Fortinet FortiAuthenticator and FortiToken compete in the authentication and security management category. Fortinet FortiToken seems to have the upper hand due to its flexible two-factor authentication and integration capabilities.
Features: Fortinet FortiAuthenticator is noted for its seamless integration with other Fortinet devices, centralizing user identity information for improved security management, offering two-factor authentication, certificate management, and diverse user management options. Fortinet FortiToken provides flexible two-factor authentication with both soft and hard tokens, integrates well with LDAP and AD systems, and is valued for its mobile app OTP usability and enhanced integration within the Fortinet ecosystem.
Room for Improvement: Fortinet FortiAuthenticator is critiqued for an older interface and complex settings access, requiring CLI use for some configurations, and could benefit from better documentation and broader third-party integration. Fortinet FortiToken would improve with better mobile app synchronization, an enhanced push notification feature, and wider third-party app integration, alongside a more streamlined token migration process.
Ease of Deployment and Customer Service: Fortinet FortiAuthenticator primarily operates on-premises with some hybrid cloud options and is praised for solid technical support. Fortinet FortiToken offers more deployment flexibility across on-premises, private, and hybrid cloud environments, with generally positive technical support, though improvement is needed in resolving complex issues quickly.
Pricing and ROI: Fortinet FortiAuthenticator is viewed as a cost-effective solution with straightforward licensing, though prices may vary with market exchange rates. Fortinet FortiToken is competitively priced and cost-effective, with affordability being a key advantage in price-sensitive markets. Both products enhance security and compliance, with ROI more tied to security improvements than immediate financial savings.
It enhances security by ensuring only the right person can access systems, even if their login credentials are compromised.
At times, some technical staff lack knowledge, which delays issue resolution.
Technical support from Fortinet deserves a rating of 10.
Customer service and support are excellent.
Their resolution time is timely, and they provide solutions efficiently.
The scalability of FortiAuthenticator is good, and I would rate it an eight on a scale of one to ten.
I find Fortinet FortiAuthenticator to be highly scalable, and I would rate it an eight out of ten for scalability.
Fortinet FortiAuthenticator should be sufficiently scalable.
Regarding Fortinet FortiToken's scalability, we can purchase licenses according to our needs.
There is a need to scale more effectively to accommodate a larger number of users and bulk users.
FortiToken is scalable and accommodates the needs for updates effectively.
It remains stable even when the number of concurrent users increases.
FortiToken is stable, but there are some restrictions when it comes to supporting two-factor authentication in multi-factor environments.
For example, authentication for wireless users expires after 24 hours, requiring re-authentication daily.
I recommend Fortinet make its images migratable between environments.
I would like to see more integration and inclusion of features for ransomware protection directly within the FortiAuthenticator without requiring additional devices.
If I can receive it on email, it would be more flexible.
This would allow for broader distribution among a larger number of system admins and software engineers, which is currently not feasible with the existing hardware-only approach.
FortiToken should provide enhanced SMS services for those users who do not have smartphones.
Fortinet FortiAuthenticator is not overly expensive compared to other Fortinet subscriptions.
Discounts are often provided to close deals, making it a cost-effective solution.
The pricing for FortiToken is not low; I regard it as medium-priced.
The integration with FortiToken is outstanding, adding a layer of security for authentication.
We use multi-factor authentication for enhancing security.
The most valuable feature I find in FortiAuthenticator is web filtering.
The main use case of FortiToken is that it is a hardware-based solution, providing secure two-factor authentication for administrators.
The solution is unique in catering to Fortinet, making it very useful and secure.
It is very user-friendly and easily integrates with various firewalls, making it convenient to use within diverse environments.
Product | Market Share (%) |
---|---|
Fortinet FortiAuthenticator | 7.1% |
Fortinet FortiToken | 5.3% |
Other | 87.6% |
Company Size | Count |
---|---|
Small Business | 38 |
Midsize Enterprise | 17 |
Large Enterprise | 10 |
Company Size | Count |
---|---|
Small Business | 16 |
Midsize Enterprise | 5 |
Large Enterprise | 9 |
Fortinet FortiAuthenticator is the primary secure point of approved access into the Fortinet network, authorizing users, reviewing access permissions, and relaying the information to all Fortigate devices for comparison with identity-based protocols. Fortinet FortiAuthenticator is a top-ranked authorization and SSO solution.
Appropriate secure access is fundamental to every role in an enterprise ecosystem. It is an integral function of every organization to ensure that every access and privilege is secure and to mitigate any possible risk to an organization. Approved users should only have access to the necessary information when they need it, from the appropriate location(s) to safeguard an organization's security at all times.
Fortinet FortiAuthenticator is available as an appliance, virtual machine, or in the cloud.
Fortinet FortiAuthenticator Methods
Reviews from Real Users
Ernesto C., Presales Engineer at a comms service provider, shares,
”Key Features and Benefits
Ibrahim M., Senior Network & Security Engineer at a tech services company, relates, "The initial setup is a valuable point on Fortinet products. Most of the time, putting the theory into practice on the devices is quite friendly and straightforward. As long as you can read English you can find your way around the solution and make it work. This is a high value point on Fortinet - the way everything is laid out in the web UI is user-friendly and quite straightforward. The UI is quite simple."
As we've seen, passwords alone don't keep unwanted guests out of your network. Password-only authentication has led to security breaches, malware infections, and policy violations. With two-factor authentication, a password is used along with a security token and authentication server to provide far better security. Authorized employees can remotely access company resources safely using a variety of devices, ranging from lpatops to mobile phones.
We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.