Find out what your peers are saying about Microsoft, Cisco, Fortinet and others in Authentication Systems.
Their resolution time is timely, and they provide solutions efficiently.
Support responds immediately, but I see that some engineers are new or they don't have experience collecting logs, so they take two to three days to come back.
There is a need to scale more effectively to accommodate a larger number of users and bulk users.
Regarding Fortinet FortiToken's scalability, we can purchase licenses according to our needs.
FortiToken is scalable and accommodates the needs for updates effectively.
FortiToken is stable, but there are some restrictions when it comes to supporting two-factor authentication in multi-factor environments.
If I can receive it on email, it would be more flexible.
This would allow for broader distribution among a larger number of system admins and software engineers, which is currently not feasible with the existing hardware-only approach.
FortiToken should provide enhanced SMS services for those users who do not have smartphones.
Another concern is that support is getting reduced by Workspace ONE; some customers are saying there are support issues on Workspace ONE right now.
Discounts are often provided to close deals, making it a cost-effective solution.
The pricing for FortiToken is not low; I regard it as medium-priced.
The main use case of FortiToken is that it is a hardware-based solution, providing secure two-factor authentication for administrators.
The solution is unique in catering to Fortinet, making it very useful and secure.
It is easy to deploy as a Pocha service with Fortinet and is well-suited for enterprise solutions, having found significant use in financial sectors.
In UEM, the most helpful part of Windows Management is the baseline policy and central script; using this, you can replace all the AD GPO policy.
As we've seen, passwords alone don't keep unwanted guests out of your network. Password-only authentication has led to security breaches, malware infections, and policy violations. With two-factor authentication, a password is used along with a security token and authentication server to provide far better security. Authorized employees can remotely access company resources safely using a variety of devices, ranging from lpatops to mobile phones.
VMware Workspace ONE is an intelligence-driven digital workspace platform that delivers any app on any device. It integrates access control, multi-platform endpoint management, and application management. With the VMware Workspace ONE platform, IT teams can deliver a digital workspace that includes the devices and apps of the company’s choice, but with security and control.
VMware Workspace ONE is available:
VMware Workspace ONE Key Features
VMware Workspace ONE Benefits
Some of the benefits of using VMware Workspace ONE include:
Workspace ONE Components
Reviews from Real Users
Below is some feedback from our PeerSpot users who are currently using the solution:
PeerSpot user Patrick B., Cybersecurity Architect at a tech services company, says, "Its UI is extremely easy to use whether you're an advanced user or a novice user. When I first opened it up and had to learn the product, I was easily a novice. By the end of the third month, I was digging into the backend of the system and using it as a highly advanced user to accomplish what I needed to accomplish, and I was able to do it through the UI mostly."
Roshan T., Partner Manager North America at a tech company, mentions how satisfied he is with the product, saying, "You can put all your applications on a mobile device, be it a phone or tablet. It is secure and easy to use. Because it is centrally managed, you don't have to do any configuration on the phone. I just got the phone and connected to the central applications. I just downloaded one thing and everything got rolled out. Email, calendar, and other things were deployed centrally. If you don't have AirWatch, you have to configure your phone manually. For example, you need to deploy and configure your email manually and then synchronize everything. It is much simpler when a mobile device is centrally managed."
We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.