

Fortinet FortiAuthenticator and Fortinet FortiToken are competitors in the security authentication category. FortiAuthenticator has the upper hand due to its robust network integration and centralized management capabilities, while FortiToken is preferred for its ease of use and mobile compatibility.
Features: FortiAuthenticator offers integration within the Fortinet ecosystem, detailed logging, and flexible authentication methods including SMS, email, and mobile tokens. It centralizes identity management to enhance security and efficiency. FortiToken focuses on OTP functionality via mobile devices, offering both soft and hard tokens, and is recognized for its smooth integration with Fortinet products and a mobile-focused authentication solution.
Room for Improvement: FortiAuthenticator could improve non-Fortinet system integration, simplify its interface, and provide more intuitive setup processes with better documentation. FortiToken could enhance management flexibility, particularly in token transfers between devices and improving push notifications.
Ease of Deployment and Customer Service: Both products are praised for ease of deployment, especially on-premises. FortiToken is noted for its adaptability with cloud environments. Fortinet's customer service is considered responsive and knowledgeable, though improvements could be made in handling complex queries.
Pricing and ROI: FortiAuthenticator is viewed as cost-effective with a licensing structure beneficial for large deployments, while FortiToken is appreciated for its affordability. Users value the competitive pricing of both solutions, with FortiAuthenticator providing a positive ROI through improved security and compliance.
It enhances security by ensuring only the right person can access systems, even if their login credentials are compromised.
The technical support team is proficient and has all necessary resources to support all types of requirements.
Customer service and support are excellent.
At times, some technical staff lack knowledge, which delays issue resolution.
I am satisfied with their service.
Their resolution time is timely, and they provide solutions efficiently.
I find Fortinet FortiAuthenticator to be highly scalable, and I would rate it an eight out of ten for scalability.
The scalability of FortiAuthenticator is good, and I would rate it an eight on a scale of one to ten.
Fortinet FortiAuthenticator should be sufficiently scalable.
There is a need to scale more effectively to accommodate a larger number of users and bulk users.
Regarding Fortinet FortiToken's scalability, we can purchase licenses according to our needs.
I would rate scalability for Fortinet FortiToken as nine and a half or ten.
It remains stable even when the number of concurrent users increases.
I would rate stability for Fortinet FortiToken as the best solution.
FortiToken is stable, but there are some restrictions when it comes to supporting two-factor authentication in multi-factor environments.
For example, authentication for wireless users expires after 24 hours, requiring re-authentication daily.
I recommend Fortinet make its images migratable between environments.
Fortinet FortiAuthenticator could benefit from some artificial intelligence functionality.
Any Fortinet FortiToken cannot be removed; if a box expires or loses support, it cannot be removed, and customers must purchase it from scratch.
If I can receive it on email, it would be more flexible.
This would allow for broader distribution among a larger number of system admins and software engineers, which is currently not feasible with the existing hardware-only approach.
Fortinet FortiAuthenticator is not overly expensive compared to other Fortinet subscriptions.
Discounts are often provided to close deals, making it a cost-effective solution.
The pricing for FortiToken is not low; I regard it as medium-priced.
The integration with FortiToken is outstanding, adding a layer of security for authentication.
This logging capability allows for providing access to more admin users while ensuring security is not compromised and all users can be monitored.
We use multi-factor authentication for enhancing security.
Fortinet FortiToken provides very important security benefits because it is used to manage FortiGate from outside, exclusively with Fortinet FortiToken.
The main use case of FortiToken is that it is a hardware-based solution, providing secure two-factor authentication for administrators.
The most important benefit of Fortinet FortiToken is the security it provides for accessing the intranet inside the office.
| Product | Market Share (%) |
|---|---|
| Fortinet FortiAuthenticator | 4.1% |
| Fortinet FortiToken | 3.5% |
| Other | 92.4% |


| Company Size | Count |
|---|---|
| Small Business | 38 |
| Midsize Enterprise | 18 |
| Large Enterprise | 11 |
| Company Size | Count |
|---|---|
| Small Business | 18 |
| Midsize Enterprise | 5 |
| Large Enterprise | 9 |
Fortinet FortiAuthenticator is the primary secure point of approved access into the Fortinet network, authorizing users, reviewing access permissions, and relaying the information to all Fortigate devices for comparison with identity-based protocols. Fortinet FortiAuthenticator is a top-ranked authorization and SSO solution.
Appropriate secure access is fundamental to every role in an enterprise ecosystem. It is an integral function of every organization to ensure that every access and privilege is secure and to mitigate any possible risk to an organization. Approved users should only have access to the necessary information when they need it, from the appropriate location(s) to safeguard an organization's security at all times.
Fortinet FortiAuthenticator is available as an appliance, virtual machine, or in the cloud.
Fortinet FortiAuthenticator Methods
Reviews from Real Users
Ernesto C., Presales Engineer at a comms service provider, shares,
”Key Features and Benefits
Ibrahim M., Senior Network & Security Engineer at a tech services company, relates, "The initial setup is a valuable point on Fortinet products. Most of the time, putting the theory into practice on the devices is quite friendly and straightforward. As long as you can read English you can find your way around the solution and make it work. This is a high value point on Fortinet - the way everything is laid out in the web UI is user-friendly and quite straightforward. The UI is quite simple."
As we've seen, passwords alone don't keep unwanted guests out of your network. Password-only authentication has led to security breaches, malware infections, and policy violations. With two-factor authentication, a password is used along with a security token and authentication server to provide far better security. Authorized employees can remotely access company resources safely using a variety of devices, ranging from lpatops to mobile phones.
We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.