.
Regarding Fortinet FortiToken's scalability, we can purchase licenses according to our needs.
FortiToken is scalable and accommodates the needs for updates effectively.
When you have it in the cloud, you have CyberArk every time you need it.
With respect to stability, I find that stability is very good.
FortiToken is stable, but there are some restrictions when it comes to supporting two-factor authentication in multi-factor environments.
Integration or deployment is extremely difficult for CyberArk Identity.
There's a need to enhance network performance.
Something they could improve is the management of multifactor authentication.
This would allow for broader distribution among a larger number of system admins and software engineers, which is currently not feasible with the existing hardware-only approach.
If I can receive it on email, it would be more flexible.
FortiToken should provide enhanced SMS services for those users who do not have smartphones.
Regarding pricing, it can be quite a lot for small companies.
The pricing is acceptable.
If I am not going fully cloud, there are additional resources I will need to purchase, such as spinning more VMs or acquiring an HSM device to encrypt the vault.
Discounts are often provided to close deals, making it a cost-effective solution.
The pricing for FortiToken is not low; I regard it as medium-priced.
It impacts zero trust security strategies. It prevents lateral movements in the organization.
It is the most powerful access management system.
Being able to integrate CyberArk Identity with Microsoft Defender is valuable.
The main use case of FortiToken is that it is a hardware-based solution, providing secure two-factor authentication for administrators.
It is very user-friendly and easily integrates with various firewalls, making it convenient to use within diverse environments.
The solution is unique in catering to Fortinet, making it very useful and secure.
CyberArk Identity is a versatile identity management solution suitable for a wide range of enterprises. It is designed to enhance enterprise security and improve user experience. Its focus on security, compliance, and operational efficiency, combined with positive user feedback, makes it a strong contender in the identity management space.
CyberArk Identity offers a robust suite of features to manage user identities and access privileges. It focuses on securing access to resources across various environments, including cloud and on-premises applications. Its capabilities include single sign-on (SSO), multi-factor authentication (MFA), lifecycle management, and privileged access management. These features are engineered to streamline access control, enhance security, and ensure compliance with regulatory standards.
According to our user interviews, CyberArk Identity is praised for its reliability and user-friendly interface. IT professionals highlight the ease of integration with existing systems, while business executives appreciate the visibility it provides into access and identity management across the organization. Users also commend the responsive customer support, which is crucial for enterprise-level solutions.
IT Professionals found that CyberArk Identity's focus on multi-layered security significantly reduced the risk of data breaches and unauthorized access. With a centralized dashboard and automation features, you can streamline identity and access management tasks, saving time and reducing complexity. Finally, it helps meet various compliance requirements.
As we've seen, passwords alone don't keep unwanted guests out of your network. Password-only authentication has led to security breaches, malware infections, and policy violations. With two-factor authentication, a password is used along with a security token and authentication server to provide far better security. Authorized employees can remotely access company resources safely using a variety of devices, ranging from lpatops to mobile phones.
We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.