No more typing reviews! Try our Samantha, our new voice AI agent.

Fortinet FortiAuthenticator vs Thales Authenticators comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 11, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Fortinet FortiAuthenticator
Ranking in Authentication Systems
5th
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
64
Ranking in other categories
Single Sign-On (SSO) (10th), Identity Management (IM) (14th), Multi-Factor Authentication (MFA) (2nd)
Thales Authenticators
Ranking in Authentication Systems
11th
Average Rating
8.0
Reviews Sentiment
7.6
Number of Reviews
5
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2026, in the Authentication Systems category, the mindshare of Fortinet FortiAuthenticator is 3.7%, down from 8.3% compared to the previous year. The mindshare of Thales Authenticators is 2.2%, down from 2.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Authentication Systems Mindshare Distribution
ProductMindshare (%)
Fortinet FortiAuthenticator3.7%
Thales Authenticators2.2%
Other94.1%
Authentication Systems
 

Featured Reviews

Sachin Vinay - PeerSpot reviewer
Assistant Manager-Networks at a university with 1,001-5,000 employees
Supports secure remote authentication and provides comprehensive user activity tracking
The most important feature is the security capability because it provides a substantial amount of security for admin-related activities. Fortinet FortiAuthenticator can be used from anywhere in the world, and the authenticator services function globally. This global accessibility is one of the critical advantages, particularly since admin features are critical and security is a real concern. With Fortinet FortiAuthenticator, secure usage of firewall services and related functions is achieved. A complete log of all users who access the authenticator setup is maintained. Monthly logs are reviewed to check for any unnoticed activities. Each authenticated user's complete activity history is recorded. This logging capability allows for providing access to more admin users while ensuring security is not compromised and all users can be monitored.
Gustavo Merighi - PeerSpot reviewer
Automation and Telecommunications Analyst at Grupo Energisa
Has an easy-to-use management interface and a straightforward initial setup process
Our primary use cases include multifactor authentication for VPN connections and access to security tools like jump servers and firewalls. We also use it to enhance security measures in an enterprise environment The most valuable feature is the YAML 2.0 integration. It has an easy-to-use…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The initial setup of Fortinet FortiAuthenticator was straightforward, working effectively out of the box."
"Simple to deploy, simple to use, and user-friendly."
"The most valuable features are the performance and ease of use."
"The initial setup is so easy and there is no problem in the implementation."
"I appreciate its ability to provide multi-factor authentication, but it's primarily focused on this function."
"FortiAuthenticator has helped a lot of our customers in the way that they do the business when they onboard their clients to the data center."
"It made things much easier for dealing with users BYOD for our secured wireless networks."
"The most valuable features of Fortinet FortiAuthenticator are easy to configure, secure, and the application has good performance."
"The solution is scalable and stable."
"The most valuable feature of SafeNet Authentication Manager is authentication."
"I like how the solution allows me to support different types of hardware tokens and integrate with OTP."
"The technical support services are good."
"Scalable and stable."
"We use this solution to log into virtual machines like VMware and VMware Horizon."
"The solution has helped our organization by allowing all users to connect securely."
"I like how the solution allows me to support different types of hardware tokens and integrate with OTP."
 

Cons

"If you want some other FortiAuthenticator from one site to another site, you should have requirements, but really if you have authentication and directory or another solution, you should change the password of the authenticator between the solution and the directory and other things."
"There is a room for improvement. The log is a bit difficult to access, and searching the log codes is also a bit difficult. So it would be much better if, when we open a log, it could provide detailed information about errors, reasons for failure, and such."
"The customization capability of Fortinet FortiAuthenticator is not very flexible."
"If you want some other FortiAuthenticator from one site to another site, you should have requirements, but really if you have authentication and directory or another solution, you should change the password of the authenticator between the solution and the directory and other things. So transfer of data and other information should be simpler."
"If two-factor authentication is needed also for the end-devices, for example endpoints or servers, I think FortiAuthenticator is not yet the most mature solution."
"Technical support used to be much better. Fortinet seems to be downgrading, so everything takes longer to get a response in comparison to the past."
"The GUI is on the older side but I'm sure that it will be upgraded soon. It works, but it looks a little dated."
"I would like to see more support from Fortinet with tech support people who have as much expertise on the authenticator as they do on their firewalls."
"The stability could improve."
"The solution should allow for support of multi-tenant architecture."
"The solution should allow for support of multi-tenant architecture."
"I'd like to see integration with other platforms."
"The product could be improved by adding more features for sending tokens via SMS or phone calls."
"Lacks integration with other platforms."
"The scalability could improve, we have a lot of downtimes two years ago; this was in the cloud environment, because we purchased SafeNet Authentication Manager as a cloud service, and sometimes it was down for two or three hours."
"The problem with SafeNet is that it's not integrated with Microsoft 365."
 

Pricing and Cost Advice

"I rate the price of Fortinet FortiAuthenticator a three out of five."
"The licensing structure is cost-effective for us compared to some of the other solutions that have recurring monthly costs."
"We pay for licensing on a yearly basis."
"It is usually cheap. Without a license, you can use some basic features. You can buy a 20-year license and implement the solution once."
"On a scale of one to ten, where one is a high price and ten is a low price, I rate the pricing a seven."
"I rate its pricing a three to five out of ten."
"I would rate the pricing a four out of ten, where one is cheap, and ten is expensive. It is not that costly. It is cheap, easy to manage, easy to install, and easy to configure."
"The pricing is fair."
"Thales is more expensive than its competitors."
"There is an annual licensing fee."
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
893,438 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
11%
Comms Service Provider
10%
Computer Software Company
10%
Financial Services Firm
7%
Financial Services Firm
13%
Comms Service Provider
10%
Government
10%
Manufacturing Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business38
Midsize Enterprise18
Large Enterprise11
No data available
 

Questions from the Community

What needs improvement with Fortinet FortiAuthenticator?
Fortinet can make Fortinet FortiAuthenticator better by having a cloud version of it. Currently, Fortinet FortiAuthenticator is only available for on-premises, and it is an on-premises solution. It...
What is your primary use case for Fortinet FortiAuthenticator?
Fortinet FortiAuthenticator is primarily used for authenticating admin users, including remote admin use cases. Remote admin use cases utilize Fortinet FortiAuthenticator to securely authenticate a...
What needs improvement with Thales Authenticators?
Currently, the solution fulfills our requirements. We are very satisfied with its features, and do not have any specific ideas for improvement right now. Perhaps, in the future, three-factor authen...
What is your primary use case for Thales Authenticators?
Our employees, whether working on-site or remotely, use Thales Authenticators for two-factor authentication to log in to their laptops or PCs. This is our primary use case.
What advice do you have for others considering Thales Authenticators?
From our past years of experience, the solution is very smooth, and we have had a good experience with it. We would definitely recommend Thales to others for its reliability and features. I'd rate ...
 

Also Known As

FortiAuthenticator
Gemalto Ezio, Ezio, Gemalto Authenticators, SafeNet Authentication Manager
 

Overview

 

Sample Customers

Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
Standard Chartered Bank (SCB)
Find out what your peers are saying about Fortinet FortiAuthenticator vs. Thales Authenticators and other solutions. Updated: April 2026.
893,438 professionals have used our research since 2012.