Patrick GrimardTeam Lead Network IP and Systems at a comms service provider
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"Its ease of installation is most valuable. It took me five minutes, and it was up and running. It didn't take me that long. The installation on the cell phones is pretty simple."
"Its ease of use is most valuable. It is simple to use and can be deployed out-of-the-box. It is quite a mature product with all the required features."
"The most valuable features are Password Reset Alerts, Password Sync, and SQL connectors."
"It's a very flexible tool, so you can synchronize multiple sources of data and you have multiple connections to various kinds of systems."
"The main value lies in the simplicity of implementation, as well as its customized look and feel."
"Its reporting should be better. The reporting feature is missing. I don't have any reporting of who has done what, what has failed, and what didn't work."
"It needs a lot of coupling with their other Fortinet products. To implement FortiToken, I most probably need to couple it with FortiAuthenticator for full implementation. An RSA token can be used with many devices, whereas Fortinet FortiToken is always linked to only one FortiGate device. If I want to reuse the token across five or six FortiGates, I would have to get the FortiAuthenticator product. I can't use one token to connect to different FortiGates, and I need to get another product to enable this functionality. They should also improve the support for their mobile client. There should be a more detailed roadmap for the operating systems being supported. Some of our users were using an old iOS iPhone, and they were forced to get a newer phone because FortiToken didn't support that version of iOS. Similarly, there may be a version of Android that is not supported, so the users need to change the phone. This was one of the reasons why our deployment took longer."
"The interface is old and outdated, and the design software seems archaic."
"If it could be operated in such a way that anybody could use it, with just the user interface, and there's no need for programming, then that would be a great improvement."
"There's no huge thing missing, because it's already comprehensive. Now and then, however, there might be a minor issue."
"You just need to be aware that the more systems you connect, the more license fees you have to pay."
"Micro Focus is flexible when it comes to price. The cost varies from customer to customer. There are no additional costs, though. Everything is included."
Earn 20 points
As we've seen, passwords alone don't keep unwanted guests out of your network. Password-only authentication has led to security breaches, malware infections, and policy violations. With two-factor authentication, a password is used along with a security token and authentication server to provide far better security. Authorized employees can remotely access company resources safely using a variety of devices, ranging from lpatops to mobile phones.
Fortinet FortiToken is ranked 4th in Authentication Systems with 2 reviews while NetIQ Identity Manager is ranked 6th in User Provisioning Software with 4 reviews. Fortinet FortiToken is rated 8.0, while NetIQ Identity Manager is rated 8.8. The top reviewer of Fortinet FortiToken writes "Mature, stable, and easy to use and deploy". On the other hand, the top reviewer of NetIQ Identity Manager writes "A flexible tool that connects to multiple and various data sources". Fortinet FortiToken is most compared with Fortinet FortiAuthenticator, Duo Security, Yubico YubiKey, Microsoft Authenticator and RSA SecurID Access, whereas NetIQ Identity Manager is most compared with SailPoint IdentityIQ, Microsoft Identity Manager, One Identity Manager, ForgeRock and CyberArk Privileged Access Manager.
See our list of .
We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.