Coming October 25: PeerSpot Awards will be announced! Learn more

Fortinet FortiAuthenticator vs Fortinet FortiToken comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Fortinet FortiAuthenticator and Fortinet FortiToken based on real PeerSpot user reviews.

Find out in this report how the two Authentication Systems solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.

To learn more, read our detailed Fortinet FortiAuthenticator vs. Fortinet FortiToken report (Updated: September 2022).
635,513 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"I prefer the passing tool that sent an active directory console to a Fortinet FortiAuthenticator, then Fortinet FortiAuthenticator does not pass the locks.""The most valuable feature is the OTP on the mobile phone.""We have not had issues with Fortinet FortiAuthenticator. It is stable.""Simple to deploy, simple to use, and user-friendly.""It reduces the need for network administrator intervention by allowing the user to perform their own registration and resolve their own password problems and issues.""FortiAuthenticator is easy to use.""The two-step authentication provides a higher level of security.""This is a scalable product."

More Fortinet FortiAuthenticator Pros →

"FortiToken is available in a soft or hard token factor, so there's some flexibility in that. Beyond that, I would say it is a stable solution that has worked for us.""The integrated Fortinet security with the app that allows you to easily do the two-factor authentication is most valuable.""Its ease of use is most valuable. It is simple to use and can be deployed out-of-the-box. It is quite a mature product with all the required features.""Its ease of installation is most valuable. It took me five minutes, and it was up and running. It didn't take me that long. The installation on the cell phones is pretty simple.""I believe FortiToken is the simplest to implement."

More Fortinet FortiToken Pros →

Cons
"The speed of deployment on the cloud could be improved. It took a few days when it should have been just two days""Integration with some other enterprise applications could be improved.""I would like to see more support from Fortinet with tech support people who have as much expertise on the authenticator as they do on their firewalls.""There are some protocols, such as SHA and SHA-2, that are not supported.""We would like to see Linux-based operating systems be able to integrate with FortiAuthenticator to get two-factor authentication running on them. as well. This is a shortcoming that I have faced a few times already.""The only way the solution could be improved is if it were cheaper.""I would like to see more ways to authenticate, such as adding facial recognition to the two-factor, where you log into your phone or another device.""We've had some issues with integration."

More Fortinet FortiAuthenticator Cons →

"I would like to see complete OAuth support. Also, if they can support it from a SaaS (Software as a Service) or cloud platform, that would be great.""Its reporting should be better. The reporting feature is missing. I don't have any reporting of who has done what, what has failed, and what didn't work.""It needs a lot of coupling with their other Fortinet products. To implement FortiToken, I most probably need to couple it with FortiAuthenticator for full implementation. An RSA token can be used with many devices, whereas Fortinet FortiToken is always linked to only one FortiGate device. If I want to reuse the token across five or six FortiGates, I would have to get the FortiAuthenticator product. I can't use one token to connect to different FortiGates, and I need to get another product to enable this functionality. They should also improve the support for their mobile client. There should be a more detailed roadmap for the operating systems being supported. Some of our users were using an old iOS iPhone, and they were forced to get a newer phone because FortiToken didn't support that version of iOS. Similarly, there may be a version of Android that is not supported, so the users need to change the phone. This was one of the reasons why our deployment took longer.""The app could be improved so that you don't have to actually type in the code. It would be great if you can just do a prompt or push similar to the way Duo does.""Fortinet support has some room for improvement. It has taken a long time to resolve some issues or find a workaround."

More Fortinet FortiToken Cons →

Pricing and Cost Advice
  • "The licensing structure is cost-effective for us compared to some of the other solutions that have recurring monthly costs."
  • "FAC is an affordable solution for Middle Range (200E/400E) and also needs a package of mobility agents (2,000) perpetual."
  • "The cost of the license could be less expensive. The license is paid on a yearly basis."
  • "We pay for licensing on a yearly basis."
  • "The pricing is fair."
  • "I rate the price of Fortinet FortiAuthenticator a three out of five."
  • "Between paying them to help with the configuration, the box itself, and the support, it came to like $12,500, including a three-year service agreement."
  • "When we buy the Fortinet FortiAuthenticator device there is a comparison between price and security."
  • More Fortinet FortiAuthenticator Pricing and Cost Advice →

  • "It is included as part of our firewall license."
  • "Overall, it's cheaper than other solutions. Of course, we evaluated it five years back, and I haven't checked to see its current market position, but one reason we adopted FortiToken is its lower cost of ownership relative to other solutions we evaluated."
  • More Fortinet FortiToken Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
    635,513 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Hi, The NAC can operate without the 802.1x mechanism on the switch side. Also, I think you are making a very wrong comparison on the basis of the class it belongs to(FortiNac vs FortiAuthenticator).… more »
    Top Answer:First you have to buy the unit, then you have to buy the license for it. I think we have a 100-user license. The price depends on the model. We have a FAC 300, which channels X number of users, so if… more »
    Top Answer:Its ease of use is most valuable. It is simple to use and can be deployed out-of-the-box. It is quite a mature product with all the required features.
    Top Answer:It needs a lot of coupling with their other Fortinet products. To implement FortiToken, I most probably need to couple it with FortiAuthenticator for full implementation. An RSA token can be used with… more »
    Top Answer:We are using it for VPN. We have its latest version.
    Ranking
    2nd
    Views
    13,447
    Comparisons
    9,547
    Reviews
    14
    Average Words per Review
    485
    Rating
    7.5
    4th
    Views
    7,760
    Comparisons
    6,650
    Reviews
    5
    Average Words per Review
    516
    Rating
    7.6
    Comparisons
    Also Known As
    FortiAuthenticator
    Learn More
    Overview

    Fortinet FortiAuthenticator is the primary secure point of approved access into the Fortinet network, authorizing users, reviewing access permissions, and relaying the information to all Fortigate devices for comparison with identity-based protocols. Fortinet FortiAuthenticator is a top-ranked authorization and SSO solution.

    Appropriate secure access is fundamental to every role in an enterprise ecosystem. It is an integral function of every organization to ensure that every access and privilege is secure and to mitigate any possible risk to an organization. Approved users should only have access to the necessary information when they need it, from the appropriate location(s) to safeguard an organization's security at all times.

    Fortinet FortiAuthenticator is available as an appliance, virtual machine, or in the cloud.

    Fortinet FortiAuthenticator Methods

    • FSSO: FortiAuthenticator Single sign-on user will easily identify users and assign role or group access based on preset identity-based protocols. FortiAuthenticator integrates well with third-party LDAP or active directories, is very flexible, and combines these methods to provide effective security.

    • Active Directory Polling: Active directory access is securely identified by consistent polling of domain controllers. As users log in, username, IP address, and other details are logged into the database and can be shared across devices as directed by FortiAuthenticator protocols.

    • FortiAuthenticator Portal and Widgets: If a user system does not support AP polling, or for other reasons it is not feasible, FortiAuthenticator offers a unique secure authentication portal. Users can be manually authenticated and, to diminish the effect of numerous logins, an intuitive set of widgets is available to integrate into an organization's ecosystem that will automatically grant access to users when they access the organization's intranet homepage.

    • RADIUS Accounting Login: For organizations that use RADIUS authentication, RADIUS Accounting is available for user identification. This process will prompt user access information (IP and group, etc.) and eliminate the need for multiple levels of authentication.

    Reviews from Real Users

    Ernesto C., Presales Engineer at a comms service provider, shares,

    ”Key Features and Benefits

    1. Two-factor/OTP Authentication with FortiToken: Enforce user-based policies. Fortitoken is available in soft and hard versions for flexible usage. Most Valuable in Mobile Phones App for OTP.
    2. Integration with LDAP and AD: This solution integrates with existing enterprise systems and technologies from diverse vendors of user information management systems.
    3. LPAD/AD/RADIUS/SYSLOG/KERBEROS/REST API/FSSO and Web Portals: There is flexible integration with these services.
    4. It is usable in network, WAN, wireless, and VPN Scenarios.
    5. The domain and guest-users support are good.”

    Ibrahim M., Senior Network & Security Engineer at a tech services company, relates, "The initial setup is a valuable point on Fortinet products. Most of the time, putting the theory into practice on the devices is quite friendly and straightforward. As long as you can read English you can find your way around the solution and make it work. This is a high value point on Fortinet - the way everything is laid out in the web UI is user-friendly and quite straightforward. The UI is quite simple."




    As we've seen, passwords alone don't keep unwanted guests out of your network. Password-only authentication has led to security breaches, malware infections, and policy violations. With two-factor authentication, a password is used along with a security token and authentication server to provide far better security.  Authorized employees can remotely access company resources safely using a variety of devices, ranging from lpatops to mobile phones.

    Offer
    Learn more about Fortinet FortiAuthenticator
    Learn more about Fortinet FortiToken
    Sample Customers
    Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
    Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
    Top Industries
    REVIEWERS
    Healthcare Company14%
    Comms Service Provider14%
    Manufacturing Company7%
    Government7%
    VISITORS READING REVIEWS
    Comms Service Provider22%
    Computer Software Company19%
    Government8%
    Manufacturing Company5%
    VISITORS READING REVIEWS
    Comms Service Provider22%
    Computer Software Company21%
    Government8%
    Manufacturing Company5%
    Company Size
    REVIEWERS
    Small Business52%
    Midsize Enterprise33%
    Large Enterprise15%
    VISITORS READING REVIEWS
    Small Business30%
    Midsize Enterprise19%
    Large Enterprise50%
    VISITORS READING REVIEWS
    Small Business33%
    Midsize Enterprise19%
    Large Enterprise48%
    Buyer's Guide
    Fortinet FortiAuthenticator vs. Fortinet FortiToken
    September 2022
    Find out what your peers are saying about Fortinet FortiAuthenticator vs. Fortinet FortiToken and other solutions. Updated: September 2022.
    635,513 professionals have used our research since 2012.

    Fortinet FortiAuthenticator is ranked 2nd in Authentication Systems with 15 reviews while Fortinet FortiToken is ranked 4th in Authentication Systems with 5 reviews. Fortinet FortiAuthenticator is rated 7.6, while Fortinet FortiToken is rated 7.6. The top reviewer of Fortinet FortiAuthenticator writes "A reasonably priced solution that can be scaled toward different functionalities and offers flexible SMS messaging". On the other hand, the top reviewer of Fortinet FortiToken writes "Ease of administration, durable, and is capable of performing solid RADIUS authentications". Fortinet FortiAuthenticator is most compared with Cisco ISE (Identity Services Engine), Azure Active Directory (Azure AD), Duo Security, Microsoft Authenticator and CyberArk Privileged Access Manager, whereas Fortinet FortiToken is most compared with Microsoft Authenticator, Duo Security, Yubico YubiKey, RSA SecurID Access and SafeNet Authentication Manager. See our Fortinet FortiAuthenticator vs. Fortinet FortiToken report.

    See our list of best Authentication Systems vendors.

    We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.