No more typing reviews! Try our Samantha, our new voice AI agent.

Fortinet FortiAuthenticator vs RSA Adaptive Authentication comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 11, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Fortinet FortiAuthenticator
Ranking in Authentication Systems
5th
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
64
Ranking in other categories
Single Sign-On (SSO) (10th), Identity Management (IM) (14th), Multi-Factor Authentication (MFA) (2nd)
RSA Adaptive Authentication
Ranking in Authentication Systems
26th
Average Rating
6.8
Number of Reviews
6
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2026, in the Authentication Systems category, the mindshare of Fortinet FortiAuthenticator is 3.7%, down from 8.3% compared to the previous year. The mindshare of RSA Adaptive Authentication is 1.5%, up from 0.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Authentication Systems Mindshare Distribution
ProductMindshare (%)
Fortinet FortiAuthenticator3.7%
RSA Adaptive Authentication1.5%
Other94.8%
Authentication Systems
 

Featured Reviews

Sachin Vinay - PeerSpot reviewer
Assistant Manager-Networks at a university with 1,001-5,000 employees
Supports secure remote authentication and provides comprehensive user activity tracking
The most important feature is the security capability because it provides a substantial amount of security for admin-related activities. Fortinet FortiAuthenticator can be used from anywhere in the world, and the authenticator services function globally. This global accessibility is one of the critical advantages, particularly since admin features are critical and security is a real concern. With Fortinet FortiAuthenticator, secure usage of firewall services and related functions is achieved. A complete log of all users who access the authenticator setup is maintained. Monthly logs are reviewed to check for any unnoticed activities. Each authenticated user's complete activity history is recorded. This logging capability allows for providing access to more admin users while ensuring security is not compromised and all users can be monitored.
Directorc4e7 - PeerSpot reviewer
Director of Cyber Security at a financial services firm with 1,001-5,000 employees
We need better ease of use; the product is overly complicated
There are many use cases that we have defined based on our business needs Ingestion of logs and raising alert space on those logs are the most valuable features. The product is basically unusable. We need better ease of use; it's overly complicated. It has taken years to implement. We used RSA…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The first valuable feature is being able to see everything on one platform. This includes logs and authentication failure."
"The implementation has significantly improved access management within our organization."
"The initial setup is so easy and there is no problem in the implementation."
"FortiAuthenticator centralizes the management and storage of user identity information, thereby increasing the efficiency of administration and increasing the control over who accesses the network."
"The most valuable feature of the solution is RADIUS service and the social network integration feature."
"It has simplified network management, reduced operational costs, and ensured seamless connectivity across all our sites."
"This was a regulation we needed to fill and it worked at a good price."
"The initial setup is very easy."
"Our customer are seeing value from the product, as they experience cost reductions."
"The most valuable feature is the stock tokens. That works the best for us."
"Once we started adopting these products, we've seen the fraud losses go down considerably."
"Risk Engine’s risk score, eFN, GeoIP, and device binding all coming together in the Policy Rules to decide when to escalate to MFA."
"The most valuable feature is the stock tokens, which work the best for us."
"Our customer are seeing value from the product, as they experience cost reductions. They can stop fraud from their customers, then their customers can have a better experience from their services."
"The capability to manage your business policy related to security when required without vendor involvement."
"Ingestion of logs and raising alert space on those logs are the most valuable features."
 

Cons

"A better integration with other vendors."
"The only way the solution could be improved is if it were cheaper."
"The solution could be more automated. It should be able to let me automate a lot of things so that what normally is done as a matter of manual processes can be handled quicker."
"The speed of deployment on the cloud could be improved. It took a few days when it should have been just two days"
"The only issue I encounter is that when not using FortiAuthenticator for an extended period, it's typical to encounter some obstacles in the configuration process that you need to address."
"I would like to see more support from Fortinet with tech support people who have as much expertise on the authenticator as they do on their firewalls."
"The GUI is not fancy enough and some of the settings are difficult to access."
"Up to now, I would not recommend FortiAuthenticator to others yet as I have ongoing transitions and evaluations."
"Reporting modules is one of the major areas that can be improved further."
"The product is basically unusable. We need better ease of use; it's overly complicated."
"Better filters when searching for events. The current features for current filters when searching fraud events are not very comprehensive."
"Reporting modules is one of the major areas that can be improved further."
"It has taken years to implement."
"Better filters when searching for events. The current features for current filters when searching fraud events are not very comprehensive. You can only filter by certain fields in the transaction."
"RSA Adaptive Authentication lacks a mechanism to verify the identity of a new user in the Enrollment event workflow."
"It's an okay solution. It's just old technology and it's time to move on."
 

Pricing and Cost Advice

"It is usually cheap. Without a license, you can use some basic features. You can buy a 20-year license and implement the solution once."
"I price of the solution is expensive."
"The licensing structure is cost-effective for us compared to some of the other solutions that have recurring monthly costs."
"I rate its pricing a three to five out of ten."
"I would rate the pricing a four out of ten, where one is cheap, and ten is expensive. It is not that costly. It is cheap, easy to manage, easy to install, and easy to configure."
"We pay for licensing on a yearly basis."
"The solution is not very expensive."
"Between paying them to help with the configuration, the box itself, and the support, it came to like $12,500, including a three-year service agreement."
"The pricing is $50 per head, yearly."
"Keep the proxy service layer on premises. That consumes SaaS security services on the back-end."
"Customers need to deploy the solution in a very expensive infrastructure. RSA should should think about a less expensive infrastructure for customers because the solution costs around $100,000, and the infrastructure needed to support that solution may be even more expensive than that price."
"You may need to opt for second best if funding is low and the number of users is huge. However, the pricing is able to be negotiated if your user figures are huge."
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
893,915 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
11%
Comms Service Provider
10%
Computer Software Company
10%
Financial Services Firm
7%
Financial Services Firm
32%
Construction Company
11%
Comms Service Provider
10%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business38
Midsize Enterprise18
Large Enterprise11
By reviewers
Company SizeCount
Small Business1
Midsize Enterprise1
Large Enterprise6
 

Questions from the Community

What needs improvement with Fortinet FortiAuthenticator?
Fortinet can make Fortinet FortiAuthenticator better by having a cloud version of it. Currently, Fortinet FortiAuthenticator is only available for on-premises, and it is an on-premises solution. It...
What is your primary use case for Fortinet FortiAuthenticator?
Fortinet FortiAuthenticator is primarily used for authenticating admin users, including remote admin use cases. Remote admin use cases utilize Fortinet FortiAuthenticator to securely authenticate a...
Ask a question
Earn 20 points
 

Also Known As

FortiAuthenticator
No data available
 

Overview

 

Sample Customers

Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
ADP, Ameritas, Partners Healthcare
Find out what your peers are saying about Fortinet FortiAuthenticator vs. RSA Adaptive Authentication and other solutions. Updated: April 2026.
893,915 professionals have used our research since 2012.