Try our new research platform with insights from 80,000+ expert users

EVOLVEUM midPoint vs Fortinet FortiAuthenticator comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 1, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

EVOLVEUM midPoint
Ranking in Identity Management (IM)
22nd
Average Rating
8.0
Reviews Sentiment
7.4
Number of Reviews
3
Ranking in other categories
No ranking in other categories
Fortinet FortiAuthenticator
Ranking in Identity Management (IM)
10th
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
63
Ranking in other categories
Single Sign-On (SSO) (7th), Authentication Systems (3rd), Multi-Factor Authentication (MFA) (2nd)
 

Mindshare comparison

As of March 2026, in the Identity Management (IM) category, the mindshare of EVOLVEUM midPoint is 2.1%, down from 2.9% compared to the previous year. The mindshare of Fortinet FortiAuthenticator is 2.0%, down from 3.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity Management (IM) Mindshare Distribution
ProductMindshare (%)
Fortinet FortiAuthenticator2.0%
EVOLVEUM midPoint2.1%
Other95.9%
Identity Management (IM)
 

Featured Reviews

Ondrej Balun - PeerSpot reviewer
IAM Expert Group Lead at Ventum
An open-source solution that helps in IAM
Our customers leverage the product as a central component in their identity field management. The process involves connecting it to target systems through connectors. It also helps us in role-based access control implementation. Users are granted access based on predefined roles associated with their positions, organizational hierarchy, or job titles. Instead of direct assignments, users automatically receive roles upon entering the company, aligning with their assignments. The core feature of EVOLVEUM midPoint that I find most valuable is provisioning. Users, including myself, can submit requests that need designated individuals' approval. Additionally, the recertification feature is crucial for regularly reviewing and confirming the appropriateness of user access rights. I find recertifications valuable because they align with clear regulatory requirements for companies to perform them at least once yearly. Using the product, I can initiate a recertification campaign by selecting users and the applications to be recertified. I define the individuals responsible for approving or rejecting access. The goal is to ensure compliance with regulatory standards. The tool's flexibility in handling identity types and tickets has brought notable benefits. It provides full flexibility to extend attributes or the schema for users and organizations. Its audit and reporting capabilities have significantly enhanced our customer's compliance and security posture. Management's regular need for reports, such as the number of users in the application and identifying users with critical access, is addressed. The solution allows easy configuration of reports directly from the front end. Additionally, the ability to schedule and automate report execution, followed by automatic distribution to support or responsible personnel, streamlines the process.
Sachin Vinay - PeerSpot reviewer
Assistant Manager-Networks at a university with 1,001-5,000 employees
Supports secure remote authentication and provides comprehensive user activity tracking
The most important feature is the security capability because it provides a substantial amount of security for admin-related activities. Fortinet FortiAuthenticator can be used from anywhere in the world, and the authenticator services function globally. This global accessibility is one of the critical advantages, particularly since admin features are critical and security is a real concern. With Fortinet FortiAuthenticator, secure usage of firewall services and related functions is achieved. A complete log of all users who access the authenticator setup is maintained. Monthly logs are reviewed to check for any unnoticed activities. Each authenticated user's complete activity history is recorded. This logging capability allows for providing access to more admin users while ensuring security is not compromised and all users can be monitored.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Because the product is automating processes, if somebody joins the company, based on his or her role within the company he or she gets proper rights and accesses to the target systems."
"The basic setup is straightforward and takes minutes to complete."
"Our customers leverage the product as a central component in their identity field management. The process involves connecting it to target systems through connectors. It also helps us in role-based access control implementation."
"The basic setup is straightforward and takes minutes to complete."
"I like that it's open-source, and it's working. It has nice features, and it looks like it's easy to maintain."
"The logs have great detail that make it easier to evaluate and control the security environment."
"The feature I value the most is the one-time passwords because it helps to authenticate users so you know the timing of their usage."
"The solution is simple to deploy, simple to use, and user-friendly."
"FortiCare can provide prompt replies."
"For FortiAuthentication, it's a good price in comparison to any other competitor."
"It integrates very tightly with the rest of the Fortinet ecosystem."
"FortiAuthenticator has made our operations secure."
"We have not had issues with Fortinet FortiAuthenticator. It is stable."
 

Cons

"One area where I see room for improvement in EVOLVEUM midPoint is enhancing the user interface for configuration. Currently, a significant portion of the configuration involves technical, XML-based settings requiring a higher level of technical expertise."
"I think that the product is missing some of the identity governance functions—for example, the legal stuff and GDPR, and so on. But I think they are currently working on it."
"The support isn't ideal - because the product is open-source, it relies on your own ability to make it work unless you pay for support at a high hourly rate."
"The support isn't ideal - because the product is open-source, it relies on your own ability to make it work unless you pay for support at a high hourly rate."
"I think that the product is missing some of the identity governance functions related the data provenance."
"We had some stability issues. Our first LBS unit wouldn't work properly the first time and that wasted a lot of time."
"There have been numerous support tickets sent to Fortinet since this does not appear to be a mature product."
"They could expand FortiAuthenticator's capabilities to accommodate a broader range of environments."
"I would like to see more support from Fortinet with tech support people who have as much expertise on the authenticator as they do on their firewalls."
"Technical support used to be much better. Fortinet seems to be downgrading, so everything takes longer to get a response in comparison to the past."
"There are some issues with integration."
"The integration with other products, for example, some SAML authentications, would make it more flexible."
"Improvements in the product could start from the dashboard, overall customization, and configuration."
 

Pricing and Cost Advice

"We're EVOLVEUM partners, and I tried it without a license."
"The product is free to use, but a cost is associated if you opt for official product support. Additionally, there is an option for a platform subscription, which entails professional services provided by the vendor."
"Licensing is defined by the number of users."
"I rate the price of Fortinet FortiAuthenticator a three out of five."
"You can pay as you go with them. You purchase a base license and add to it as needed."
"I price of the solution is expensive."
"The product has affordable pricing compared to other vendors."
"The platform is cost-effective as it does not require a separate license for SD-WAN functionality."
"I would rate the pricing a four out of ten, where one is cheap, and ten is expensive. It is not that costly. It is cheap, easy to manage, easy to install, and easy to configure."
"The product could be more competitively priced."
"I rate the product price as two or three on a one-to-ten scale, where one is expensive, and ten is cheap."
report
Use our free recommendation engine to learn which Identity Management (IM) solutions are best for your needs.
885,286 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
University
16%
Government
9%
Outsourcing Company
8%
Comms Service Provider
7%
Computer Software Company
12%
Manufacturing Company
11%
Comms Service Provider
10%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business38
Midsize Enterprise18
Large Enterprise11
 

Questions from the Community

Ask a question
Earn 20 points
What needs improvement with Fortinet FortiAuthenticator?
Fortinet FortiAuthenticator could benefit from some artificial intelligence functionality and resolution of some glitches that may exist.
 

Also Known As

No data available
FortiAuthenticator
 

Overview

 

Sample Customers

European Commisson, University of Illinois, First United Bank & Trust, Deutsche Telekom, Vodafone, Avast
Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
Find out what your peers are saying about EVOLVEUM midPoint vs. Fortinet FortiAuthenticator and other solutions. Updated: March 2026.
885,286 professionals have used our research since 2012.