2021-03-09T21:48:01Z

What is your primary use case for Fortinet FortiToken?

Miriam Tover - PeerSpot reviewer
  • 0
  • 50
PeerSpot user
10

10 Answers

MOHAN SUKUMAR - PeerSpot reviewer
Real User
Top 5
2024-02-05T09:57:42Z
Feb 5, 2024
Search for a product comparison
JunedhRehman - PeerSpot reviewer
Real User
Top 5Leaderboard
2023-12-26T16:35:13Z
Dec 26, 2023
CO
Real User
Top 5
2023-09-27T08:38:24Z
Sep 27, 2023
MM
Real User
Top 5Leaderboard
2023-08-10T10:05:36Z
Aug 10, 2023
Paul Duxfield - PeerSpot reviewer
Real User
Top 5Leaderboard
2023-06-14T07:55:01Z
Jun 14, 2023
C N R Prabashan - PeerSpot reviewer
Real User
Top 5
2023-02-24T08:41:00Z
Feb 24, 2023
Learn what your peers think about Fortinet FortiToken. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,246 professionals have used our research since 2012.
SC
Real User
Top 10
2023-01-18T14:10:53Z
Jan 18, 2023
Ehab.Fawzy Mohamed - PeerSpot reviewer
Real User
Top 5
2022-09-27T10:56:30Z
Sep 27, 2022
US
MSP
2022-02-23T11:52:55Z
Feb 23, 2022
PG
Real User
2021-03-09T21:48:01Z
Mar 9, 2021
As we've seen, passwords alone don't keep unwanted guests out of your network. Password-only authentication has led to security breaches, malware infections, and policy violations. With two-factor authentication, a password is used along with a security token and authentication server to provide far better security.  Authorized employees can remotely access company resources safely using a variety of devices, ranging from lpatops to mobile phones.
Download Fortinet FortiToken ReportRead more