

Find out what your peers are saying about Microsoft, Cisco, Fortinet and others in Authentication Systems.
I am satisfied with their service.
Their resolution time is timely, and they provide solutions efficiently.
I would rate scalability for Fortinet FortiToken as nine and a half or ten.
Regarding Fortinet FortiToken's scalability, we can purchase licenses according to our needs.
There is a need to scale more effectively to accommodate a larger number of users and bulk users.
I would rate stability for Fortinet FortiToken as the best solution.
FortiToken is stable, but there are some restrictions when it comes to supporting two-factor authentication in multi-factor environments.
Any Fortinet FortiToken cannot be removed; if a box expires or loses support, it cannot be removed, and customers must purchase it from scratch.
If I can receive it on email, it would be more flexible.
It is complex to transfer one account to another device, and you can only do it with tech support.
Discounts are often provided to close deals, making it a cost-effective solution.
The pricing for FortiToken is not low; I regard it as medium-priced.
Fortinet FortiToken provides very important security benefits because it is used to manage FortiGate from outside, exclusively with Fortinet FortiToken.
The main use case of FortiToken is that it is a hardware-based solution, providing secure two-factor authentication for administrators.
It is very user-friendly and easily integrates with various firewalls, making it convenient to use within diverse environments.
| Product | Market Share (%) |
|---|---|
| Fortinet FortiToken | 3.5% |
| Microsoft Entra ID | 7.8% |
| Cisco Duo | 5.0% |
| Other | 83.7% |
| Product | Market Share (%) |
|---|---|
| Symantec Identity Governance and Administration | 1.8% |
| SailPoint Identity Security Cloud | 13.7% |
| Microsoft Entra ID | 8.9% |
| Other | 75.6% |

| Company Size | Count |
|---|---|
| Small Business | 18 |
| Midsize Enterprise | 5 |
| Large Enterprise | 9 |
| Company Size | Count |
|---|---|
| Small Business | 23 |
| Midsize Enterprise | 9 |
| Large Enterprise | 45 |
As we've seen, passwords alone don't keep unwanted guests out of your network. Password-only authentication has led to security breaches, malware infections, and policy violations. With two-factor authentication, a password is used along with a security token and authentication server to provide far better security. Authorized employees can remotely access company resources safely using a variety of devices, ranging from lpatops to mobile phones.
The Symantec Identity Governance and Administration (formerly CA Identity Suite) provides comprehensive identity management and governance capabilities with a simple, intuitive user experience. This user experience can dramatically simplify processes such as user access requests and access certifications, resulting in improved productivity and user satisfaction. In addition, the Symantec Identity Governance and Administration performs risk analysis and certification and enables remediation actions in real-time during the access provisioning steps, thereby improving audit performance and risk posture with preventive policy enforcement.
While providing these business and governance-centric capabilities for business users, the Symantec Identity Governance and Administration also delivers core enterprise-grade identity management and governance capabilities, including broad provisioning support for on-premise and cloud apps, extensibility and flexibility to integrate with other IT systems and consumer-grade scale. This means organizations are not forced to choose between usability and performance. With the Symantec Identity Governance and Administration, they can have both.
We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.