No more typing reviews! Try our Samantha, our new voice AI agent.

Fortinet FortiAuthenticator vs Thales Authenticators comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 11, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Fortinet FortiAuthenticator
Ranking in Authentication Systems
5th
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
64
Ranking in other categories
Single Sign-On (SSO) (10th), Identity Management (IM) (14th), Multi-Factor Authentication (MFA) (2nd)
Thales Authenticators
Ranking in Authentication Systems
11th
Average Rating
8.0
Reviews Sentiment
7.6
Number of Reviews
5
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2026, in the Authentication Systems category, the mindshare of Fortinet FortiAuthenticator is 3.7%, down from 8.3% compared to the previous year. The mindshare of Thales Authenticators is 2.2%, down from 2.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Authentication Systems Mindshare Distribution
ProductMindshare (%)
Fortinet FortiAuthenticator3.7%
Thales Authenticators2.2%
Other94.1%
Authentication Systems
 

Featured Reviews

Sachin Vinay - PeerSpot reviewer
Assistant Manager-Networks at a university with 1,001-5,000 employees
Supports secure remote authentication and provides comprehensive user activity tracking
The most important feature is the security capability because it provides a substantial amount of security for admin-related activities. Fortinet FortiAuthenticator can be used from anywhere in the world, and the authenticator services function globally. This global accessibility is one of the critical advantages, particularly since admin features are critical and security is a real concern. With Fortinet FortiAuthenticator, secure usage of firewall services and related functions is achieved. A complete log of all users who access the authenticator setup is maintained. Monthly logs are reviewed to check for any unnoticed activities. Each authenticated user's complete activity history is recorded. This logging capability allows for providing access to more admin users while ensuring security is not compromised and all users can be monitored.
Gustavo Merighi - PeerSpot reviewer
Automation and Telecommunications Analyst at Grupo Energisa
Has an easy-to-use management interface and a straightforward initial setup process
Our primary use cases include multifactor authentication for VPN connections and access to security tools like jump servers and firewalls. We also use it to enhance security measures in an enterprise environment The most valuable feature is the YAML 2.0 integration. It has an easy-to-use…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Technical support is excellent with Fortinet FortiAuthenticator."
"For someone concerned with multifactor authentication, I'm satisfied with the product."
"The most valuable features of Fortinet FortiAuthenticator are easy to configure, secure, and the application has good performance."
"The most important feature is the security capability because it provides a substantial amount of security for admin-related activities."
"The technical support for FortiAuthenticator is excellent."
"It made things much easier for dealing with users BYOD for our secured wireless networks."
"The implementation has significantly improved access management within our organization."
"Once you configure it properly, it runs fine."
"Scalable and stable."
"The solution is scalable and stable."
"The solution has helped our organization by allowing all users to connect securely."
"The technical support services are good."
"I like how the solution allows me to support different types of hardware tokens and integrate with OTP."
"The most valuable feature of SafeNet Authentication Manager is authentication."
"I like how the solution allows me to support different types of hardware tokens and integrate with OTP."
"We use this solution to log into virtual machines like VMware and VMware Horizon."
 

Cons

"We would like to see Linux-based operating systems be able to integrate with FortiAuthenticator to get two-factor authentication running on them. as well. This is a shortcoming that I have faced a few times already."
"There is a room for improvement. The log is a bit difficult to access, and searching the log codes is also a bit difficult. So it would be much better if, when we open a log, it could provide detailed information about errors, reasons for failure, and such."
"The GUI has some shortcomings and can be made better. The GUI is not great."
"The customization capability of Fortinet FortiAuthenticator is not very flexible."
"The price of the solution could improve, it is expensive."
"Integration with FortiGate could be more fluid."
"It does the job I paid for, but the graphical interface could be improved."
"A lot of configurations are available only from CLI."
"Lacks integration with other platforms."
"The product could be improved by adding more features for sending tokens via SMS or phone calls."
"I'd like to see integration with other platforms."
"The stability could improve."
"The scalability could improve, we have a lot of downtimes two years ago; this was in the cloud environment, because we purchased SafeNet Authentication Manager as a cloud service, and sometimes it was down for two or three hours."
"The solution should allow for support of multi-tenant architecture."
"The problem with SafeNet is that it's not integrated with Microsoft 365."
"The solution should allow for support of multi-tenant architecture."
 

Pricing and Cost Advice

"The licensing structure is cost-effective for us compared to some of the other solutions that have recurring monthly costs."
"The product could be more competitively priced."
"I would rate the pricing a four out of ten, where one is cheap, and ten is expensive. It is not that costly. It is cheap, easy to manage, easy to install, and easy to configure."
"I would start off with a VM including the base license and scale according to the number of users you need to authenticate."
"On a scale of one to ten, where one is a high price and ten is a low price, I rate the pricing a seven."
"It is usually cheap. Without a license, you can use some basic features. You can buy a 20-year license and implement the solution once."
"The cost of the license could be less expensive. The license is paid on a yearly basis."
"The platform is cost-effective as it does not require a separate license for SD-WAN functionality."
"There is an annual licensing fee."
"Thales is more expensive than its competitors."
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
893,438 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
11%
Comms Service Provider
10%
Computer Software Company
10%
Financial Services Firm
7%
Financial Services Firm
13%
Comms Service Provider
10%
Government
10%
Manufacturing Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business38
Midsize Enterprise18
Large Enterprise11
No data available
 

Questions from the Community

What needs improvement with Fortinet FortiAuthenticator?
Fortinet can make Fortinet FortiAuthenticator better by having a cloud version of it. Currently, Fortinet FortiAuthenticator is only available for on-premises, and it is an on-premises solution. It...
What is your primary use case for Fortinet FortiAuthenticator?
Fortinet FortiAuthenticator is primarily used for authenticating admin users, including remote admin use cases. Remote admin use cases utilize Fortinet FortiAuthenticator to securely authenticate a...
What needs improvement with Thales Authenticators?
Currently, the solution fulfills our requirements. We are very satisfied with its features, and do not have any specific ideas for improvement right now. Perhaps, in the future, three-factor authen...
What is your primary use case for Thales Authenticators?
Our employees, whether working on-site or remotely, use Thales Authenticators for two-factor authentication to log in to their laptops or PCs. This is our primary use case.
What advice do you have for others considering Thales Authenticators?
From our past years of experience, the solution is very smooth, and we have had a good experience with it. We would definitely recommend Thales to others for its reliability and features. I'd rate ...
 

Also Known As

FortiAuthenticator
Gemalto Ezio, Ezio, Gemalto Authenticators, SafeNet Authentication Manager
 

Overview

 

Sample Customers

Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
Standard Chartered Bank (SCB)
Find out what your peers are saying about Fortinet FortiAuthenticator vs. Thales Authenticators and other solutions. Updated: April 2026.
893,438 professionals have used our research since 2012.