No more typing reviews! Try our Samantha, our new voice AI agent.

Fortinet FortiAuthenticator vs Symantec Advanced Authentication comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 11, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Fortinet FortiAuthenticator
Ranking in Authentication Systems
5th
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
64
Ranking in other categories
Single Sign-On (SSO) (10th), Identity Management (IM) (14th), Multi-Factor Authentication (MFA) (2nd)
Symantec Advanced Authentic...
Ranking in Authentication Systems
23rd
Average Rating
7.8
Reviews Sentiment
8.7
Number of Reviews
9
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2026, in the Authentication Systems category, the mindshare of Fortinet FortiAuthenticator is 3.7%, down from 8.3% compared to the previous year. The mindshare of Symantec Advanced Authentication is 1.5%, up from 0.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Authentication Systems Mindshare Distribution
ProductMindshare (%)
Fortinet FortiAuthenticator3.7%
Symantec Advanced Authentication1.5%
Other94.8%
Authentication Systems
 

Featured Reviews

Sachin Vinay - PeerSpot reviewer
Assistant Manager-Networks at a university with 1,001-5,000 employees
Supports secure remote authentication and provides comprehensive user activity tracking
The most important feature is the security capability because it provides a substantial amount of security for admin-related activities. Fortinet FortiAuthenticator can be used from anywhere in the world, and the authenticator services function globally. This global accessibility is one of the critical advantages, particularly since admin features are critical and security is a real concern. With Fortinet FortiAuthenticator, secure usage of firewall services and related functions is achieved. A complete log of all users who access the authenticator setup is maintained. Monthly logs are reviewed to check for any unnoticed activities. Each authenticated user's complete activity history is recorded. This logging capability allows for providing access to more admin users while ensuring security is not compromised and all users can be monitored.
Umair (Abu Mohaymin) Akhlaque - PeerSpot reviewer
Group CEO at Flexsolutions
Ensures robust security features and ease of deployment, although it may lack some of the more modern authentication options
There has been a need for aggressive development to modernize the product and align it with contemporary security requirements. While the rebranding has been a step forward, further enhancements are essential to meet the evolving demands of the market. It lacks features such as ActiveSync Exchange security, and it doesn't offer alternatives like password-less authentication via biometrics or patches. While Symantec mainly relies on traditional token-based or password-based methods, newer authentication methods are missing from its repertoire. Support services often lack promptness and depth of knowledge, leaving customers waiting for weeks to resolve issues. In the realm of multifactor authentication, swift resolution of problems is critical, as any slowdown or interruption can significantly impact operations. Urgent improvement is necessary to ensure that support responses are faster and more effective, aligning with the demands of MFA implementation.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature of the solution is RADIUS service and the social network integration feature."
"It reduces the need for network administrator intervention by allowing the user to perform their own registration and resolve their own password problems and issues."
"The current version is stable...Scalability-wise, it is a fine solution"
"Customer service and support are excellent."
"Technical support is excellent with Fortinet FortiAuthenticator."
"This is a cost effective and flexible solution."
"The technical support for FortiAuthenticator is excellent."
"The feature that I have found most valuable is the fact that you can utilize your tokens across the whole Fortinet fabric once you have the FortiAuthenticator."
"CA products are the best fit with our backend systems."
"The most valuable feature is that we get a wide range of authentication methods and authentication integrators, so different platforms can get service authentication with transparency to the final user while providing strong authentication forms and connectors."
"Symantec Advanced Authentication can be useful for wherever you require a strong authentication."
"Ease of deployment: no need to keep up with physical devices for multi-factor authentication; no software to deploy on end-user computers requiring administrative rights."
"One of the most valuable aspects is its remarkable stability."
"It tells us exactly what we want in terms of authentication to various applications and provides protection for users who access them."
"It tells us exactly what we want in terms of authentication to various applications and provides protection for users who access them."
"Rules on Risk Authentication are very good."
 

Cons

"One of our clients has faced a lot of issues with FortiAuthenticator. For example, one of the devices restarted by itself, and the database was corrupted."
"I would like to see more security features in reference to identity login or identity identification."
"For scalability, you need to size FortiAuthenticator properly. It's not 100%, maybe 80% on the scalable side."
"The product must provide 2FA for applications."
"A lot of configurations are available only from CLI."
"I don't have any issues with this solution, but it may need a better, more user-friendly interface or better design of the platform."
"I would like to see more support from Fortinet with tech support people who have as much expertise on the authenticator as they do on their firewalls."
"The technical support team is bad."
"We have seen quite a few issues with bugginess. It is indeed pretty buggy and we have had to install some fixes."
"Sometimes getting this set up does take a bit longer. It's not always install, next, next, next, finish."
"We have seen quite a few issues with bugginess. It is indeed pretty buggy and we have had to install some fixes."
"It needs faster implementation on the cloud for our customers."
"This solution could be improved with risk-based authentication. I think that this product has everything that most customers are looking for, but modern technology has people looking for security tools with risk-based authentication, which they have a separate tool for. If they could integrate this, it would improve Symantec Advanced Authentication. They have to look at what's newly trending and how things are moving forward, and then adapt and adopt those features. Symantec's technical support should also be improved, in terms of response time."
"They definitely need to automate a few processes like the Wiley process."
"The initial setup of the tenant is a big cost element of the service and we were doing multiple tenants for our customer."
"Advanced Authentication talks about the Device ID. But how the device ID is captured, I want to know more about that."
 

Pricing and Cost Advice

"The licensing structure is cost-effective for us compared to some of the other solutions that have recurring monthly costs."
"The platform is cost-effective as it does not require a separate license for SD-WAN functionality."
"The customers need to pay for licenses, and some pay on a yearly basis while others pay on a three-yearly or five-yearly basis. Also, it is not an expensive solution."
"The pricing is fair."
"When we buy the Fortinet FortiAuthenticator device there is a comparison between price and security."
"I rate its pricing a three to five out of ten."
"It's not expensive."
"I rate the price of Fortinet FortiAuthenticator a three out of five."
"The price is reasonable."
"There are eventually going to be implementation costs. Sometimes you're required to have custom code developments there, so that has to be part of the implementation price."
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
893,438 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
11%
Comms Service Provider
10%
Computer Software Company
10%
Financial Services Firm
7%
Financial Services Firm
23%
Comms Service Provider
12%
Outsourcing Company
10%
Construction Company
10%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business38
Midsize Enterprise18
Large Enterprise11
By reviewers
Company SizeCount
Small Business2
Large Enterprise7
 

Questions from the Community

What needs improvement with Fortinet FortiAuthenticator?
Fortinet can make Fortinet FortiAuthenticator better by having a cloud version of it. Currently, Fortinet FortiAuthenticator is only available for on-premises, and it is an on-premises solution. It...
What is your primary use case for Fortinet FortiAuthenticator?
Fortinet FortiAuthenticator is primarily used for authenticating admin users, including remote admin use cases. Remote admin use cases utilize Fortinet FortiAuthenticator to securely authenticate a...
Ask a question
Earn 20 points
 

Also Known As

FortiAuthenticator
CA Advanced Authentication, CA Strong Authentication, CA Risk Authentication, Arcot WebFort, Arcot RiskFort
 

Overview

 

Sample Customers

Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
Global bank, Large Filipino Bank and SK Infosec
Find out what your peers are saying about Fortinet FortiAuthenticator vs. Symantec Advanced Authentication and other solutions. Updated: April 2026.
893,438 professionals have used our research since 2012.