On-premises deployment and excellent log details make this product valuable
What is our primary use case?
Our primary use case for Fortinet FortiAuthenticator is, first of all, as a two-factor VPN for enhanced access security. We use this product to provide secure access for all of our employees. Our other use cases have to do with using FortiAuthenticator for other security projects which includes things like access to some important web applications.
Pros and Cons
"The logs have great detail that make it easier to evaluate and control the security environment."
"It can not use SQL to query FortiAnalyzer directly."
What other advice do I have?
On a scale from one to ten where one is the worst and ten is the best, I would rate Authenticator as about a seven-point-five. If it has to be seven or eight, I would choose eight. I have not used many products in that category with our site, but we can do what we want and need to do with that product.