Find out in this report how the two Authentication Systems solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
I am satisfied with their service.
Their resolution time is timely, and they provide solutions efficiently.
I have reached out to technical support for troubleshooting SAML certificate mismatches and federated errors between Ping and enterprise apps.
I would rate scalability for Fortinet FortiToken as nine and a half or ten.
There is a need to scale more effectively to accommodate a larger number of users and bulk users.
Regarding Fortinet FortiToken's scalability, we can purchase licenses according to our needs.
No customers have reported issues with Fortinet FortiToken.
FortiToken is stable, but there are some restrictions when it comes to supporting two-factor authentication in multi-factor environments.
Any Fortinet FortiToken cannot be removed; if a box expires or loses support, it cannot be removed, and customers must purchase it from scratch.
If I can receive it on email, it would be more flexible.
This would allow for broader distribution among a larger number of system admins and software engineers, which is currently not feasible with the existing hardware-only approach.
I would like to enable ServiceNow Generative AI for auto-diagnosing PingFederate SSO failures and suggest remediation steps.
Discounts are often provided to close deals, making it a cost-effective solution.
The pricing for FortiToken is not low; I regard it as medium-priced.
Fortinet FortiToken provides very important security benefits because it is used to manage FortiGate from outside, exclusively with Fortinet FortiToken.
The main use case of FortiToken is that it is a hardware-based solution, providing secure two-factor authentication for administrators.
Fortinet FortiToken has impacted my organization positively by providing enhanced security through an additional security layer.
The platform enhances security measures by analyzing multi-factor authentication attempts, highlighting suspicious patterns, and generating compliance reports.
Product | Market Share (%) |
---|---|
Fortinet FortiToken | 5.1% |
Ping Identity Platform | 4.0% |
Other | 90.9% |
Company Size | Count |
---|---|
Small Business | 17 |
Midsize Enterprise | 5 |
Large Enterprise | 9 |
Company Size | Count |
---|---|
Small Business | 8 |
Midsize Enterprise | 2 |
Large Enterprise | 20 |
As we've seen, passwords alone don't keep unwanted guests out of your network. Password-only authentication has led to security breaches, malware infections, and policy violations. With two-factor authentication, a password is used along with a security token and authentication server to provide far better security. Authorized employees can remotely access company resources safely using a variety of devices, ranging from lpatops to mobile phones.
We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.