We performed a comparison between CyberArk Privileged Access Manager and Fortinet FortiAuthenticator based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."The implementation of the PSM proxy has reduced the specific risk of "insider attacks" on our domain controllers and SLDAP servers by eliminating direct user login by an open secure connection on the user's behalf without ever revealing the privileged credentials."
"With PAM in place, we've experienced a significant reduction in potential security breaches."
"The automatic change of the password and Privileged Session Manager (PSM) are the most valuable features. With Privileged Session Manager, you can control the password management in a centralized way. You can activate these features in a session; the session isolation and recording. You apply the full intermediation principle. So, you must pass through CyberArk PAM to get access to the target system. You don't need to know the password, and everything that you do is registered and auditable. In this case, no one gets to touch the password directly. Also, you can implement detection and response behavior in case of a breach."
"Creating policies and the password rotation feature have been valuable. We don't have to memorize our password for the ADM account."
"We found the initial setup to be easy."
"We are able to rotate credentials and have privileged account access."
"CyberArk Privileged Access Manager is stable."
"The central password manager is the most valuable feature because the password is constantly changing. If an outsider threat came in and gained access to one of those passwords, they would not have access for long."
"I work a lot with Fortinet products and I call the support often. They are very quick to respond and the support is very good."
"The solution's most valuable aspect is that it easy to install. The user experience is very good."
"The most valuable feature is the flexibility in using the SMS messages."
"Fulfilled our requirement at a good price."
"The most valuable features are the performance and ease of use."
"The ease of use is really nice. Using Authenticator, I've been able to actually work better on my authentication due to the fact that I have a single fabric to authenticate control from my firewall and on my access points. Authentication takes place from this area."
"The web feature is quite versatile. It serves as the sole server authenticator and is valuable not only with FortiGate products but also within the entire Forti system, making it highly useful for me."
"FortiAuthenticator is really good software that integrates very well with Fortinet products."
"Many of the infrastructure folks who use the product dislike it because it complicates their workflow. They get a little less control, and they have to go through a specific solution. It proactively logs in for them, which obfuscates some of the issues that they may be troubleshooting."
"The documentation is rather basic and it is missing many use cases."
"We would like to expand the usage of the auto discovery accounts feed, then on our end, tie in the REST API for automation."
"I would like to see is the policy export and import. When we expend, we do not want to just hand do a policy."
"There was a functionality of the solution that was missing. I had noticed it in Beyond Trust, but not in this solution. But, recently they have incorporated something similar."
"The initial setup was somewhat complex."
"There is a bit of a learning curve, but it's a pretty complex solution."
"The solution could improve by adding more connectors."
"We would like to see Linux-based operating systems be able to integrate with FortiAuthenticator to get two-factor authentication running on them. as well. This is a shortcoming that I have faced a few times already."
"We have issues with HA (high availability). These should be addressed in future releases."
"There is a room for improvement. The log is a bit difficult to access, and searching the log codes is also a bit difficult. So it would be much better if, when we open a log, it could provide detailed information about errors, reasons for failure, and such."
"The hardware aspect of the solution could be improved. We are not really able to understand the hardware capabilities of the device."
"I don't have any issues with this solution, but it may need a better, more user-friendly interface or better design of the platform."
"I would like to see some email options for Fortinet FortiAuthenticator."
"The technical support team is bad."
"The user interface and clustering are areas with shortcomings that need improvement."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews while Fortinet FortiAuthenticator is ranked 5th in Single Sign-On (SSO) with 50 reviews. CyberArk Privileged Access Manager is rated 8.8, while Fortinet FortiAuthenticator is rated 8.0. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of Fortinet FortiAuthenticator writes "A reasonably priced solution that can be scaled toward different functionalities and offers flexible SMS messaging". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and ARCON Privileged Access Management, whereas Fortinet FortiAuthenticator is most compared with Cisco ISE (Identity Services Engine), Fortinet FortiToken, Microsoft Entra ID, Fortinet FortiNAC and Yubico YubiKey.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.