We performed a comparison between BeyondTrust Endpoint Privilege Management and Fortinet FortiAuthenticator based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."The solution's least privilege enforcement has helped us ensure access is given to only the required people."
"One of the valuable features is the absence of any local user in a unique system. All users are defined in the AD; communication is only between Unix and AD."
"The implementation is quite easy because the documents are always online."
"The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager."
"The privileged access management into sensitive systems is very valuable. That includes control from the endpoint all the way through to the managing of passwords and credentials that are used by the person to access the sensitive information. It's very useful, because nobody ever really maintains passwords for those endpoint systems. It's maintained in the Dropbox password file."
"BeyondTrust has very good integrations with quite a lot of security vendors such as SailPoint, IBM, FortiGuard, Splunk, etc."
"The tool is easy to use and deploy. It has PAM capabilities like privilege access. The solution helps with the management of third parties and vendors. It is an effective solution compared to other alternatives."
"The product is secure."
"The initial setup is a valuable point on Fortinet products. Most of the time, putting the theory into practice on the devices is quite friendly and straightforward. As long as you can read English you can find your way around the solution and make it work. This is a high value point on Fortinet - the way everything is laid out in the web UI is user-friendly and quite straightforward. The UI is quite simple."
"The most valuable features of Fortinet FortiAuthenticator are easy to configure, secure, and the application has good performance."
"The initial setup is very easy."
"For someone concerned with multifactor authentication, I'm satisfied with the product."
"The product is good, cost-effective, and functionally efficient."
"The current version is stable...Scalability-wise, it is a fine solution"
"FortiAuthenticator is a very good solution. It is all jury-based. FortiAuthenticator is very easy for anyone to understand how it works and be able to take action."
"The most valuable feature of the solution is RADIUS service and the social network integration feature."
"The weaknesses are related to the effort required to migrate from existing technologies or having no Privilege Access Management (PAM) at all to adopting technologies like BeyondTrust. It involves changes in processes and can take a significant amount of time, typically six to twelve months."
"It keeps on breaking every now and then. It is not yet mature. Every time something new comes up or we run into some new issues, the culprit is BeyondTrust because the agents and the adapter are not mature. The new development process goes on, and they're not able to handle things. It should be mature. It shouldn't break every now and then."
"Reports to the end user."
"We faced some challenges with remote desktop sessions."
"The help system should be improved to provide a quick help guide with each tab within the solution, which explains what each particular function does."
"Its feature for establishing workflows needs improvement."
"The other area to improve is that they rely on MS SQL servers only. You cannot have any other database behind them. They have to be on MS SQL. If they can do something about these issues, this would be a better alternative for some customers."
"It only has limited support for Mac."
"We would like to see Linux-based operating systems be able to integrate with FortiAuthenticator to get two-factor authentication running on them. as well. This is a shortcoming that I have faced a few times already."
"I would like to see integration and customization capabilities with the end-user portal to solve authentication issues with diverse implementation scenarios."
"We have issues with HA (high availability). These should be addressed in future releases."
"The integration with third-party tools must be better."
"The product must provide full support for third-party FIDO security keys."
"Fortinet FortiAuthenticator's initial setup process could be easier."
"The user interface and clustering are areas with shortcomings that need improvement."
"We had issues trying to integrate the keys properly during the initial setup."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 5th in Privileged Access Management (PAM) with 28 reviews while Fortinet FortiAuthenticator is ranked 6th in Single Sign-On (SSO) with 52 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while Fortinet FortiAuthenticator is rated 8.0. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of Fortinet FortiAuthenticator writes "A reasonably priced solution that can be scaled toward different functionalities and offers flexible SMS messaging". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and SailPoint Identity Security Cloud, whereas Fortinet FortiAuthenticator is most compared with Cisco ISE (Identity Services Engine), Fortinet FortiNAC, Fortinet FortiToken, Cisco Duo and RSA SecurID.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.