Compare Fortinet FortiToken vs. OneLogin Workforce Identity

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about Fortinet, Cisco, Ping Identity and others in Authentication Systems. Updated: June 2021.
510,204 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"Its ease of installation is most valuable. It took me five minutes, and it was up and running. It didn't take me that long. The installation on the cell phones is pretty simple.""Its ease of use is most valuable. It is simple to use and can be deployed out-of-the-box. It is quite a mature product with all the required features.""The integrated Fortinet security with the app that allows you to easily do the two-factor authentication is most valuable."

More Fortinet FortiToken Pros »

"The solution's ability to save and manage of all my passwords is great."

More OneLogin Workforce Identity Pros »

Cons
"Its reporting should be better. The reporting feature is missing. I don't have any reporting of who has done what, what has failed, and what didn't work.""It needs a lot of coupling with their other Fortinet products. To implement FortiToken, I most probably need to couple it with FortiAuthenticator for full implementation. An RSA token can be used with many devices, whereas Fortinet FortiToken is always linked to only one FortiGate device. If I want to reuse the token across five or six FortiGates, I would have to get the FortiAuthenticator product. I can't use one token to connect to different FortiGates, and I need to get another product to enable this functionality. They should also improve the support for their mobile client. There should be a more detailed roadmap for the operating systems being supported. Some of our users were using an old iOS iPhone, and they were forced to get a newer phone because FortiToken didn't support that version of iOS. Similarly, there may be a version of Android that is not supported, so the users need to change the phone. This was one of the reasons why our deployment took longer.""The app could be improved so that you don't have to actually type in the code. It would be great if you can just do a prompt or push similar to the way Duo does."

More Fortinet FortiToken Cons »

"In terms of managing the users on a large scale, it would be easier if they had some kind of user management portal."

More OneLogin Workforce Identity Cons »

Pricing and Cost Advice
"It is included as part of our firewall license."

More Fortinet FortiToken Pricing and Cost Advice »

Information Not Available
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
510,204 professionals have used our research since 2012.
Questions from the Community
Top Answer: Its ease of use is most valuable. It is simple to use and can be deployed out-of-the-box. It is quite a mature product with all the required features.
Top Answer: It needs a lot of coupling with their other Fortinet products. To implement FortiToken, I most probably need to couple it with FortiAuthenticator for full implementation. An RSA token can be used with… more »
Top Answer: We are using it for VPN. We have its latest version.
Ask a question

Earn 20 points

Ranking
4th
Views
4,440
Comparisons
4,032
Reviews
2
Average Words per Review
429
Rating
8.0
Views
4,257
Comparisons
3,429
Reviews
1
Average Words per Review
749
Rating
9.0
Popular Comparisons
Also Known As
OneLogin
Learn More
Overview

As we've seen, passwords alone don't keep unwanted guests out of your network. Password-only authentication has led to security breaches, malware infections, and policy violations. With two-factor authentication, a password is used along with a security token and authentication server to provide far better security.  Authorized employees can remotely access company resources safely using a variety of devices, ranging from lpatops to mobile phones.

OneLogin Simplifies Identity and Access Management for a More Efficient, Secure Enterprise. Empower employees, customers and partners with secure access to your cloud and company apps on any device. Transform your enterprise security and centralize control of users, apps and devices.

Offer
Learn more about Fortinet FortiToken
Learn more about OneLogin Workforce Identity
Sample Customers
Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
AAA, Pandora, Yelp, Zendesk, Stanford, Hult, Pacific Life, One Medical Group, RichRelevance, CloudBees, Cleveland Institute of Art, reed.co.uk, Awana, Analyte, Vision Critical, Yammer
Top Industries
VISITORS READING REVIEWS
Comms Service Provider34%
Computer Software Company26%
Government6%
Media Company5%
VISITORS READING REVIEWS
Computer Software Company31%
Comms Service Provider17%
Government9%
Retailer5%
Company Size
No Data Available
REVIEWERS
Small Business29%
Midsize Enterprise14%
Large Enterprise57%
Find out what your peers are saying about Fortinet, Cisco, Ping Identity and others in Authentication Systems. Updated: June 2021.
510,204 professionals have used our research since 2012.

Fortinet FortiToken is ranked 4th in Authentication Systems with 3 reviews while OneLogin Workforce Identity is ranked 4th in Identity and Access Management as a Service (IDaaS) with 1 review. Fortinet FortiToken is rated 7.4, while OneLogin Workforce Identity is rated 9.0. The top reviewer of Fortinet FortiToken writes "Mature, stable, and easy to use and deploy". On the other hand, the top reviewer of OneLogin Workforce Identity writes "Easy to use, good password management and a straightforward setup". Fortinet FortiToken is most compared with Fortinet FortiAuthenticator, Duo Security, Yubico YubiKey, Microsoft Authenticator and RSA SecurID Access, whereas OneLogin Workforce Identity is most compared with Okta Workforce Identity, Auth0, Azure Active Directory, LastPass Enterprise and Oracle Identity Cloud Service.

See our list of .

We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.