Try our new research platform with insights from 80,000+ expert users

Fortinet FortiAuthenticator vs Thales Authenticators comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 11, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Fortinet FortiAuthenticator
Ranking in Authentication Systems
3rd
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
63
Ranking in other categories
Single Sign-On (SSO) (7th), Identity Management (IM) (10th), Multi-Factor Authentication (MFA) (2nd)
Thales Authenticators
Ranking in Authentication Systems
11th
Average Rating
8.0
Reviews Sentiment
7.6
Number of Reviews
5
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of March 2026, in the Authentication Systems category, the mindshare of Fortinet FortiAuthenticator is 4.1%, down from 8.2% compared to the previous year. The mindshare of Thales Authenticators is 2.4%, up from 2.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Authentication Systems Mindshare Distribution
ProductMindshare (%)
Fortinet FortiAuthenticator4.1%
Thales Authenticators2.4%
Other93.5%
Authentication Systems
 

Featured Reviews

Sachin Vinay - PeerSpot reviewer
Assistant Manager-Networks at a university with 1,001-5,000 employees
Supports secure remote authentication and provides comprehensive user activity tracking
The most important feature is the security capability because it provides a substantial amount of security for admin-related activities. Fortinet FortiAuthenticator can be used from anywhere in the world, and the authenticator services function globally. This global accessibility is one of the critical advantages, particularly since admin features are critical and security is a real concern. With Fortinet FortiAuthenticator, secure usage of firewall services and related functions is achieved. A complete log of all users who access the authenticator setup is maintained. Monthly logs are reviewed to check for any unnoticed activities. Each authenticated user's complete activity history is recorded. This logging capability allows for providing access to more admin users while ensuring security is not compromised and all users can be monitored.
Gustavo Merighi - PeerSpot reviewer
Automation and Telecommunications Analyst at Grupo Energisa
Has an easy-to-use management interface and a straightforward initial setup process
Our primary use cases include multifactor authentication for VPN connections and access to security tools like jump servers and firewalls. We also use it to enhance security measures in an enterprise environment The most valuable feature is the YAML 2.0 integration. It has an easy-to-use…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"This is a scalable product."
"The integration into tools, including CI/CD pipelines, is easy and handy."
"Using this product strengthens enterprise security."
"FortiAuthenticator is easy to use."
"The solution is an integral part of our security for our email network, and like I said, we'll begin using it for other cloud applications."
"The most valuable feature of the solution is RADIUS service and the social network integration feature."
"The solution is easy to learn and makes it easy for our users to add FortiToken, and it's very easy to integrate if you have other Fortinet devices."
"The most valuable features are the performance and ease of use."
"I like how the solution allows me to support different types of hardware tokens and integrate with OTP."
"Scalable and stable."
"The most valuable feature of SafeNet Authentication Manager is authentication."
"We use this solution to log into virtual machines like VMware and VMware Horizon."
"The solution has helped our organization by allowing all users to connect securely."
"The solution is scalable and stable."
"I like how the solution allows me to support different types of hardware tokens and integrate with OTP."
"The technical support services are good."
 

Cons

"The customization capability of Fortinet FortiAuthenticator is not very flexible."
"The integration with other products, for example, some SAML authentications, would make it more flexible."
"I would like to see more security features in reference to identity login or identity identification."
"There are some protocols, such as SHA and SHA-2, that are not supported."
"The GUI has some shortcomings and can be made better. The GUI is not great."
"It can not use SQL to query FortiAnalyzer directly."
"FortiAuthenticator's interface could be better."
"It does the job I paid for, but the graphical interface could be improved."
"The solution should allow for support of multi-tenant architecture."
"The problem with SafeNet is that it's not integrated with Microsoft 365."
"The product could be improved by adding more features for sending tokens via SMS or phone calls."
"The solution should allow for support of multi-tenant architecture."
"The stability could improve."
"I'd like to see integration with other platforms."
"Lacks integration with other platforms."
"The scalability could improve, we have a lot of downtimes two years ago; this was in the cloud environment, because we purchased SafeNet Authentication Manager as a cloud service, and sometimes it was down for two or three hours."
 

Pricing and Cost Advice

"The solution is not very expensive."
"On a scale of one to ten, where one is a high price and ten is a low price, I rate the pricing a seven."
"It's not expensive."
"I rate its pricing a three to five out of ten."
"I price of the solution is expensive."
"We pay for licensing on a yearly basis."
"I would start off with a VM including the base license and scale according to the number of users you need to authenticate."
"You can pay as you go with them. You purchase a base license and add to it as needed."
"There is an annual licensing fee."
"Thales is more expensive than its competitors."
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
884,976 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
12%
Manufacturing Company
11%
Comms Service Provider
10%
Government
7%
Financial Services Firm
12%
Government
10%
Manufacturing Company
9%
Comms Service Provider
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business38
Midsize Enterprise18
Large Enterprise11
No data available
 

Questions from the Community

What needs improvement with Fortinet FortiAuthenticator?
Fortinet FortiAuthenticator could benefit from some artificial intelligence functionality and resolution of some glitches that may exist.
What needs improvement with Thales Authenticators?
Currently, the solution fulfills our requirements. We are very satisfied with its features, and do not have any specific ideas for improvement right now. Perhaps, in the future, three-factor authen...
What is your primary use case for Thales Authenticators?
Our employees, whether working on-site or remotely, use Thales Authenticators for two-factor authentication to log in to their laptops or PCs. This is our primary use case.
What advice do you have for others considering Thales Authenticators?
From our past years of experience, the solution is very smooth, and we have had a good experience with it. We would definitely recommend Thales to others for its reliability and features. I'd rate ...
 

Also Known As

FortiAuthenticator
Gemalto Ezio, Ezio, Gemalto Authenticators, SafeNet Authentication Manager
 

Overview

 

Sample Customers

Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
Standard Chartered Bank (SCB)
Find out what your peers are saying about Fortinet FortiAuthenticator vs. Thales Authenticators and other solutions. Updated: March 2026.
884,976 professionals have used our research since 2012.