Try our new research platform with insights from 80,000+ expert users

ESET EDR/XDR vs Fortinet FortiToken comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

ESET EDR/XDR
Ranking in Authentication Systems
18th
Average Rating
8.6
Reviews Sentiment
4.7
Number of Reviews
4
Ranking in other categories
Endpoint Detection and Response (EDR) (27th), Extended Detection and Response (XDR) (23rd)
Fortinet FortiToken
Ranking in Authentication Systems
4th
Average Rating
8.4
Reviews Sentiment
7.0
Number of Reviews
31
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of January 2026, in the Authentication Systems category, the mindshare of ESET EDR/XDR is 0.4%, up from 0.2% compared to the previous year. The mindshare of Fortinet FortiToken is 3.6%, down from 6.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Authentication Systems Market Share Distribution
ProductMarket Share (%)
Fortinet FortiToken3.6%
ESET EDR/XDR0.4%
Other96.0%
Authentication Systems
 

Featured Reviews

GirdharMishra - PeerSpot reviewer
Program Manager at iONE IT Solutions
Centralized monitoring has improved threat visibility and reduced incident response time
In terms of valuable features in ESET EDR/XDR, we focus on endpoint device management as well as for the firewall team, including our log analysis and monitoring the firewall, which are three significant functions for us. ESET EDR/XDR has automated threat detection that gives us real-time incident alerts, and it helps us proactively receive and work on incidents that could have an impact. Regarding the usefulness of ESET EDR/XDR's behavior-based analysis in detecting potential breaches, we have identified some files or configuration files that should remain static, and if any changes occur without proper change management, we are able to identify those changes, including detecting zero-day attacks. The integration of threat intelligence feeds has helped our response strategies, as we are using Oracle OCA-based data analysis, and we have integrated it so that logs are forwarded to our SIEM, allowing us to analyze the data effectively. I evaluate the impact of centralized management on our security operations as very useful because it eliminates the need to log into individual systems to find sources, allowing us to identify all types of risks and vulnerabilities from a single desk.
Ahmed Auf - PeerSpot reviewer
Cybersecurity SNB Technical Manager at a tech services company with 51-200 employees
Has strengthened user authentication and remains reliable despite recent license transfer limitations
I love to work with Fortinet FortiToken because it's easy to configure with any user and with FortiAuthenticator. We uploaded it and use it for any authentication with any user, with integration with any device. With FortiAuthenticator, we integrated it with any server, such as Active Directory, and use the token for VPN and other purposes. In the future, we ask customers to use it with FortiAuthenticator, not just the token, as it provides better integration capabilities. When we buy a specific Fortinet FortiToken, we use it on FortiGate only. Fortinet FortiToken provides very important security benefits because it is used to manage FortiGate from outside, exclusively with Fortinet FortiToken. Without Fortinet FortiToken, administrators cannot use or add admin privileges or manage it from outside, as this could lead to attacks or malicious activity.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"ESET EDR/XDR has automated threat detection that gives us real-time incident alerts, and it helps us proactively receive and work on incidents that could have an impact."
"It is pretty easy to install without any hassles, and ESET EDR_XDR has its own cloud portal where everything is available."
"The solution is easy to use."
"ESET EDR/XDR has automated threat detection that gives us real-time incident alerts, and it helps us proactively receive and work on incidents that could have an impact."
"The initial setup of ESET EDR_XDR is very simple, easy to deploy, and manage."
"The product provides secure access to our internal server."
"Fortinet FortiToken has impacted my organization positively by providing enhanced security through an additional security layer."
"I would rate the overall solution an eight out of ten. The solution is a smart product that anyone can easily access and manage. The solution is a good product for multi-factor authentication and to secure remote authentication in the corporate environment."
"Its ease of use is most valuable. It is simple to use and can be deployed out-of-the-box. It is quite a mature product with all the required features."
"We like the mobile FortiToken."
"The most valuable feature of the solution is its mobile application. It is particularly beneficial as it eliminates the need for hardware management."
"I believe FortiToken is the simplest to implement."
"FortiToken is integrated with FortiClient solution for users working from home, providing an additional layer of security by sending OTPs for authentication."
 

Cons

"ESET EDR_XDR needs to conduct more research and development and innovations in early detection of attacks."
"The solution could improve how it scours each website."
"The memory and CPU footprint can affect performance. It sometimes slows down the CPU performance."
"I'm not sure if it's already available, however, I wonder if there's an option to have it sent to my email address instead of having it on the mobile app."
"The app could be improved so that you don't have to actually type in the code. It would be great if you can just do a prompt or push similar to the way Duo does."
"The solution works well. We have nothing to complain about."
"Fortinet support has some room for improvement. It has taken a long time to resolve some issues or find a workaround."
"Maybe the price could be improved, and the integration could be better. But the integration is different from the authenticator side."
"The solution comes with two firewalls as a bundle. In that bundle, most of the individual users can be assigned to mobile users. However, in cases of technical difficulties, users may accidentally remove the mobile application. In normal scenarios, we get back to the activation key and assign it again."
"They need to develop a more user-friendly solution that is cost-effective so that a hardware-based solution can be provided to all users using VPN services or any configuration service requiring confidentiality."
"Configuration can be confusing due to the lack of community and context-sensitive help. We've had to rely on technical support, which slows down the setup process."
 

Pricing and Cost Advice

"I rate the solution’s pricing a six or seven out of ten.."
"On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing a six out of ten."
"On a scale of one to ten, where one is the cheapest, and ten is the highest, I rate the pricing an eight."
"The pricing is not very high, so I'd rate it around six out of ten, where one is high and ten is low."
"The platform's licensing cost is reasonable for our organization."
"I rate the tool's pricing a five out of ten."
"From an Indian perspective, it's definitely costlier."
"The solution’s price is good."
"The solution’s pricing is moderate and reasonable."
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Comms Service Provider
17%
Financial Services Firm
12%
Computer Software Company
8%
Manufacturing Company
8%
Computer Software Company
12%
Comms Service Provider
7%
Government
6%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business17
Midsize Enterprise5
Large Enterprise9
 

Questions from the Community

What is your experience regarding pricing and costs for ESET EDR/XDR?
I find the price of ESET EDR/XDR to be competitive to the market, which is a reasonable aspect for us.
What needs improvement with ESET EDR/XDR?
I just deploy and forget it, so I don't get into much detail about improvements. The major setback we face with ESET EDR_XDR is related to costing limitations.
What advice do you have for others considering ESET EDR/XDR?
We might get good pricing one year, and then the next year there could be significant pricing issues. Integration with ESET EDR_XDR is easy, though we don't integrate it with many products. It is p...
What do you like most about Fortinet FortiToken?
The solution is simple and similar to Google Authenticator. It follows time-based authentication. We use it for hardware and software in one environment. The tool offers simple and fast authenticat...
What needs improvement with Fortinet FortiToken?
Fortinet FortiToken could be improved with flexibility to move it from device to device. With a license, replacement is not possible because Fortinet removed this option. Any Fortinet FortiToken ca...
What is your primary use case for Fortinet FortiToken?
The use case for Fortinet FortiToken involves restrictions on token movement. From two or three months ago, Fortinet has not approved moving FortiToken between devices. Users are not allowed to rep...
 

Also Known As

ESET Secure Authentication
No data available
 

Overview

 

Sample Customers

Mitsubishi Motors, Canon
Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
Find out what your peers are saying about ESET EDR/XDR vs. Fortinet FortiToken and other solutions. Updated: December 2025.
881,082 professionals have used our research since 2012.