We performed a comparison between Fortinet FortiToken and Thales Authenticators based on real PeerSpot user reviews.
Find out in this report how the two Authentication Systems solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The integrated Fortinet security with the app that allows you to easily do the two-factor authentication is most valuable."
"The deployment is quick and simple."
"I would rate the overall solution an eight out of ten. The solution is a smart product that anyone can easily access and manage. The solution is a good product for multi-factor authentication and to secure remote authentication in the corporate environment."
"Stability-wise, I rate the solution a ten out of ten."
"Its ease of installation is most valuable. It took me five minutes, and it was up and running. It didn't take me that long. The installation on the cell phones is pretty simple."
"The initial setup is easy. You receive a QR code via email, scan it, and add it. No complicated procedures involved."
"The tool's support is the best."
"Its ease of use is most valuable. It is simple to use and can be deployed out-of-the-box. It is quite a mature product with all the required features."
"I like how the solution allows me to support different types of hardware tokens and integrate with OTP."
"We use this solution to log into virtual machines like VMware and VMware Horizon."
"The most valuable feature of SafeNet Authentication Manager is authentication."
"The technical support services are good."
"Scalable and stable."
"Configuration can be confusing due to the lack of community and context-sensitive help. We've had to rely on technical support, which slows down the setup process."
"Maybe the price could be improved, and the integration could be better. But the integration is different from the authenticator side."
"The tool could be a little cheaper."
"The solution comes with two firewalls as a bundle. In that bundle, most of the individual users can be assigned to mobile users. However, in cases of technical difficulties, users may accidentally remove the mobile application. In normal scenarios, we get back to the activation key and assign it again."
"I would rate the scalability a seven out of ten. The migration issue definitely brings it down a bit."
"Fortinet FortiToken could be lower for some markets."
"I would like to see if FortiToken can integrate with Office 365 mail to support the same two-factor authentication experience that I have with ESET. With ESET, when a user logs in, they are easily directed to the ESET authentication page, where they are prompted to enter their OTP after supplying their username and password. I understand from support that FortiToken cannot do this with email integration. That's why I opted for ESET."
"The solution could introduce a mobile application instead of a physical product."
"Lacks integration with other platforms."
"The stability could improve."
"The solution should allow for support of multi-tenant architecture."
"The problem with SafeNet is that it's not integrated with Microsoft 365."
"The product could be improved by adding more features for sending tokens via SMS or phone calls."
Fortinet FortiToken is ranked 4th in Authentication Systems with 21 reviews while Thales Authenticators is ranked 14th in Authentication Systems with 5 reviews. Fortinet FortiToken is rated 8.4, while Thales Authenticators is rated 8.0. The top reviewer of Fortinet FortiToken writes "A stable and scalable solution that provides an affordable and perpetual license". On the other hand, the top reviewer of Thales Authenticators writes "Has an easy-to-use management interface and a straightforward initial setup process ". Fortinet FortiToken is most compared with Fortinet FortiAuthenticator, Microsoft Entra ID, Cisco Duo, Yubico YubiKey and VMware Identity Manager, whereas Thales Authenticators is most compared with Yubico YubiKey, Microsoft Entra ID, Cisco Duo, Utimaco SecurityServer and Secret Double Octopus. See our Fortinet FortiToken vs. Thales Authenticators report.
See our list of best Authentication Systems vendors.
We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.