Compare Fortinet FortiToken vs. Yubico YubiKey

Cancel
You must select at least 2 products to compare!
Fortinet FortiToken Logo
4,772 views|4,302 comparisons
Yubico YubiKey Logo
4,169 views|3,763 comparisons
Most Helpful Review
Find out what your peers are saying about Fortinet, Cisco, Ping Identity and others in Authentication Systems. Updated: July 2021.
523,535 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
"It is included as part of our firewall license."

More Fortinet FortiToken Pricing and Cost Advice »

Information Not Available
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
523,535 professionals have used our research since 2012.
Questions from the Community
Top Answer: Its ease of use is most valuable. It is simple to use and can be deployed out-of-the-box. It is quite a mature product with all the required features.
Top Answer: It needs a lot of coupling with their other Fortinet products. To implement FortiToken, I most probably need to couple it with FortiAuthenticator for full implementation. An RSA token can be used with… more »
Top Answer: We are using it for VPN. We have its latest version.
Ask a question

Earn 20 points

Ranking
3rd
Views
4,772
Comparisons
4,302
Reviews
3
Average Words per Review
401
Rating
7.3
Views
4,169
Comparisons
3,763
Reviews
0
Average Words per Review
0
Rating
N/A
Popular Comparisons
Also Known As
YubiKey
Learn More
Overview

As we've seen, passwords alone don't keep unwanted guests out of your network. Password-only authentication has led to security breaches, malware infections, and policy violations. With two-factor authentication, a password is used along with a security token and authentication server to provide far better security.  Authorized employees can remotely access company resources safely using a variety of devices, ranging from lpatops to mobile phones.

The YubiKey works with hundreds of enterprise, developer and consumer applications, out-of-the-box and with no client software. Combined with leading password managers, social login and enterprise single sign on systems the YubiKey enables secure access to millions of online services.
Offer
Learn more about Fortinet FortiToken
Learn more about Yubico YubiKey
Sample Customers
Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
Google Inc., Salesforce, Novartis, Facebook, GitHub, CERN, Duke University, Code Enigma, Luther Burbank High School, ZorgSaam, Agfa, Santa Clara County Fire Department, Dyson Ltd, Portugal Telecom, Boral, Canonical Ltd
Top Industries
VISITORS READING REVIEWS
Comms Service Provider35%
Computer Software Company26%
Government6%
Manufacturing Company4%
VISITORS READING REVIEWS
Comms Service Provider29%
Computer Software Company19%
Government10%
Manufacturing Company6%
Find out what your peers are saying about Fortinet, Cisco, Ping Identity and others in Authentication Systems. Updated: July 2021.
523,535 professionals have used our research since 2012.

Fortinet FortiToken is ranked 3rd in Authentication Systems with 3 reviews while Yubico YubiKey is ranked 1st in Passwordless Authentication. Fortinet FortiToken is rated 7.4, while Yubico YubiKey is rated 0.0. The top reviewer of Fortinet FortiToken writes "Mature, stable, and easy to use and deploy". On the other hand, Fortinet FortiToken is most compared with Fortinet FortiAuthenticator, Microsoft Authenticator, Duo Security, RSA SecurID Access and SafeNet Authentication Manager, whereas Yubico YubiKey is most compared with Duo Security, RSA SecurID Access, Microsoft Authenticator, Fortinet FortiAuthenticator and SafeNet Authentication Manager.

See our list of .

We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.