Try our new research platform with insights from 80,000+ expert users

Fortinet FortiAuthenticator vs Fortinet FortiToken vs Yubico YubiKey comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Mindshare comparison

As of May 2025, in the Authentication Systems category, the mindshare of Fortinet FortiAuthenticator is 7.7%, up from 7.4% compared to the previous year. The mindshare of Fortinet FortiToken is 6.3%, down from 7.1% compared to the previous year. The mindshare of Yubico YubiKey is 9.1%, down from 10.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Authentication Systems
 

Featured Reviews

Yonas Abebe - PeerSpot reviewer
Integration capabilities simplify authentication and migration challenges need addressing
The integration capabilities of Fortinet FortiAuthenticator are very interesting, as it can be integrated with third-party devices easily and is straightforward to configure. The integration with FortiToken is outstanding, adding a layer of security for authentication. In addition, it can be used by integrating with zero trust single access, enhancing overall security measures.
Sachin Vinay - PeerSpot reviewer
Facilitates secure 2FA for admins, facilitates OTP generation, and enhances security
One suggestion is to develop a more user-friendly solution that is cost-effective so that a hardware-based solution can be provided to all users using VPN services or any configuration service requiring confidentiality. This would allow for broader distribution among a larger number of system admins and software engineers, which is currently not feasible with the existing hardware-only approach.
OmerKhan1 - PeerSpot reviewer
A stable solution that is efficient, user-friendly, and easy to use
It would be better if the product can come up with a serial number for the keys. It would be nice if they had a numbering system as a configuration identity that would help the IT and technical teams to identify the keys because they look all the same. It would be more like putting a tag on them.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I prefer the passing tool that sent an active directory console to a Fortinet FortiAuthenticator, then Fortinet FortiAuthenticator does not pass the locks."
"The product’s most valuable feature is integration with FortiGate, FortiToken, FortiTalk, and multi-factor authentication."
"The feature I value the most is the one-time passwords because it helps to authenticate users so you know the timing of their usage."
"The most valuable feature of the solution is RADIUS service and the social network integration feature."
"FortiAuthenticator is easy to use."
"For someone concerned with multifactor authentication, I'm satisfied with the product."
"Valuable features include the robust SSO features, when you have more complicated authentication within an organization. We can mix AD, Radius, Portal, SSO Portals (Google, etc.), and build our own environment. It is very flexible."
"Fulfilled our requirement at a good price."
"Fortinet offers a comprehensive solution for network security, particularly with its very effective zero-trust network access approach."
"The deployment is quick and simple."
"The solution is simple and similar to Google Authenticator. It follows time-based authentication. We use it for hardware and software in one environment. The tool offers simple and fast authentication for SSL."
"The product provides secure access to our internal server."
"I believe FortiToken is the simplest to implement."
"Fortinet FortiToken is used for double factor authentication."
"The tool's support is the best."
"Its ease of use is most valuable. It is simple to use and can be deployed out-of-the-box. It is quite a mature product with all the required features."
"The solution is simple to use and we have installed it in our clients' endpoints. The tool is just plug-and-play for the end user. The end user can just put in the key to the security computer and log in without any hassle. The solution is efficient, user-friendly, and easy to use."
"The most valuable feature of Yubico YubiKey is security."
"It's small and lightweight. Like a phone, it doesn't run out of battery. It also doesn't have to be unlocked. It doesn't break. Moreover, they're very durable and it's very convenient."
"YubiKey is a hardware security device with advanced security features."
"Yubico YubiKey is highly valued for its anti-phishing feature, which prevents phishing of OTPs that are normally obtained through phones."
 

Cons

"No SMS gateway from the ISP"
"The solution's command line interface could be improved to provide better support for low-level debugging and advanced configurations."
"We would like to see Linux-based operating systems be able to integrate with FortiAuthenticator to get two-factor authentication running on them. as well. This is a shortcoming that I have faced a few times already."
"Integration with some other enterprise applications could be improved."
"If you want some other FortiAuthenticator from one site to another site, you should have requirements, but really if you have authentication and directory or another solution, you should change the password of the authenticator between the solution and the directory and other things. So transfer of data and other information should be simpler."
"There is room for improvement in stability and support."
"There are some protocols, such as SHA and SHA-2, that are not supported."
"Integration with FortiGate could be more fluid."
"One suggestion is to develop a more user-friendly solution that is cost-effective so that a hardware-based solution can be provided to all users using VPN services or any configuration service requiring confidentiality."
"You need your mobile just to enroll the tokens, and sometimes, it's difficult to use for someone who is not knowledgeable"
"We can only use the tool with the FortiToken Mobile app."
"FortiToken should provide enhanced SMS services for those users who do not have smartphones."
"The solution could introduce a mobile application instead of a physical product."
"Its reporting should be better. The reporting feature is missing. I don't have any reporting of who has done what, what has failed, and what didn't work."
"The solution comes with two firewalls as a bundle. In that bundle, most of the individual users can be assigned to mobile users. However, in cases of technical difficulties, users may accidentally remove the mobile application. In normal scenarios, we get back to the activation key and assign it again."
"I would like to see if FortiToken can integrate with Office 365 mail to support the same two-factor authentication experience that I have with ESET. With ESET, when a user logs in, they are easily directed to the ESET authentication page, where they are prompted to enter their OTP after supplying their username and password. I understand from support that FortiToken cannot do this with email integration. That's why I opted for ESET."
"Yubico YubiKey could be improved by allowing for centralized administration, which is not currently available in India."
"It would be better if the product can come up with a serial number for the keys. It would be nice if they had a numbering system as a configuration identity that would help the IT and technical teams to identify the keys because they look all the same. It would be more like putting a tag on them."
"Yubico YubiKey is inconvient. No one likes the idea of having to put a USB device into the system, having to remember to take it out, and having passwords. It may be very good for security but it is not great for people to use."
"Currently, an area where the product lacks is in addressing service needs."
"It's a hardware device, so it isn't cost-effective to use for all your accounts. You might have a hard time getting budget approval. It's better to take a strategic approach and use it only for critical accounts. You can use other forms of authentication for the rest."
 

Pricing and Cost Advice

"When we buy the Fortinet FortiAuthenticator device there is a comparison between price and security."
"I price of the solution is expensive."
"The customers need to pay for licenses, and some pay on a yearly basis while others pay on a three-yearly or five-yearly basis. Also, it is not an expensive solution."
"The price seems okay. It's not that expensive compared to other authenticators."
"The platform provides a user-based pricing model rather than a subscription pricing model."
"On a scale of one to ten, where one is a high price and ten is a low price, I rate the pricing a seven."
"It is usually cheap. Without a license, you can use some basic features. You can buy a 20-year license and implement the solution once."
"I rate the price of Fortinet FortiAuthenticator a three out of five."
"The pricing is not very high, so I'd rate it around six out of ten, where one is high and ten is low."
"Although the platform is relatively expensive, it offers significant value. I rate the pricing a nine out of ten."
"The solution’s price is good."
"The platform's licensing cost is reasonable for our organization."
"From an Indian perspective, it's definitely costlier."
"The solution’s pricing is moderate and reasonable."
"I would rate the pricing as an eight out of ten. We purchased the solution at a reasonable price in 2019."
"Fortinet FortiToken is not an expensive solution."
"We paid 100 bucks for one Yubikey."
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
850,760 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Comms Service Provider
9%
Financial Services Firm
8%
Government
8%
Computer Software Company
18%
Financial Services Firm
8%
Government
7%
University
6%
Computer Software Company
13%
Government
12%
Financial Services Firm
10%
Manufacturing Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for Fortinet FortiAuthenticator?
Fortinet FortiAuthenticator is not overly expensive compared to other Fortinet subscriptions. However, it would be be...
What needs improvement with Fortinet FortiAuthenticator?
Initially, we deployed Fortinet FortiAuthenticator on VMware and faced challenges when migrating to an OpenStack envi...
What do you like most about Fortinet FortiToken?
The solution is simple and similar to Google Authenticator. It follows time-based authentication. We use it for hardw...
What is your primary use case for Fortinet FortiToken?
I am using FortiToken for logging into the Fortinet hardware. I have four FortiGate hardware units. I am connected th...
What do you like most about Yubico YubiKey?
The solution is simple to use and we have installed it in our clients' endpoints. The tool is just plug-and-play for ...
What needs improvement with Yubico YubiKey?
Yubico YubiKey could be improved by allowing for centralized administration, which is not currently available in Indi...
What is your primary use case for Yubico YubiKey?
I primarily use Yubico YubiKey ( /products/yubico-yubikey-reviews ) for authentication in environments such as Active...
 

Also Known As

FortiAuthenticator
No data available
YubiKey
 

Overview

 

Sample Customers

Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
Google Inc., Salesforce, Novartis, Facebook, GitHub, CERN, Duke University, Code Enigma, Luther Burbank High School, ZorgSaam, Agfa, Santa Clara County Fire Department, Dyson Ltd, Portugal Telecom, Boral, Canonical Ltd
Find out what your peers are saying about Microsoft, Cisco, Fortinet and others in Authentication Systems. Updated: May 2025.
850,760 professionals have used our research since 2012.