

Fortinet FortiAuthenticator and FortiToken compete in the network security category. FortiAuthenticator seems to have an upper hand due to its comprehensive management features, while FortiToken is appreciated for its ease of integration and cost-effectiveness.
Features: Fortinet FortiAuthenticator centralizes user management and offers robust two-factor authentication, supporting RADIUS, LDAP, and SAML. It is known for multiple authentication methods and detailed log features. FortiToken provides flexibility with both soft and hard tokens, optimal mobile OTP solutions, and seamless integration with FortiGate for enhanced VPN security.
Room for Improvement: FortiAuthenticator's user interface could be improved, along with better integration with third-party firewalls. Users have also mentioned the complexity of the CLI and a need for improved documentation. FortiToken could enhance mobile integration and address token migration issues. It could also improve synchronization capabilities and offer better support for non-Fortinet products.
Ease of Deployment and Customer Service: Both Fortinet FortiAuthenticator and FortiToken offer on-premises and cloud deployment options. They are praised for Fortinet's technical support, although there are occasional delays in first-level responses. FortiAuthenticator is especially recognized for excellent technical support.
Pricing and ROI: FortiAuthenticator provides competitive pricing and stackable licenses, although foreign exchange rates can impact costs. FortiToken is noted for its cost-effectiveness, especially in price-sensitive markets. FortiToken does not require a separate license for hardware, whereas FortiAuthenticator software does. Both products offer good ROI by reducing security breaches and compliance costs, though FortiAuthenticator's ROI is harder to quantify.
It enhances security by ensuring only the right person can access systems, even if their login credentials are compromised.
The technical support team is proficient and has all necessary resources to support all types of requirements.
Customer service and support are excellent.
At times, some technical staff lack knowledge, which delays issue resolution.
I am satisfied with their service.
Their resolution time is timely, and they provide solutions efficiently.
I find Fortinet FortiAuthenticator to be highly scalable, and I would rate it an eight out of ten for scalability.
The scalability of FortiAuthenticator is good, and I would rate it an eight on a scale of one to ten.
Fortinet FortiAuthenticator should be sufficiently scalable.
I would rate scalability for Fortinet FortiToken as nine and a half or ten.
There is a need to scale more effectively to accommodate a larger number of users and bulk users.
Regarding Fortinet FortiToken's scalability, we can purchase licenses according to our needs.
It remains stable even when the number of concurrent users increases.
No customers have reported issues with Fortinet FortiToken.
FortiToken is stable, but there are some restrictions when it comes to supporting two-factor authentication in multi-factor environments.
For example, authentication for wireless users expires after 24 hours, requiring re-authentication daily.
I recommend Fortinet make its images migratable between environments.
Fortinet FortiAuthenticator could benefit from some artificial intelligence functionality.
Any Fortinet FortiToken cannot be removed; if a box expires or loses support, it cannot be removed, and customers must purchase it from scratch.
If I can receive it on email, it would be more flexible.
This would allow for broader distribution among a larger number of system admins and software engineers, which is currently not feasible with the existing hardware-only approach.
Fortinet FortiAuthenticator is not overly expensive compared to other Fortinet subscriptions.
Discounts are often provided to close deals, making it a cost-effective solution.
The pricing for FortiToken is not low; I regard it as medium-priced.
The integration with FortiToken is outstanding, adding a layer of security for authentication.
This logging capability allows for providing access to more admin users while ensuring security is not compromised and all users can be monitored.
We use multi-factor authentication for enhancing security.
Fortinet FortiToken provides very important security benefits because it is used to manage FortiGate from outside, exclusively with Fortinet FortiToken.
The main use case of FortiToken is that it is a hardware-based solution, providing secure two-factor authentication for administrators.
Fortinet FortiToken has impacted my organization positively by providing enhanced security through an additional security layer.
| Product | Market Share (%) |
|---|---|
| Fortinet FortiAuthenticator | 4.5% |
| Fortinet FortiToken | 3.6% |
| Other | 91.9% |


| Company Size | Count |
|---|---|
| Small Business | 38 |
| Midsize Enterprise | 18 |
| Large Enterprise | 11 |
| Company Size | Count |
|---|---|
| Small Business | 17 |
| Midsize Enterprise | 5 |
| Large Enterprise | 9 |
Fortinet FortiAuthenticator is the primary secure point of approved access into the Fortinet network, authorizing users, reviewing access permissions, and relaying the information to all Fortigate devices for comparison with identity-based protocols. Fortinet FortiAuthenticator is a top-ranked authorization and SSO solution.
Appropriate secure access is fundamental to every role in an enterprise ecosystem. It is an integral function of every organization to ensure that every access and privilege is secure and to mitigate any possible risk to an organization. Approved users should only have access to the necessary information when they need it, from the appropriate location(s) to safeguard an organization's security at all times.
Fortinet FortiAuthenticator is available as an appliance, virtual machine, or in the cloud.
Fortinet FortiAuthenticator Methods
Reviews from Real Users
Ernesto C., Presales Engineer at a comms service provider, shares,
”Key Features and Benefits
Ibrahim M., Senior Network & Security Engineer at a tech services company, relates, "The initial setup is a valuable point on Fortinet products. Most of the time, putting the theory into practice on the devices is quite friendly and straightforward. As long as you can read English you can find your way around the solution and make it work. This is a high value point on Fortinet - the way everything is laid out in the web UI is user-friendly and quite straightforward. The UI is quite simple."
As we've seen, passwords alone don't keep unwanted guests out of your network. Password-only authentication has led to security breaches, malware infections, and policy violations. With two-factor authentication, a password is used along with a security token and authentication server to provide far better security. Authorized employees can remotely access company resources safely using a variety of devices, ranging from lpatops to mobile phones.
We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.