Find out what your peers are saying about Symantec, RSA, Fortinet and others in Authentication Systems.
278,683 professionals have used our research since 2012.
Find out what your peers are saying about Symantec, RSA, Fortinet and others in Authentication Systems.
278,683 professionals have used our research since 2012.
Chart Key
Average Rating
Average rating based on reviews
Views
Number of total page views
Comparisons
Number of times compared to another product
Reviews
Total number of reviews on IT Central Station
Followers
Number of followers on IT Central Station
The total ranking of a product, represented by the bar length, is based on a weighted aggregate score. The score is calculated as follows: The product with the highest count in each area gets the highest available score. (20 points for Reviews; 16 points for Views, Comparisons, and Followers.) Every other product gets assigned points based on its total in proportion to the #1 product in that area. For example, if a product has 80% of the number of reviews compared to the product with the most reviews then the product's score for reviews would be 20% (weighting factor) * 80% = 16. For Average Rating, the maximum score is 32 points awarded linearly based on our rating scale of 1-10. If a product has fewer than ten reviews, the point contribution for Average Rating is reduced (one-third reduction in points for products with 5-9 reviews; two-thirds reduction for products with fewer than five reviews). Reviews that are more than 24 months old, as well as those written by resellers, are completely excluded from the ranking algorithm.

Authentication Systems Reviews

Read reviews of Authentication Systems that are trending in the IT Central Station community:
Your trust is our top concern, so companies can't alter or remove reviews.
Consultant
Senior Consultant at a tech company with 1,001-5,000 employees
Jan 31 2017

What is most valuable?

One of the most valuable features is the simple FSSO (Fortinet Single Sign-On) configuration that helps to manage user-based security rules. It is a cool security product. It's easy to use, implement and maintain, but there is room for... more»

How has it helped my organization?

When we came across access management, we required several technical features to help manage user access to critical systems and remote access. That’s why we always go for a SSO two-factor authentication server. FortiAuthenticator is a bundle... more»

What needs improvement?

The GUI is not fancy enough and some of the settings are difficult to access. Part of the configuration has to be done by CLI, which is not friendly for security administrators. Integration with other firewalls may not be as good as expected.
Symantec
Real User
Network Analyst at a healthcare company with 1,001-5,000 employees
Jul 21 2017

What is most valuable?

The two-factor authentication is most definitely valuable and moves us closer to being able to check off those important boxes for compliance.

How has it helped my organization?

Currently, it is only for select users, but the infrastructure is in place to expand to a larger group. The increased security for those users is beneficial, as well as getting them used to the app. Just getting used to 2FA is a benefit, as... more»

What needs improvement?

The gateway server is a RADIUS server, but it lacks the functionality of returning RADIUS attributes other than those that are required for the gateway to authenticate the users. This could be improved a lot by providing additional values,... more»
Find out what your peers are saying about Symantec, RSA, Fortinet and others in Authentication Systems.
278,683 professionals have used our research since 2012.
Real User
eBanking Security & Awareness with self employed
Jul 21 2017

What is most valuable?

One of the most valuable features is the fraud detection capability with minimal friction in the customer experience. Also, the capability to manage your business policy related to security when required without vendor involvement.

How has it helped my organization?

Prior to the implementation of the system, our internet banking fraud team relied solely on customer reports for unauthorized fraud transactions. With the system, the fraud team was more proactive, and managed to stop the transaction even as... more»

What needs improvement?

Reporting modules is one of the major areas that can be improved further. Understanding of system integration and its infrastructure is also a major area that should be highlighted to the clients planning to have this as on-premise, rather... more»
Real User
Director - Transformation Programs and Architecture at a comms service provider with 1,001-5,000 employees
Jan 16 2017

What is most valuable?

Ease of deployment: no need to keep up with physical devices for multi-factor authentication; no software to deploy on end-user computers requiring administrative rights. The delivery of multi-factor authentication using a SaaS model keeps us... more»

How has it helped my organization?

My team migrated away from RSA SecurID hard tokens to the digital certificate-based authentication.

What needs improvement?

It would be nice to have some level of integration with a separate user store (i.e., Active Directory integration) such that the user name would stay the same across identity management platforms. I would like some level of integration with... more»
Real User
Senior IT Support Engineer at a marketing services firm with 501-1,000 employees
Jan 25 2017

What is most valuable?

The valuable features are: * Two-factor authentication * User ID with our LDAP service * Integration with our other FortiGates

How has it helped my organization?

By using one of our units as a load-balancing slave, we were able to roll out location-based VPNs that created quicker connections to local servers for our end users. Furthermore, incorporating a LBS unit has provided preventative measures... more»

What needs improvement?

It was initially difficult to sync our high availability, load-balancing slave (LBS) to our master unit. There were some initial issues connecting it and syncing with our master FortiAuthenticator unit. After reaching out to Fortinet support,... more»
Real User
Network Security Engineer at a healthcare company with 501-1,000 employees
Feb 13 2017

What is most valuable?

The valuable features are the granularity of the security settings and the relative ease of adding users. It also makes it really nice and easy to remove access from users that have left us or who are doing things they shouldn’t be doing.

How has it helped my organization?

It made things much easier for dealing with users BYOD for our secured wireless networks. We also use this in conjunction with an MDM solution. It makes a nice package that is easy for our end-users and is very secure.

What needs improvement?

The interface is a bit misleading in areas. Finding some settings can be a bit confusing and difficult. I would also like to see a few more real world examples given in the setup section.
Real User
IT Infrastructure Engineer at a tech company with 11-50 employees
Jun 27 2017

What is most valuable?

Standards-based secure authentication FortiAuthenticator centralizes the management and storage of user identity information, thereby increasing the efficiency of administration and increasing the control over who accesses the network. •... more»

How has it helped my organization?

Central management of user Identities and access FortiAuthenticator extends two-factor authentication to multiple FortiGate appliances and to third-party solutions that support RADIUS or LDAP authentication FortiAuthenticator can create,... more»

What needs improvement?

1- Integration with different vendor firewalls (I tested only with Cisco using Cisco ASDM 6.3 (5) but i am not sure if it works with other vendor solutions) 2- A lot of configurations are available only from CLI 3- Documentation/videos for... more»
Real User
Solution Architect at Votorantim bank
Jan 05 2017

What is most valuable?

For Votorantim bank, the best feature is the token solution. We can analyze any transaction that is declined or blocked. We can make a decision to release or block the transaction or anything else.

How has it helped my organization?

CA products are the best fit with our backend systems. CA is the best tool for our backend solution. This solution has made the bank more secure.

What needs improvement?

We are looking for something that can fingerprint a check. For example, if you lose your credit card, they can double-check your identity with your fingerprint.
Real User
Pre-sales, Telecommunications & Security Specialist at a tech services company with 201-500 employees
Jun 26 2017

What is most valuable?

Integrated RADIUS server with 802.1x functionality and access control. Single Sign On and AD integration. It integrates very tightly with the rest of the Fortinet ecosystem.

How has it helped my organization?

It integrated with the existing Cisco wireless infrastructure to solidify the way people authenticate onto the network. It permitted having a centralized area to authenticate all users and enabled SSOimplementation.

What needs improvement?

A better integration with other vendors. The device is rich in features but there are a lot of functionalities I have still not experienced with.
Real User
Senior Program Analyst at a logistics company with 1,001-5,000 employees
Dec 05 2017

What is most valuable?

Rules on Risk Authentication are very good.

How has it helped my organization?

It actually increases our revenue and the customer base.

What needs improvement?

They definitely need to automate a few processes like the Wiley process. Even though Wiley is part of the CA group, it is not present in CA Advanced Authentication. I want that to be integrated, and not have to implement Wiley in-house during... more»
CA Technologies
Real User
Software Development Manager at a comms service provider with 1,001-5,000 employees
Jun 30 2017

What is most valuable?

The benefits are that it allows us to have real-time risk analysis on authentication traffic, so we can determine whether or not it's suspicious. How suspicious is it? If it's suspicious, we can enable step-up authentication and challenge for some additional credentials, or we can block the authentication attempt completely. If it's a known good customer, we can... more»

How has it helped my organization?

It gives us the ability to deny authentications for known malicious traffic. We have a webmail platform that people are constantly trying to hack into. Mostly, a large number of it comes from known bad IP addresses or unknown foreign countries which you can determine are bad or blacklisted. We can do that on the fly.
Real User
Country & Sales Manager France, Benelux & South Europe at a tech services company with 201-500 employees
Feb 19 2018

What is most valuable?

The flexibility to have one single source for the whole audit trail. Security is normally a function of what you know. If no access will ever be granted without our having a log of it, that is a great start. Together with this comes the... more»

How has it helped my organization?

We currently have full control over all authentication for any internal or external resource. We use Microsoft cloud for intranet, Skype, etc. All this is using HAG and SAML. Any other accounts are done automatically using your corporate badge.

What needs improvement?

The logical and physical space is of interest for government and schools. Why not have one single card for everything and administer all access in one place?
Symantec
Consultant
Professional Services Consultant at a tech services company with 51-200 employees
Jul 23 2017

What is most valuable?

* Intelligent authentication - Risk-based authentication * Cloud-based service and management

How has it helped my organization?

It provides an easy management for credentials of the remote users when accessing the corporate resources. There is a consolidation of a couple of Identity Providers into Symantec VIP for centralized management of credentials. Integration... more»

What needs improvement?

The factors that need improvement are: * Geofencing * Privileged account management * Behavioral authentication
Real User
Senior Developer AIG Digital Security Group at a insurance company with 10,001+ employees
Aug 15 2017

What do you think of RSA Adaptive Authentication?

Valuable Features Risk Engine’s risk score, eFN, GeoIP, and device binding all coming together in the Policy Rules to decide when to escalate to MFA. • Improvements to My Organization It has reduced false positives greatly in our fraud detection ability. • Room for Improvement RSA Adaptive Authentication lacks a mechanism to verify the identity of a new user in the Enrollment event workflow. • Use of Solution Seven years. • Stability Issues Sometime Risk Scores seem erratic. It might be due to some lack in client integration that we did with some of the consumer applications. • Scalability Issues No. • Customer Service and Technical Support Eight out of 10. • Previous Solutions Before and in addition to RSA, we used RSA Authentication Manager...
Real User
Pre-Sales Engineer at a tech services company with 11-50 employees
May 09 2017

What do you think of FortiAuthenticator?

Valuable Features User management with many credential sources: LDAPs, RADIUS, Social login, SAML, tokens, and local Captive portal server: Used to configure several portals for each service User friendly GUI with many features Very powerful • Improvements to My Organization We are now enjoying social login in public Wi-Fi environments with very easy deployment and a maximum level of security. • Room for Improvement I would like to see support for more credential authentication protocols. • Use of Solution I have used the product for six months. • Stability Issues I did not encounter any stability issues. • Scalability Issues I did not encounter any scalability issues. • Customer Service and Technical Support I would give technical support a rating of...
Symantec
Consultant
Senior Network Engineer at a tech services company with 10,001+ employees
Jun 06 2017

What do you think of Symantec VIP?

Valuable Features In this version 9.1, lots of changes are done for the dashboard, User Store etc. • Improvements to My Organization Mostly from a product expert's point of view, it provides solutions for my clients. Intelligent Authentication and the cloud-based service with BYOD are valuable features. • Room for Improvement The User Store synchronization part needs to improve. Also, the logs, reports, and dashboard can be improved. • Use of Solution I have been using this solution for around two years. • Stability Issues There were no stability issues. • Scalability Issues There was the User Store issue that we experienced in terms of the scalability. It was difficult to fix after lots of troubleshooting. • Customer Service and Technical Support ...
Real User
Lead Technical Architect with 1,001-5,000 employees
Nov 02 2017

What is most valuable?

It tells us exactly what we want in terms of authentication to various applications and provides protection for users who access them. Our users can have access to applications securely through various devices.

How has it helped my organization?

It adds a strong layer of security for the multi-factor authentication. Rather than just the one factor with your password, it gives you a one-time password and adds an extra layer of security with encryption.

What needs improvement?

We have seen quite a few issues with bugginess. It is indeed pretty buggy and we have had to install some fixes.
Real User
Identity and Access Management Engineer at a financial services firm with 10,001+ employees
Mar 13 2018

What do you think of RSA Identity Governance and Lifecycle?

Improvements to My Organization Organizational role management: By defining the roles it made our job easier for new-hire provisioning by automatically granting/creating the tickets necessary for the job role. • Valuable Features Roles Connectors for provisioning Re-accreditation or reviews These help greatly to govern user access. • Room for Improvement User interface Workflow More connectors • Use of Solution Three to five years. • Stability Issues Yes, it depends on your architecture design. If you use the appliance version then it won't handle a huge database volume. • Scalability Issues Yes, there are scalability issues. This product does not scale very well. It is not a good product for load balancing / active–active architecture. • Initial Setup ...
Real User
Owner at a tech services company
Sep 12 2017

What do you think of RSA Authentication Manager?

Valuable Features: Easy setup, deployment, and integration in different infrastructures, including virtual ones. • Improvements to My Organization: 2FA with hardware tokens for VMware VDIs. • Room for Improvement: Perhaps parts of the the user interface should become more intuitive. • Use of Solution: About a year. • Stability Issues: No. • Scalability Issues: No. • Previous Solutions: I haven't used another solution previously and I am not familiar with another vendor for 2FA. • Initial Setup: Yes, it was quiet straightforward after carefully reading and following the setup manual and documentation. • Pricing, Setup Cost and Licensing:  I have no idea, I wasn't responsible for licensing. • Other Solutions Considered: No, we decided to use...
Authentify
Writer
Owner at David Strom Inc.
Sep 02 2017

What do you think of Authentify?

Valuable Features: Avoids man in the middle or man in the browser exploits that other two factor products are susceptible to • Use of Solution: One month • Stability Issues: I got a few error messages which turned out to be themselves errors. • Previous Solutions: I have been using SecurID tokens and wanted something that didn't require hardware authentication devices. • Initial Setup: Straightforward.
Find out what your peers are saying about Symantec, RSA, Fortinet and others in Authentication Systems.
278,683 professionals have used our research since 2012.

Sign Up with Email