Compare Fortinet FortiToken vs. In-Webo

Cancel
You must select at least 2 products to compare!
Fortinet FortiToken Logo
4,959 views|4,464 comparisons
In-Webo Logo
256 views|228 comparisons
Top Review
Find out what your peers are saying about Fortinet, Cisco, Frontegg and others in Authentication Systems. Updated: August 2021.
533,638 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
"It is included as part of our firewall license."

More Fortinet FortiToken Pricing and Cost Advice »

Information Not Available
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
533,638 professionals have used our research since 2012.
Questions from the Community
Top Answer: Its ease of use is most valuable. It is simple to use and can be deployed out-of-the-box. It is quite a mature product with all the required features.
Top Answer: It needs a lot of coupling with their other Fortinet products. To implement FortiToken, I most probably need to couple it with FortiAuthenticator for full implementation. An RSA token can be used with… more »
Top Answer: We are using it for VPN. We have its latest version.
Ask a question

Earn 20 points

Ranking
4th
Views
4,959
Comparisons
4,464
Reviews
3
Average Words per Review
401
Rating
7.3
25th
Views
256
Comparisons
228
Reviews
0
Average Words per Review
0
Rating
N/A
Comparisons
Learn More
In-Webo
Video Not Available
Overview

As we've seen, passwords alone don't keep unwanted guests out of your network. Password-only authentication has led to security breaches, malware infections, and policy violations. With two-factor authentication, a password is used along with a security token and authentication server to provide far better security.  Authorized employees can remotely access company resources safely using a variety of devices, ranging from lpatops to mobile phones.

inWebo took a different approach that prevents all 3 common 'flaws' of software+SaaS MFA solutions. We built our authentication algorithms using dynamic and random device credentials. The verification algorithms run within certified HSMs (hardware-security modules) operated in our multi-datacenter infrastructure. From a security standpoint, our solution is equivalent if not better than those 10 years ago. Yet, it also enjoys the flexibility, scalability, and convenience of a software+SaaS solution.
Offer
Learn more about Fortinet FortiToken
Learn more about In-Webo
Sample Customers
Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
Deloitte, Groupama, Carrefour, Renater, Accor, Samsung, Sodexo, Pixia, Affirm, Safran, Locarchives
Top Industries
VISITORS READING REVIEWS
Comms Service Provider33%
Computer Software Company24%
Government7%
Manufacturing Company4%
No Data Available
Find out what your peers are saying about Fortinet, Cisco, Frontegg and others in Authentication Systems. Updated: August 2021.
533,638 professionals have used our research since 2012.

Fortinet FortiToken is ranked 4th in Authentication Systems with 3 reviews while In-Webo is ranked 25th in Authentication Systems. Fortinet FortiToken is rated 7.4, while In-Webo is rated 0.0. The top reviewer of Fortinet FortiToken writes "Mature, stable, and easy to use and deploy". On the other hand, Fortinet FortiToken is most compared with Microsoft Authenticator, Fortinet FortiAuthenticator, Duo Security, Yubico YubiKey and RSA Authentication Manager, whereas In-Webo is most compared with Fortinet FortiAuthenticator, Microsoft Authenticator and Duo Security.

See our list of best Authentication Systems vendors.

We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.