Try our new research platform with insights from 80,000+ expert users

Entrust Identity Enterprise vs Fortinet FortiToken comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 11, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Entrust Identity Enterprise
Ranking in Authentication Systems
17th
Average Rating
8.8
Reviews Sentiment
7.7
Number of Reviews
7
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (22nd)
Fortinet FortiToken
Ranking in Authentication Systems
4th
Average Rating
8.4
Reviews Sentiment
7.2
Number of Reviews
30
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of July 2025, in the Authentication Systems category, the mindshare of Entrust Identity Enterprise is 1.5%, down from 1.6% compared to the previous year. The mindshare of Fortinet FortiToken is 6.0%, down from 7.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Authentication Systems
 

Featured Reviews

Iwegbue Godspower Isioma - PeerSpot reviewer
Provides strong authentication feature, which requires users to enter a one-time password (OTP)
The main issue I've noticed pertains to setting up the desktop client on virtual machines in Azure, GCP, or AWS, specifically for Entrust Identity Enterprise intended for on-premises use. It works for on-premises, but I'm not sure if it's fully supported in cloud environments. If support were added, it would function perfectly with on-premises configurations. So, it functions well on-premises, but integrating it with cloud services like AWS or Azure could be challenging. There are issues with cloud integrations, such as Azure, AWS, and GCP.
Sachin Vinay - PeerSpot reviewer
Facilitates secure 2FA for admins, facilitates OTP generation, and enhances security
One suggestion is to develop a more user-friendly solution that is cost-effective so that a hardware-based solution can be provided to all users using VPN services or any configuration service requiring confidentiality. This would allow for broader distribution among a larger number of system admins and software engineers, which is currently not feasible with the existing hardware-only approach.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The integration matrix of the solution is huge compared to others."
"This solution is flexible and easy to use for our clients. We use it with different kinds of applications and integrate it with different processes."
"I am impressed with Entrust because they are one of the most advanced identity access management companies. Their portfolio of products is well aligned with the CISA zero trust framework. If you compare the features of Entrust products with the CISA pillars of zero trust, you'll see that they're perfectly matched with CISA requirements."
"It is a scalable solution. You can add users and credentials without problems."
"Entrust is an enterprise account, and they have a support system. Their training is also top-notch, and they are willing to share their knowledge with their partners."
"FortiToken is available in a soft or hard token factor, so there's some flexibility in that. Beyond that, I would say it is a stable solution that has worked for us."
"Fortinet FortiToken has a lot of RADIUS functionality."
"The token-based authentication is good and modern aspect."
"One of the product's most valuable features is its ease of use."
"The most valuable feature of the solution is its mobile application. It is particularly beneficial as it eliminates the need for hardware management."
"The deployment is quick and simple."
"The solution offers push notifications. When you try to connect to the VPN, FortiToken sends a push notification to our customer's device."
"Its ease of installation is most valuable. It took me five minutes, and it was up and running. It didn't take me that long. The installation on the cell phones is pretty simple."
 

Cons

"It functions well on-premises, but integrating it with cloud services like AWS or Azure could be challenging. There are issues with cloud integrations, such as Azure, AWS, and GCP."
"The product is very costly compared to other alternative solutions."
"We are introducing new processes and are migrating to a new version. Once we explore new functionalities, we'll be able to assess what could be improved."
"I would like to improve the tool's implementation and pricing."
"I would like to see the product improvements in dynamic VLAN pooling. Specifically, when users are assigned different VLANs based on their SSID, ensuring no unintended lateral traffic between users would enhance security and efficiency."
"Maybe the price could be improved, and the integration could be better. But the integration is different from the authenticator side."
"One suggestion is to develop a more user-friendly solution that is cost-effective so that a hardware-based solution can be provided to all users using VPN services or any configuration service requiring confidentiality."
"Support is a pain point in Bangladesh because there aren't many experienced Fortinet engineers in this country. It's easier to find one certified in Cisco, Palo Alto, or Juniper."
"The Fortinet FortiToken server doesn't have centralized integration with other Fortinet tools and third-party tools."
"Its reporting should be better. The reporting feature is missing. I don't have any reporting of who has done what, what has failed, and what didn't work."
"It needs a lot of coupling with their other Fortinet products. To implement FortiToken, I most probably need to couple it with FortiAuthenticator for full implementation. An RSA token can be used with many devices, whereas Fortinet FortiToken is always linked to only one FortiGate device. If I want to reuse the token across five or six FortiGates, I would have to get the FortiAuthenticator product. I can't use one token to connect to different FortiGates, and I need to get another product to enable this functionality. They should also improve the support for their mobile client. There should be a more detailed roadmap for the operating systems being supported. Some of our users were using an old iOS iPhone, and they were forced to get a newer phone because FortiToken didn't support that version of iOS. Similarly, there may be a version of Android that is not supported, so the users need to change the phone. This was one of the reasons why our deployment took longer."
"Fortinet FortiToken should improve its push notifications."
 

Pricing and Cost Advice

"The subscription could be yearly or monthly, depending upon your choice."
"I would rate the product's pricing a five out of ten."
"It's worth the money."
"It is included as part of our firewall license."
"Although the platform is relatively expensive, it offers significant value. I rate the pricing a nine out of ten."
"The solution’s pricing is moderate and reasonable."
"On a scale of one to ten, where one is the cheapest, and ten is the highest, I rate the pricing an eight."
"The solution’s price is good."
"From an Indian perspective, it's definitely costlier."
"Overall, it's cheaper than other solutions. Of course, we evaluated it five years back, and I haven't checked to see its current market position, but one reason we adopted FortiToken is its lower cost of ownership relative to other solutions we evaluated."
"I rate the tool's pricing a five out of ten."
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
861,803 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
10%
Performing Arts
9%
Government
9%
Manufacturing Company
8%
Computer Software Company
17%
Financial Services Firm
7%
Government
7%
Comms Service Provider
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What needs improvement with Entrust IdentityGuard?
The main issue I've noticed pertains to setting up the desktop client on virtual machines in Azure, GCP, or AWS, specifically for Entrust Identity Enterprise intended for on-premises use. It works ...
What is your primary use case for Entrust IdentityGuard?
I use it for an extra layer of security, that is two-factor authentication (2FA).
What advice do you have for others considering Entrust IdentityGuard?
I would recommend it. I've used it for three years now, and I'm very happy with it. Overall, I would rate the solution a nine out of ten.
What do you like most about Fortinet FortiToken?
The solution is simple and similar to Google Authenticator. It follows time-based authentication. We use it for hardware and software in one environment. The tool offers simple and fast authenticat...
What needs improvement with Fortinet FortiToken?
In my opinion, Fortinet FortiToken can be improved based on specific requirements. We will suggest solutions based on customer requirements and price availability.
What is your primary use case for Fortinet FortiToken?
I use Fortinet FortiToken for authentication and multi-factor authentication (MFA). I utilize Fortinet FortiToken's ability to integrate seamlessly with Fortinet platforms such as Fortinet FortiGat...
 

Also Known As

IdentityGuard
No data available
 

Overview

 

Sample Customers

Bank of New Zealand, CRISIL, Banco Mercantil, G_teborg University, Ministry of Economic Development of New Zealand, Ocean Systems, Skanska, Societe Generale, Susquehanna Bancshares
Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
Find out what your peers are saying about Entrust Identity Enterprise vs. Fortinet FortiToken and other solutions. Updated: July 2025.
861,803 professionals have used our research since 2012.