No more typing reviews! Try our Samantha, our new voice AI agent.

Fortinet FortiToken vs RSA Adaptive Authentication comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 11, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Fortinet FortiToken
Ranking in Authentication Systems
4th
Average Rating
8.4
Reviews Sentiment
6.9
Number of Reviews
32
Ranking in other categories
No ranking in other categories
RSA Adaptive Authentication
Ranking in Authentication Systems
26th
Average Rating
6.8
Number of Reviews
6
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2026, in the Authentication Systems category, the mindshare of Fortinet FortiToken is 2.7%, down from 6.4% compared to the previous year. The mindshare of RSA Adaptive Authentication is 1.5%, up from 0.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Authentication Systems Mindshare Distribution
ProductMindshare (%)
Fortinet FortiToken2.7%
RSA Adaptive Authentication1.5%
Other95.8%
Authentication Systems
 

Featured Reviews

Ahmed Auf - PeerSpot reviewer
Cybersecurity SNB Technical Manager at a tech services company with 51-200 employees
Has strengthened user authentication and remains reliable despite recent license transfer limitations
I love to work with Fortinet FortiToken because it's easy to configure with any user and with FortiAuthenticator. We uploaded it and use it for any authentication with any user, with integration with any device. With FortiAuthenticator, we integrated it with any server, such as Active Directory, and use the token for VPN and other purposes. In the future, we ask customers to use it with FortiAuthenticator, not just the token, as it provides better integration capabilities. When we buy a specific Fortinet FortiToken, we use it on FortiGate only. Fortinet FortiToken provides very important security benefits because it is used to manage FortiGate from outside, exclusively with Fortinet FortiToken. Without Fortinet FortiToken, administrators cannot use or add admin privileges or manage it from outside, as this could lead to attacks or malicious activity.
Directorc4e7 - PeerSpot reviewer
Director of Cyber Security at a financial services firm with 1,001-5,000 employees
We need better ease of use; the product is overly complicated
There are many use cases that we have defined based on our business needs Ingestion of logs and raising alert space on those logs are the most valuable features. The product is basically unusable. We need better ease of use; it's overly complicated. It has taken years to implement. We used RSA…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Its ease of use is most valuable. It is simple to use and can be deployed out-of-the-box. It is quite a mature product with all the required features."
"I love the push-button authentication on FortiToken Mobile. It's also great that the soft token automatically reloads the OTP at intervals, so I always have a fresh code to enter."
"FortiToken is a cost-effective solution compared to other solutions, such as Cisco."
"Its ease of use is most valuable. It is simple to use and can be deployed out-of-the-box."
"The FortiAuthenticator and FortiToken are unquestionably the simplest multi-factor authentication solution to implement."
"I appreciate that it provides comprehensive security. It is tailored to this specific purpose, and it excels in fulfilling this purpose."
"The product provides secure access to our internal server."
"The initial setup is easy. You receive a QR code via email, scan it, and add it. No complicated procedures involved."
"It has reduced false positives greatly in our fraud detection ability."
"One of the most valuable features is the fraud detection capability with minimal friction in the customer experience."
"The most valuable feature is the stock tokens. That works the best for us."
"Our customer are seeing value from the product, as they experience cost reductions."
"Ingestion of logs and raising alert space on those logs are the most valuable features."
"Our customer are seeing value from the product, as they experience cost reductions. They can stop fraud from their customers, then their customers can have a better experience from their services."
"The most valuable feature is the stock tokens, which work the best for us."
"The capability to manage your business policy related to security when required without vendor involvement."
 

Cons

"Fortinet FortiToken is not easy to change because after installing it on one person, it can be transferred to another, but we need support and cannot self-manage it."
"I would like to see the product improvements in dynamic VLAN pooling. Specifically, when users are assigned different VLANs based on their SSID, ensuring no unintended lateral traffic between users would enhance security and efficiency."
"Support is a pain point in Bangladesh because there aren't many experienced Fortinet engineers in this country. It's easier to find one certified in Cisco, Palo Alto, or Juniper."
"The tool could be a little cheaper."
"I'm not sure if it's already available, however, I wonder if there's an option to have it sent to my email address instead of having it on the mobile app."
"The solution could be more user-friendly."
"Its reporting should be better. The reporting feature is missing. I don't have any reporting of who has done what, what has failed, and what didn't work."
"I would like to see if FortiToken can integrate with Office 365 mail to support the same two-factor authentication experience that I have with ESET. With ESET, when a user logs in, they are easily directed to the ESET authentication page, where they are prompted to enter their OTP after supplying their username and password. I understand from support that FortiToken cannot do this with email integration. That's why I opted for ESET."
"I think I would like to see them use more of our data, and give us more ability to control or configure how the protection patterns work for a specific business, and also provide more transparency into the methodology."
"Better filters when searching for events. The current features for current filters when searching fraud events are not very comprehensive. You can only filter by certain fields in the transaction."
"Better filters when searching for events. The current features for current filters when searching fraud events are not very comprehensive."
"RSA Adaptive Authentication lacks a mechanism to verify the identity of a new user in the Enrollment event workflow."
"Reporting modules is one of the major areas that can be improved further."
"It has taken years to implement."
"I would like to see a more adaptive type of solution, something that we could use on our web pages..."
"The product is basically unusable. We need better ease of use; it's overly complicated."
 

Pricing and Cost Advice

"I rate the tool's pricing a five out of ten."
"It is included as part of our firewall license."
"On a scale of one to ten, where one is the cheapest, and ten is the highest, I rate the pricing an eight."
"On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing a six out of ten."
"Although the platform is relatively expensive, it offers significant value. I rate the pricing a nine out of ten."
"The solution’s pricing is moderate and reasonable."
"The platform's licensing cost is reasonable for our organization."
"The solution’s price is good."
"The pricing is $50 per head, yearly."
"You may need to opt for second best if funding is low and the number of users is huge. However, the pricing is able to be negotiated if your user figures are huge."
"Customers need to deploy the solution in a very expensive infrastructure. RSA should should think about a less expensive infrastructure for customers because the solution costs around $100,000, and the infrastructure needed to support that solution may be even more expensive than that price."
"Keep the proxy service layer on premises. That consumes SaaS security services on the back-end."
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
893,164 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
9%
Comms Service Provider
8%
Financial Services Firm
8%
Construction Company
7%
Financial Services Firm
32%
Construction Company
11%
Comms Service Provider
10%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business18
Midsize Enterprise5
Large Enterprise9
By reviewers
Company SizeCount
Midsize Enterprise1
Large Enterprise6
 

Questions from the Community

What needs improvement with Fortinet FortiToken?
Fortinet FortiToken is not easy to change because after installing it on one person, it can be transferred to another, but we need support and cannot self-manage it. If we could self-manage transfe...
What is your primary use case for Fortinet FortiToken?
Fortinet FortiToken is primarily used for VPN access to the internet, which is the main use case for my clients and me.
What advice do you have for others considering Fortinet FortiToken?
We use Fortinet and their products. I understand your points about Fortinet FortiToken. It is easy to integrate Fortinet FortiToken with solutions such as FortiGate, FortiAuthenticator, or FortiClo...
Ask a question
Earn 20 points
 

Overview

 

Sample Customers

Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
ADP, Ameritas, Partners Healthcare
Find out what your peers are saying about Fortinet FortiToken vs. RSA Adaptive Authentication and other solutions. Updated: April 2026.
893,164 professionals have used our research since 2012.