We performed a comparison between CyberArk Privileged Access Manager and Fortinet FortiAuthenticator based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."It enables companies to automate password management on target systems gaining a more secure access management approach."
"You can write different types of policies for custom business needs or any developer needs. If they need certain functions allocated, they can be customized easily."
"The technical support for this solution is very good. If I was to rate it on a scale of one to five, I would give it a five."
"I really like the PTA (Privileged Threat Analytics). I find this the best feature."
"The solution is scalable."
"Our go-to solution for securing against the pass the hash attack vector and auditing privileged account usage."
"It is an extremely scalable solution."
"The most valuable feature of CyberArk Privileged Access Manager is the vault. I am satisfied with the interface and the documentation."
"It keeps track of users and their IPs no matter where they are in the network. When users roam, we don't have to worry about not mapping them to an IP."
"The product is good, cost-effective, and functionally efficient."
"Fulfilled our requirement at a good price."
"The initial setup is very easy."
"This is a scalable product."
"FortiAuthenticator is really good software that integrates very well with Fortinet products."
"It integrates very tightly with the rest of the Fortinet ecosystem."
"I prefer the passing tool that sent an active directory console to a Fortinet FortiAuthenticator, then Fortinet FortiAuthenticator does not pass the locks."
"This is probably a common thing, but they do ask for a lot of log files, a lot of information. They ask you to provide a lot of information to them before they're willing to give you anything at all upfront. It would be better if they were a little more give-and-take upfront: "Why don't you try these couple of things while we take your log files and stuff and go research them?" A little bit of that might be more helpful."
"CyberArk has a lot on the privileged access side but they have to concentrate more on the application side as well."
"We need a bit more education for our user community because they are not using it to its capabilities."
"I'm not a fan of technical support with CyberArk. It's like jumping through red tape and hoops. Quite frankly, it's almost like when you call CyberArk you get the Help Desk or the level-one. I'm a level-one. I got the CCD, I know how to do the initial troubleshooting. When I call CyberArk it's because I can't figure the problem out. So I need a level-two, three, four. I don't need you to tell me, "Hey, open a ticket and then give me logs.""
"As a customer, I might need a plugin for a specific product, or an application, and CyberArk might have already worked with some other client on it. There has to be some platform where it is available for everybody else to go and grab it, instead of my having to reinvent the wheel."
"It should be easier to install. It is a comprehensive product, which makes it difficult to install. You need to have their consulting services in order to get it all installed and set up correctly because there is so much going on. It would be nice if there were an easier way to do the installation without professional services. I suspect they get a fair amount of their money from professional services. So, there is not a huge incentive."
"The greatest area of improvement is with the user interface of the Password Vault Web Access component."
"The interface on version 9 looks old."
"There are some protocols, such as SHA and SHA-2, that are not supported."
"The product must provide full support for third-party FIDO security keys."
"The GUI is on the older side but I'm sure that it will be upgraded soon. It works, but it looks a little dated."
"We would like to see Linux-based operating systems be able to integrate with FortiAuthenticator to get two-factor authentication running on them. as well. This is a shortcoming that I have faced a few times already."
"Improvements in the product could start from the dashboard, overall customization, and configuration."
"They could expand FortiAuthenticator's capabilities to accommodate a broader range of environments."
"There is room for improvement in stability and support."
"If you want some other FortiAuthenticator from one site to another site, you should have requirements, but really if you have authentication and directory or another solution, you should change the password of the authenticator between the solution and the directory and other things. So transfer of data and other information should be simpler."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews while Fortinet FortiAuthenticator is ranked 5th in Single Sign-On (SSO) with 52 reviews. CyberArk Privileged Access Manager is rated 8.8, while Fortinet FortiAuthenticator is rated 8.0. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of Fortinet FortiAuthenticator writes "A reasonably priced solution that can be scaled toward different functionalities and offers flexible SMS messaging". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and ARCON Privileged Access Management, whereas Fortinet FortiAuthenticator is most compared with Cisco ISE (Identity Services Engine), Fortinet FortiToken, Fortinet FortiNAC, Microsoft Entra ID and Microsoft Active Directory.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.