Try our new research platform with insights from 80,000+ expert users

ESET EDR/XDR vs Fortinet FortiToken comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

ESET EDR/XDR
Ranking in Authentication Systems
18th
Average Rating
8.6
Reviews Sentiment
4.7
Number of Reviews
4
Ranking in other categories
Endpoint Detection and Response (EDR) (26th), Extended Detection and Response (XDR) (26th)
Fortinet FortiToken
Ranking in Authentication Systems
5th
Average Rating
8.4
Reviews Sentiment
6.9
Number of Reviews
32
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of March 2026, in the Authentication Systems category, the mindshare of ESET EDR/XDR is 0.5%, up from 0.2% compared to the previous year. The mindshare of Fortinet FortiToken is 3.3%, down from 6.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Authentication Systems Mindshare Distribution
ProductMindshare (%)
Fortinet FortiToken3.3%
ESET EDR/XDR0.5%
Other96.2%
Authentication Systems
 

Featured Reviews

GirdharMishra - PeerSpot reviewer
Program Manager at iONE IT Solutions
Centralized monitoring has improved threat visibility and reduced incident response time
In terms of valuable features in ESET EDR/XDR, we focus on endpoint device management as well as for the firewall team, including our log analysis and monitoring the firewall, which are three significant functions for us. ESET EDR/XDR has automated threat detection that gives us real-time incident alerts, and it helps us proactively receive and work on incidents that could have an impact. Regarding the usefulness of ESET EDR/XDR's behavior-based analysis in detecting potential breaches, we have identified some files or configuration files that should remain static, and if any changes occur without proper change management, we are able to identify those changes, including detecting zero-day attacks. The integration of threat intelligence feeds has helped our response strategies, as we are using Oracle OCA-based data analysis, and we have integrated it so that logs are forwarded to our SIEM, allowing us to analyze the data effectively. I evaluate the impact of centralized management on our security operations as very useful because it eliminates the need to log into individual systems to find sources, allowing us to identify all types of risks and vulnerabilities from a single desk.
Ahmed Auf - PeerSpot reviewer
Cybersecurity SNB Technical Manager at a tech services company with 51-200 employees
Has strengthened user authentication and remains reliable despite recent license transfer limitations
I love to work with Fortinet FortiToken because it's easy to configure with any user and with FortiAuthenticator. We uploaded it and use it for any authentication with any user, with integration with any device. With FortiAuthenticator, we integrated it with any server, such as Active Directory, and use the token for VPN and other purposes. In the future, we ask customers to use it with FortiAuthenticator, not just the token, as it provides better integration capabilities. When we buy a specific Fortinet FortiToken, we use it on FortiGate only. Fortinet FortiToken provides very important security benefits because it is used to manage FortiGate from outside, exclusively with Fortinet FortiToken. Without Fortinet FortiToken, administrators cannot use or add admin privileges or manage it from outside, as this could lead to attacks or malicious activity.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The initial setup of ESET EDR_XDR is very simple, easy to deploy, and manage."
"It is pretty easy to install without any hassles, and ESET EDR_XDR has its own cloud portal where everything is available."
"The solution is easy to use."
"ESET EDR/XDR has automated threat detection that gives us real-time incident alerts, and it helps us proactively receive and work on incidents that could have an impact."
"ESET EDR/XDR has automated threat detection that gives us real-time incident alerts, and it helps us proactively receive and work on incidents that could have an impact."
"The solution is unique in catering to Fortinet, making it very useful and secure."
"I love the push-button authentication on FortiToken Mobile. It's also great that the soft token automatically reloads the OTP at intervals, so I always have a fresh code to enter."
"The token-based authentication is good and modern aspect."
"It provides me with the token so that I can do the Multi-Factor Authentication."
"The solution offers push notifications. When you try to connect to the VPN, FortiToken sends a push notification to our customer's device."
"Fortinet FortiToken provides security and authenticates that the right external people are working with a company's system."
"FortiToken is available in a soft or hard token factor, so there's some flexibility in that. Beyond that, I would say it is a stable solution that has worked for us."
"I believe FortiToken is the simplest to implement."
 

Cons

"The solution could improve how it scours each website."
"The memory and CPU footprint can affect performance. It sometimes slows down the CPU performance."
"ESET EDR_XDR needs to conduct more research and development and innovations in early detection of attacks."
"Fortinet FortiToken should improve its push notifications."
"I would like to see if FortiToken can integrate with Office 365 mail to support the same two-factor authentication experience that I have with ESET. With ESET, when a user logs in, they are easily directed to the ESET authentication page, where they are prompted to enter their OTP after supplying their username and password. I understand from support that FortiToken cannot do this with email integration. That's why I opted for ESET."
"The solution comes with two firewalls as a bundle. In that bundle, most of the individual users can be assigned to mobile users. However, in cases of technical difficulties, users may accidentally remove the mobile application. In normal scenarios, we get back to the activation key and assign it again."
"FortiToken should provide enhanced SMS services for those users who do not have smartphones."
"We can only use the tool with the FortiToken Mobile app."
"In my opinion, Fortinet FortiToken can be improved based on specific requirements. We will suggest solutions based on customer requirements and price availability."
"It needs a lot of coupling with their other Fortinet products. To implement FortiToken, I most probably need to couple it with FortiAuthenticator for full implementation. An RSA token can be used with many devices, whereas Fortinet FortiToken is always linked to only one FortiGate device. If I want to reuse the token across five or six FortiGates, I would have to get the FortiAuthenticator product. I can't use one token to connect to different FortiGates, and I need to get another product to enable this functionality. They should also improve the support for their mobile client. There should be a more detailed roadmap for the operating systems being supported. Some of our users were using an old iOS iPhone, and they were forced to get a newer phone because FortiToken didn't support that version of iOS. Similarly, there may be a version of Android that is not supported, so the users need to change the phone. This was one of the reasons why our deployment took longer."
"One suggestion is to develop a more user-friendly solution that is cost-effective so that a hardware-based solution can be provided to all users using VPN services or any configuration service requiring confidentiality."
 

Pricing and Cost Advice

"I rate the solution’s pricing a six or seven out of ten.."
"The solution’s price is good."
"Fortinet FortiToken is not an expensive solution."
"I would rate the pricing as an eight out of ten. We purchased the solution at a reasonable price in 2019."
"On a scale of one to ten, where one is the cheapest, and ten is the highest, I rate the pricing an eight."
"I rate the tool's pricing a five out of ten."
"On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing a six out of ten."
"The solution’s pricing is moderate and reasonable."
"From an Indian perspective, it's definitely costlier."
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
884,933 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Comms Service Provider
16%
Financial Services Firm
14%
Manufacturing Company
8%
Computer Software Company
6%
Computer Software Company
11%
Comms Service Provider
8%
Government
7%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business18
Midsize Enterprise5
Large Enterprise9
 

Questions from the Community

What is your experience regarding pricing and costs for ESET EDR/XDR?
I find the price of ESET EDR/XDR to be competitive to the market, which is a reasonable aspect for us.
What needs improvement with ESET EDR/XDR?
I just deploy and forget it, so I don't get into much detail about improvements. The major setback we face with ESET EDR_XDR is related to costing limitations.
What advice do you have for others considering ESET EDR/XDR?
We might get good pricing one year, and then the next year there could be significant pricing issues. Integration with ESET EDR_XDR is easy, though we don't integrate it with many products. It is p...
What do you like most about Fortinet FortiToken?
The solution is simple and similar to Google Authenticator. It follows time-based authentication. We use it for hardware and software in one environment. The tool offers simple and fast authenticat...
What needs improvement with Fortinet FortiToken?
Fortinet FortiToken is not easy to change because after installing it on one person, it can be transferred to another, but we need support and cannot self-manage it. If we could self-manage transfe...
What is your primary use case for Fortinet FortiToken?
Fortinet FortiToken is primarily used for VPN access to the internet, which is the main use case for my clients and me.
 

Also Known As

ESET Secure Authentication
No data available
 

Overview

 

Sample Customers

Mitsubishi Motors, Canon
Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
Find out what your peers are saying about ESET EDR/XDR vs. Fortinet FortiToken and other solutions. Updated: March 2026.
884,933 professionals have used our research since 2012.