Fortinet FortiToken vs Thales Authenticators comparison

Cancel
You must select at least 2 products to compare!
Fortinet Logo
6,743 views|5,235 comparisons
82% willing to recommend
Thales Cloud Security Logo
1,810 views|1,578 comparisons
100% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Fortinet FortiToken and Thales Authenticators based on real PeerSpot user reviews.

Find out what your peers are saying about Microsoft, Cisco, Fortinet and others in Authentication Systems.
To learn more, read our detailed Authentication Systems Report (Updated: April 2024).
767,319 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"I believe FortiToken is the simplest to implement.""Fortinet FortiToken provides security and authenticates that the right external people are working with a company's system.""I love the push-button authentication on FortiToken Mobile. It's also great that the soft token automatically reloads the OTP at intervals, so I always have a fresh code to enter.""The integrated Fortinet security with the app that allows you to easily do the two-factor authentication is most valuable.""The token-based authentication is good and modern aspect.""I appreciate that it provides comprehensive security. It is tailored to this specific purpose, and it excels in fulfilling this purpose.""We like the mobile FortiToken.""Stability-wise, I rate the solution a ten out of ten."

More Fortinet FortiToken Pros →

"I like how the solution allows me to support different types of hardware tokens and integrate with OTP.""The most valuable feature of SafeNet Authentication Manager is authentication.""Scalable and stable.""We use this solution to log into virtual machines like VMware and VMware Horizon."

More Thales Authenticators Pros →

Cons
"It needs a lot of coupling with their other Fortinet products. To implement FortiToken, I most probably need to couple it with FortiAuthenticator for full implementation. An RSA token can be used with many devices, whereas Fortinet FortiToken is always linked to only one FortiGate device. If I want to reuse the token across five or six FortiGates, I would have to get the FortiAuthenticator product. I can't use one token to connect to different FortiGates, and I need to get another product to enable this functionality. They should also improve the support for their mobile client. There should be a more detailed roadmap for the operating systems being supported. Some of our users were using an old iOS iPhone, and they were forced to get a newer phone because FortiToken didn't support that version of iOS. Similarly, there may be a version of Android that is not supported, so the users need to change the phone. This was one of the reasons why our deployment took longer.""You need your mobile just to enroll the tokens, and sometimes, it's difficult to use for someone who is not knowledgeable""Fortinet support has some room for improvement. It has taken a long time to resolve some issues or find a workaround.""Configuration can be confusing due to the lack of community and context-sensitive help. We've had to rely on technical support, which slows down the setup process.""The app could be improved so that you don't have to actually type in the code. It would be great if you can just do a prompt or push similar to the way Duo does.""I would like to see if FortiToken can integrate with Office 365 mail to support the same two-factor authentication experience that I have with ESET. With ESET, when a user logs in, they are easily directed to the ESET authentication page, where they are prompted to enter their OTP after supplying their username and password. I understand from support that FortiToken cannot do this with email integration. That's why I opted for ESET.""The solution works well. We have nothing to complain about.""It could be integrated better if you could have your FortiToken, and the license would allow you to work across multiple FortiGate solutions."

More Fortinet FortiToken Cons →

"The problem with SafeNet is that it's not integrated with Microsoft 365.""The stability could improve.""Lacks integration with other platforms.""The solution should allow for support of multi-tenant architecture."

More Thales Authenticators Cons →

Pricing and Cost Advice
  • "It is included as part of our firewall license."
  • "Overall, it's cheaper than other solutions. Of course, we evaluated it five years back, and I haven't checked to see its current market position, but one reason we adopted FortiToken is its lower cost of ownership relative to other solutions we evaluated."
  • "I would rate the pricing as an eight out of ten. We purchased the solution at a reasonable price in 2019."
  • "On a scale of one to ten, where one is the cheapest, and ten is the highest, I rate the pricing an eight."
  • "The solution’s price is good."
  • "Fortinet FortiToken is not an expensive solution."
  • "The pricing is not very high, so I'd rate it around six out of ten, where one is high and ten is low."
  • "From an Indian perspective, it's definitely costlier."
  • More Fortinet FortiToken Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
    767,319 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The token-based authentication is good and modern aspect.
    Top Answer:The management configuration seems a bit complex and could benefit from user guides or better support resources. It could be improved in terms of user-friendliness. Not like the other FortiGate… more »
    Top Answer:We're aiming to provide every user with mobile token-based two-factor authentication (2FA) to enhance security. It's for internal security.
    Top Answer:We use this solution to log into virtual machines like VMware and VMware Horizon.
    Top Answer:The problem with SafeNet is that it's not integrated with Microsoft 365. That was the breaking point for us. The security is a little bit redundant because if you have already unlocked your phone… more »
    Top Answer:We use this solution to log into virtual machines like VMware and VMware Horizon. The solution is deployed on a hybrid cloud.
    Ranking
    4th
    Views
    6,743
    Comparisons
    5,235
    Reviews
    12
    Average Words per Review
    460
    Rating
    8.3
    17th
    Views
    1,810
    Comparisons
    1,578
    Reviews
    1
    Average Words per Review
    406
    Rating
    8.0
    Comparisons
    Also Known As
    Gemalto Ezio, Ezio, Gemalto Authenticators, SafeNet Authentication Manager
    Learn More
    Overview

    As we've seen, passwords alone don't keep unwanted guests out of your network. Password-only authentication has led to security breaches, malware infections, and policy violations. With two-factor authentication, a password is used along with a security token and authentication server to provide far better security.  Authorized employees can remotely access company resources safely using a variety of devices, ranging from lpatops to mobile phones.

    Offering the broadest range of authentication methods and form factors, Thales allows customers to address numerous use cases, assurance levels, and threat vectors with unified, centrally managed policies—managed from one authentication back end delivered in the cloud or on premise.

    Sample Customers
    Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
    Standard Chartered Bank (SCB)
    Top Industries
    REVIEWERS
    Comms Service Provider23%
    Computer Software Company23%
    Financial Services Firm15%
    Engineering Company8%
    VISITORS READING REVIEWS
    Computer Software Company19%
    Comms Service Provider9%
    Government7%
    Financial Services Firm6%
    VISITORS READING REVIEWS
    Computer Software Company18%
    Financial Services Firm14%
    Government10%
    Comms Service Provider10%
    Company Size
    REVIEWERS
    Small Business55%
    Midsize Enterprise25%
    Large Enterprise20%
    VISITORS READING REVIEWS
    Small Business33%
    Midsize Enterprise18%
    Large Enterprise48%
    VISITORS READING REVIEWS
    Small Business23%
    Midsize Enterprise12%
    Large Enterprise66%
    Buyer's Guide
    Authentication Systems
    April 2024
    Find out what your peers are saying about Microsoft, Cisco, Fortinet and others in Authentication Systems. Updated: April 2024.
    767,319 professionals have used our research since 2012.

    Fortinet FortiToken is ranked 4th in Authentication Systems with 19 reviews while Thales Authenticators is ranked 17th in Authentication Systems with 4 reviews. Fortinet FortiToken is rated 8.2, while Thales Authenticators is rated 7.8. The top reviewer of Fortinet FortiToken writes "A stable and scalable solution that provides an affordable and perpetual license". On the other hand, the top reviewer of Thales Authenticators writes "Responsive support, effective authentication, but stability could improve". Fortinet FortiToken is most compared with Fortinet FortiAuthenticator, Microsoft Entra ID, Cisco Duo, Yubico YubiKey and BIO-key, whereas Thales Authenticators is most compared with Yubico YubiKey, Microsoft Entra ID, Cisco Duo, Atalla Hardware Security Module and CRYPTOCARD BlackShield.

    See our list of best Authentication Systems vendors.

    We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.