Try our new research platform with insights from 80,000+ expert users

Fortinet FortiAuthenticator vs RSA Adaptive Authentication comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 11, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Fortinet FortiAuthenticator
Ranking in Authentication Systems
3rd
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
63
Ranking in other categories
Single Sign-On (SSO) (7th), Identity Management (IM) (10th), Multi-Factor Authentication (MFA) (2nd)
RSA Adaptive Authentication
Ranking in Authentication Systems
24th
Average Rating
6.8
Number of Reviews
6
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of March 2026, in the Authentication Systems category, the mindshare of Fortinet FortiAuthenticator is 4.1%, down from 8.2% compared to the previous year. The mindshare of RSA Adaptive Authentication is 1.6%, up from 0.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Authentication Systems Mindshare Distribution
ProductMindshare (%)
Fortinet FortiAuthenticator4.1%
RSA Adaptive Authentication1.6%
Other94.3%
Authentication Systems
 

Featured Reviews

Sachin Vinay - PeerSpot reviewer
Assistant Manager-Networks at a university with 1,001-5,000 employees
Supports secure remote authentication and provides comprehensive user activity tracking
The most important feature is the security capability because it provides a substantial amount of security for admin-related activities. Fortinet FortiAuthenticator can be used from anywhere in the world, and the authenticator services function globally. This global accessibility is one of the critical advantages, particularly since admin features are critical and security is a real concern. With Fortinet FortiAuthenticator, secure usage of firewall services and related functions is achieved. A complete log of all users who access the authenticator setup is maintained. Monthly logs are reviewed to check for any unnoticed activities. Each authenticated user's complete activity history is recorded. This logging capability allows for providing access to more admin users while ensuring security is not compromised and all users can be monitored.
Directorc4e7 - PeerSpot reviewer
Director of Cyber Security at a financial services firm with 1,001-5,000 employees
We need better ease of use; the product is overly complicated
There are many use cases that we have defined based on our business needs Ingestion of logs and raising alert space on those logs are the most valuable features. The product is basically unusable. We need better ease of use; it's overly complicated. It has taken years to implement. We used RSA…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable features of Fortinet FortiAuthenticator are easy to configure, secure, and the application has good performance."
"It integrates very tightly with the rest of the Fortinet ecosystem."
"FortiAuthenticator is a very good solution. It is all jury-based. FortiAuthenticator is very easy for anyone to understand how it works and be able to take action."
"FortiAuthenticator is really good software that integrates very well with Fortinet products."
"The initial setup is a valuable point on Fortinet products. Most of the time, putting the theory into practice on the devices is quite friendly and straightforward. As long as you can read English you can find your way around the solution and make it work. This is a high value point on Fortinet - the way everything is laid out in the web UI is user-friendly and quite straightforward. The UI is quite simple."
"The most valuable features are the performance and ease of use."
"Valuable features include the robust SSO features, when you have more complicated authentication within an organization. We can mix AD, Radius, Portal, SSO Portals (Google, etc.), and build our own environment. It is very flexible."
"The product is stable and reliable."
"The most valuable feature is the stock tokens. That works the best for us."
"Ingestion of logs and raising alert space on those logs are the most valuable features."
"The capability to manage your business policy related to security when required without vendor involvement."
"Risk Engine’s risk score, eFN, GeoIP, and device binding all coming together in the Policy Rules to decide when to escalate to MFA."
"Our customer are seeing value from the product, as they experience cost reductions. They can stop fraud from their customers, then their customers can have a better experience from their services."
 

Cons

"Integration with some other enterprise applications could be improved."
"For improvement, Fortinet needs to ensure that they provide quick support to users...Fortinet sometimes needs to respond to users facing issues within an hour."
"We've had some issues with integration."
"There is a room for improvement. The log is a bit difficult to access, and searching the log codes is also a bit difficult. So it would be much better if, when we open a log, it could provide detailed information about errors, reasons for failure, and such."
"The area for improvement in Fortinet FortiAuthenticator is its price."
"A better integration with other vendors."
"FortiAuthenticator should integrate with other applications."
"If you want some other FortiAuthenticator from one site to another site, you should have requirements, but really if you have authentication and directory or another solution, you should change the password of the authenticator between the solution and the directory and other things. So transfer of data and other information should be simpler."
"Better filters when searching for events. The current features for current filters when searching fraud events are not very comprehensive. You can only filter by certain fields in the transaction."
"RSA Adaptive Authentication lacks a mechanism to verify the identity of a new user in the Enrollment event workflow."
"The product is basically unusable. We need better ease of use; it's overly complicated."
"I would like to see a more adaptive type of solution, something that we could use on our web pages..."
"It has taken years to implement."
"Reporting modules is one of the major areas that can be improved further."
 

Pricing and Cost Advice

"We pay for licensing on a yearly basis."
"The pricing is fair."
"I would start off with a VM including the base license and scale according to the number of users you need to authenticate."
"When we buy the Fortinet FortiAuthenticator device there is a comparison between price and security."
"I rate the price of Fortinet FortiAuthenticator a three out of five."
"The customers need to pay for licenses, and some pay on a yearly basis while others pay on a three-yearly or five-yearly basis. Also, it is not an expensive solution."
"I price of the solution is expensive."
"On a scale of one to ten, where one is a high price and ten is a low price, I rate the pricing a seven."
"Customers need to deploy the solution in a very expensive infrastructure. RSA should should think about a less expensive infrastructure for customers because the solution costs around $100,000, and the infrastructure needed to support that solution may be even more expensive than that price."
"You may need to opt for second best if funding is low and the number of users is huge. However, the pricing is able to be negotiated if your user figures are huge."
"The pricing is $50 per head, yearly."
"Keep the proxy service layer on premises. That consumes SaaS security services on the back-end."
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
883,692 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
13%
Comms Service Provider
10%
Manufacturing Company
9%
Government
7%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business38
Midsize Enterprise18
Large Enterprise11
By reviewers
Company SizeCount
Midsize Enterprise1
Large Enterprise6
 

Questions from the Community

What needs improvement with Fortinet FortiAuthenticator?
Fortinet FortiAuthenticator could benefit from some artificial intelligence functionality and resolution of some glitches that may exist.
Ask a question
Earn 20 points
 

Also Known As

FortiAuthenticator
No data available
 

Overview

 

Sample Customers

Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
ADP, Ameritas, Partners Healthcare
Find out what your peers are saying about Fortinet FortiAuthenticator vs. RSA Adaptive Authentication and other solutions. Updated: March 2026.
883,692 professionals have used our research since 2012.