

Omada Identity and Fortinet FortiAuthenticator both compete in the identity management and security sector. Omada seems to have the upper hand in governance and compliance features, while FortiAuthenticator excels in security and authentication functionalities.
Features: Omada Identity offers robust capabilities in automated provisioning and identity lifecycle support, seamless integration with Microsoft-based systems, and a broad range of out-of-the-box features for governance and security. Fortinet FortiAuthenticator focuses on security and authentication with strong two-factor authentication, seamless integration with Fortinet products, and robust SSO features.
Room for Improvement: Omada Identity needs to enhance its user interface, documentation complexity, and scalability. Fortinet FortiAuthenticator could benefit from a modern UI update, improved integration capabilities, and expanded protocol support.
Ease of Deployment and Customer Service: Omada Identity supports hybrid and public cloud environments providing flexible deployment options but could improve in terms of customer service response times and ongoing support. Fortinet FortiAuthenticator is primarily on-premises, offering straightforward setup, with customer support described as above average, yet could enhance user guidance during deployment.
Pricing and ROI: Omada Identity is perceived as expensive, especially for cloud offerings, but offers features that justify the price for many enterprises, with reported cost savings over time. Fortinet FortiAuthenticator is considered more cost-effective with straightforward licensing, competing favorably with offerings from companies like Cisco, providing lower total cost of ownership.
It enhances security by ensuring only the right person can access systems, even if their login credentials are compromised.
I have seen a return on investment with Omada Identity in terms of time saved and fewer employees needed.
If we look at one customer where we initially started, they had about four to ten employees working on IGA, and it is now almost half of it.
Omada Identity has definitely helped us save time when provisioning access for various identities.
At times, some technical staff lack knowledge, which delays issue resolution.
Customer service and support are excellent.
Technical support from Fortinet deserves a rating of 10.
The vendor support needs improvement because we have reported serious incidents that remain unresolved.
Maintenance is necessary, and aside from that, if there are issues with Salesforce cloud, then Omada Identity may go down.
The customer support for Omada Identity is excellent.
The scalability of FortiAuthenticator is good, and I would rate it an eight on a scale of one to ten.
I find Fortinet FortiAuthenticator to be highly scalable, and I would rate it an eight out of ten for scalability.
Fortinet FortiAuthenticator should be sufficiently scalable.
The scalability of Omada Identity is excellent; they offer flexible pricing for licenses, accommodating both full accounts and lighter identities, which makes it truly scalable.
Omada Identity is a top-growing tool that is booming in the market.
Omada Identity scales very well for our organization.
It remains stable even when the number of concurrent users increases.
In terms of stability, I rate Omada Identity a nine out of ten.
We have experienced too many unexpected errors on a daily basis.
Omada Identity is a stable and reliable tool.
For example, authentication for wireless users expires after 24 hours, requiring re-authentication daily.
For example, Cisco Duo is on the cloud, so we cannot compete with that part if a user requires a cloud-based two-factor authentication solution.
I recommend Fortinet make its images migratable between environments.
The biggest issue, which is the reason why we are transitioning from their product to SailPoint, is the overall user experience.
There is room for improvement in Omada Identity, primarily in customization for administrators; many custom tasks require contacting providers even for simple changes.
The deployment of Omada Identity is complex; the product is not brilliantly documented.
Fortinet FortiAuthenticator is not overly expensive compared to other Fortinet subscriptions.
They are lower than some of their competitors.
the product itself is said to have a good price, although the support can be expensive.
The integration with FortiToken is outstanding, adding a layer of security for authentication.
We use multi-factor authentication for enhancing security.
Fortinet FortiAuthenticator can be used from anywhere in the world, and the authenticator services function globally.
Omada Identity helps automate reviews of access requests and reroutes them to appropriate people, which is what it should do; it really assists in reducing the workload time.
You can really do it codeless by creating a custom process with the process designer, adding the building blocks of the process designer into the process, and then getting it to work.
The integration with those systems helps my workflow and saves time considerably because I can manage all the accesses and assignments through Omada Identity at once, eliminating the need to add a license through Azure or a mailbox through Exchange.
| Product | Mindshare (%) |
|---|---|
| Omada Identity | 3.2% |
| Fortinet FortiAuthenticator | 2.1% |
| Other | 94.7% |


| Company Size | Count |
|---|---|
| Small Business | 38 |
| Midsize Enterprise | 18 |
| Large Enterprise | 11 |
| Company Size | Count |
|---|---|
| Small Business | 9 |
| Midsize Enterprise | 4 |
| Large Enterprise | 45 |
Fortinet FortiAuthenticator enhances security through intuitive management and integration capabilities, offering two-factor authentication and seamless connectivity with FortiGate, LDAP, and AD. It provides robust OTP features and operates efficiently across diverse environments.
Fortinet FortiAuthenticator is designed to streamline two-factor and multi-factor authentication processes across diverse network environments. Its seamless integration with Active Directory optimizes secure user management and enhances VPN security. It facilitates multi-domain authentication and serves as a comprehensive identity and access management tool. Organizations leverage its capabilities for VPN and network access while utilizing tokens for increased security. Its single sign-on feature aids in simplifying identity management and authorization, supporting extensive network and application security demands. However, improvements could be made to its outdated interface, pricing strategy, and better integration with third-party applications. Streamlined command line configurations and bolstered technical support would enhance user experience further.
What are the key features of Fortinet FortiAuthenticator?In industries like finance, healthcare, and education, Fortinet FortiAuthenticator is implemented to secure sensitive data and streamline access management. Its integration capabilities support compliance requirements, while its authentication features ensure authorized access across platforms, enhancing both security and operational efficiency.
Omada Identity offers robust governance, user lifecycle management, and seamless provisioning with Active Directory integration, simplifying access management with a user-friendly, self-service interface.
Omada Identity combines strict governance with easy configuration, offering automation that excels in user lifecycle management. Its integration capabilities with systems like Active Directory provide seamless provisioning. The platform features a user-friendly self-service interface, enabling efficient process design without coding, which simplifies access management. Role-based access control, reporting, and compliance features elevate security and operational efficiency. Omada Identity is adaptable to evolving requirements, ensuring scalability while maintaining ease of use and rapid response in support services.
What are the key features of Omada Identity?Industries implement Omada Identity to streamline identity lifecycles, provisioning, and certification processes. It supports cloud and on-premises environments, enhancing security, governance, and compliance. Automated access reviews and security policy enforcement are critical for managing diverse user groups. Organizations in sectors such as finance, healthcare, and retail leverage these capabilities to ensure smooth operations and safeguard sensitive data.
We monitor all Identity Management (IM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.