No more typing reviews! Try our Samantha, our new voice AI agent.

Fortinet FortiAuthenticator vs Yubico YubiKey comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 11, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Fortinet FortiAuthenticator
Ranking in Authentication Systems
4th
Ranking in Multi-Factor Authentication (MFA)
2nd
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
64
Ranking in other categories
Single Sign-On (SSO) (7th), Identity Management (IM) (10th)
Yubico YubiKey
Ranking in Authentication Systems
6th
Ranking in Multi-Factor Authentication (MFA)
3rd
Average Rating
8.6
Reviews Sentiment
7.1
Number of Reviews
5
Ranking in other categories
Passwordless Authentication (2nd)
 

Mindshare comparison

As of April 2026, in the Authentication Systems category, the mindshare of Fortinet FortiAuthenticator is 3.6%, down from 8.2% compared to the previous year. The mindshare of Yubico YubiKey is 3.6%, down from 9.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Authentication Systems Mindshare Distribution
ProductMindshare (%)
Fortinet FortiAuthenticator3.6%
Yubico YubiKey3.6%
Other92.8%
Authentication Systems
 

Featured Reviews

Sachin Vinay - PeerSpot reviewer
Assistant Manager-Networks at a university with 1,001-5,000 employees
Supports secure remote authentication and provides comprehensive user activity tracking
The most important feature is the security capability because it provides a substantial amount of security for admin-related activities. Fortinet FortiAuthenticator can be used from anywhere in the world, and the authenticator services function globally. This global accessibility is one of the critical advantages, particularly since admin features are critical and security is a real concern. With Fortinet FortiAuthenticator, secure usage of firewall services and related functions is achieved. A complete log of all users who access the authenticator setup is maintained. Monthly logs are reviewed to check for any unnoticed activities. Each authenticated user's complete activity history is recorded. This logging capability allows for providing access to more admin users while ensuring security is not compromised and all users can be monitored.
KM
Co-Founder at LBR Infosolutions
Robust authentication boosts security in restricted environments
Yubico YubiKey is highly valued for its anti-phishing feature, which prevents phishing of OTPs that are normally obtained through phones. The security features of Yubico YubiKey make it stand out among other MFA products in India, as it prevents anyone from accessing my password or PIN. Additionally, it supports receiving OTPs on phones.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It has simplified network management, reduced operational costs, and ensured seamless connectivity across all our sites."
"Fulfilled our requirement at a good price."
"Once you configure it properly, it runs fine."
"I really like the two-step authentication, it provides a higher level of security that we didn't have previously."
"The most valuable feature is the OTP on the mobile phone."
"The solution is very easy to manage."
"The product enables SSO."
"It made things much easier for dealing with users BYOD for our secured wireless networks."
"The most valuable feature of Yubico YubiKey is security."
"It's small and lightweight. Like a phone, it doesn't run out of battery. It also doesn't have to be unlocked. It doesn't break. Moreover, they're very durable and it's very convenient."
"The solution is simple to use and we have installed it in our clients' endpoints. The tool is just plug-and-play for the end user. The end user can just put in the key to the security computer and log in without any hassle. The solution is efficient, user-friendly, and easy to use."
"YubiKey is a hardware security device with advanced security features."
"The most valuable feature of Yubico YubiKey is security."
"Yubico YubiKey is highly valued for its anti-phishing feature, which prevents phishing of OTPs that are normally obtained through phones."
 

Cons

"There are multiple areas that are in need of improvement. It is not a mature product."
"There are some issues with integration."
"I would like to see more security features in reference to identity login or identity identification."
"There is a room for improvement. The log is a bit difficult to access, and searching the log codes is also a bit difficult. So it would be much better if, when we open a log, it could provide detailed information about errors, reasons for failure, and such."
"I don't have any issues with this solution, but it may need a better, more user-friendly interface or better design of the platform."
"It does the job I paid for, but the graphical interface could be improved."
"The price of the solution could improve, it is expensive."
"The GUI is not fancy enough and some of the settings are difficult to access."
"It's a hardware device, so it isn't cost-effective to use for all your accounts. You might have a hard time getting budget approval. It's better to take a strategic approach and use it only for critical accounts. You can use other forms of authentication for the rest."
"Yubico YubiKey is inconvenient. No one likes the idea of having to put a USB device into the system, having to remember to take it out, and having passwords."
"Currently, an area where the product lacks is in addressing service needs."
"It would be better if the product can come up with a serial number for the keys. It would be nice if they had a numbering system as a configuration identity that would help the IT and technical teams to identify the keys because they look all the same. It would be more like putting a tag on them."
"Yubico YubiKey could be improved by allowing for centralized administration, which is not currently available in India."
"Yubico YubiKey is inconvient. No one likes the idea of having to put a USB device into the system, having to remember to take it out, and having passwords. It may be very good for security but it is not great for people to use."
 

Pricing and Cost Advice

"FAC is an affordable solution for Middle Range (200E/400E) and also needs a package of mobility agents (2,000) perpetual."
"It's not expensive."
"I rate the product price as two or three on a one-to-ten scale, where one is expensive, and ten is cheap."
"The product has affordable pricing compared to other vendors."
"The customers need to pay for licenses, and some pay on a yearly basis while others pay on a three-yearly or five-yearly basis. Also, it is not an expensive solution."
"I would start off with a VM including the base license and scale according to the number of users you need to authenticate."
"The product could be more competitively priced."
"The cost of the license could be less expensive. The license is paid on a yearly basis."
"We paid 100 bucks for one Yubikey."
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
890,088 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
10%
Computer Software Company
10%
Comms Service Provider
10%
Government
7%
Government
11%
Financial Services Firm
10%
Manufacturing Company
9%
Computer Software Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business38
Midsize Enterprise18
Large Enterprise11
No data available
 

Questions from the Community

What needs improvement with Fortinet FortiAuthenticator?
Fortinet FortiAuthenticator could benefit from some artificial intelligence functionality and resolution of some glitches that may exist.
What is your primary use case for Fortinet FortiAuthenticator?
Fortinet FortiAuthenticator is primarily used for authenticating admin users, including remote admin use cases. Remote admin use cases utilize Fortinet FortiAuthenticator to securely authenticate a...
What needs improvement with Yubico YubiKey?
Yubico YubiKey could be improved by allowing for centralized administration, which is not currently available in India. In India, administrators typically have control over all security devices, bu...
What is your primary use case for Yubico YubiKey?
I primarily use Yubico YubiKey ( /products/yubico-yubikey-reviews ) for authentication in environments such as Active Directory, cloud administration, trading room, and dealing room where phones ar...
What advice do you have for others considering Yubico YubiKey?
From an individual perspective, no improvements are required for Yubico YubiKey. However, at a corporate or enterprise level, a central control mechanism is necessary, which is currently lacking in...
 

Also Known As

FortiAuthenticator
YubiKey
 

Overview

 

Sample Customers

Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
Google Inc., Salesforce, Novartis, Facebook, GitHub, CERN, Duke University, Code Enigma, Luther Burbank High School, ZorgSaam, Agfa, Santa Clara County Fire Department, Dyson Ltd, Portugal Telecom, Boral, Canonical Ltd
Find out what your peers are saying about Fortinet FortiAuthenticator vs. Yubico YubiKey and other solutions. Updated: April 2026.
890,088 professionals have used our research since 2012.