Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs Fortinet FortiAuthenticator comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 11, 2024
 

Categories and Ranking

Omada Identity
Sponsored
Ranking in Identity Management (IM)
4th
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
48
Ranking in other categories
User Provisioning Software (3rd), Identity and Access Management as a Service (IDaaS) (IAMaaS) (5th), Customer Identity and Access Management (CIAM) (3rd)
CyberArk Identity
Ranking in Identity Management (IM)
13th
Average Rating
8.2
Reviews Sentiment
7.0
Number of Reviews
19
Ranking in other categories
Authentication Systems (9th), Authorization Software (4th), Enterprise Password Managers (9th), User Entity Behavior Analytics (UEBA) (9th), Access Management (9th), Active Directory Management (11th), Cloud Resource Access Management (2nd), Customer Identity and Access Management (CIAM) (6th)
Fortinet FortiAuthenticator
Ranking in Identity Management (IM)
7th
Average Rating
8.0
Reviews Sentiment
7.0
Number of Reviews
59
Ranking in other categories
Single Sign-On (SSO) (6th), Authentication Systems (3rd), Multi-Factor Authentication (MFA) (3rd)
 

Featured Reviews

Pernilla Hulth - PeerSpot reviewer
The interface is easy to use and gives you a solid overview
The cloud-based deployment was straightforward, but the on-prem deployment was in a highly complex ecosystem. Omada has matured since then. I wouldn't say that it isn't straightforward, but it depends on the customer. A standard deployment is relatively easy, but it can be more painful if you need a lot of customization. We deployed the cloud solution in around four months, nearly meeting the 12-week benchmark. The on-prem deployment took three years. It was a highly complex ecosystem that was dependent on other systems. Depending on the size of your environment, you need a product owner and some specialists for maintenance. My last customer was a university with a complex environment. They had around 12 people involved in maintenance at that organization. Typically, it's between 2-5 people.
Avinash Gopu. - PeerSpot reviewer
Allows Linux and Unix administrators to login with single password
The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring. It is integrated with tools like Splunk and Dynatrace for the analysis of risk behavior and user activity. The pushing teams receive automated reports to assess factors such as login times and server activity in the last 60 days. The licensing for IAM and PAM tools is based on headcount and usage. Users who are not actively utilizing the resources may have their access revoked. This approach helps manage budgeting and reduces the risk impact on the organization by implementing protocols to mitigate threats.
Rias_Majeed - PeerSpot reviewer
Once configured properly, it runs smoothly with minimal potential for misconfiguration and enhances security by providing two-factor authentication
Customer service and support are helpful, but in the last few years, I've found that the first-level support isn't able to understand the issue. They escalate to the tier-two level, who are able to resolve it. On the first level, it takes time. Maybe they have grown too big and aren't able to give each network the unique attention it deserves. We customize some implementations, and at that time, they're not able to help because the people supporting are new and not from the field. The training seems fine, but in practice, it's different. Their support is not that great anymore. A little arrogance is there. It doesn't qualify them very well if there's arrogance in their communication. They do not understand the issue. That's why you're coming back to support. For example, one issue I'm facing is when a person leaves the organization without handing over details. They'll send an email to that person, but that person is not available. How are you going to access this email? These are a few instances where we are finding it difficult, and they take more than a week or two to resolve some issues. Their support used to be very good, but now that they're on top, they're not as responsive at the first-level support.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Omada's onboarding features reflect our processes for onboarding new employees well. That is the primary reason we use this solution. We use role-based access control. I'm not sure how much it has improved our security posture, but it's made managing identities more convenient."
"Omada's user interface is elegant and easy to work with. I like Omada's ability to automatically generate accounts for new hires and allow them access to all required systems by established policies. Around 80 percent of workers can start working immediately on their first day without requesting further access."
"We are able to onboard new user accounts much faster by automating the process and standardizing our operations globally. Previously, there were many individual processes and manual admin interactions. We also see a lot of cost savings and benefits because through automation and standardization."
"The most valuable feature for us is the ability to set up connectors to various IT systems and offer a wide range of supported connectors."
"The benefits of Omada Identity include a holistic way of viewing access, the ability to give people access, and automation."
"The support for the validity of the resources is valuable. The tool allows resource assignments within a validity period so that the managers do not have to remember to revoke the access once the work is done."
"What I like most is that we can always find a solution, and we can also find the cause when something goes wrong. I like that the most because everything is in one way or another traceable. That is what I like most. I like its reliability."
"As an administrator, we benefit from a lot of functionality that is available out of the box, but it is also configurable to meet our specific needs."
"I found the solution to be stable."
"CyberArk Identity is a mature product."
"The setup, via cloud, is simple."
"I like the RBAC (Role-Based Access Control). It basically involves defining various roles, and then simply assigning those roles to users."
"The initial setup of CyberArk Identity was straightforward."
"The user identification is simplified, and managing user privileges, whether adding or revoking them, is also quite straightforward when utilizing CyberArk SaaS."
"The initial setup is straightforward. It takes me up to an hour and a half."
"The tool is a very strong and valuable enterprise solution, particularly in ensuring the continuity of service."
"The most valuable feature is the flexibility in using the SMS messages."
"Enables easy integration, allowing for 2FA with our VPN."
"The feature I value the most is the one-time passwords because it helps to authenticate users so you know the timing of their usage."
"For someone concerned with multifactor authentication, I'm satisfied with the product."
"The product’s most valuable feature is integration with FortiGate, FortiToken, FortiTalk, and multi-factor authentication."
"I work a lot with Fortinet products and I call the support often. They are very quick to respond and the support is very good."
"It has simplified network management, reduced operational costs, and ensured seamless connectivity across all our sites."
"This is a scalable product."
 

Cons

"When the re-certification process is launched that makes Omada very slow. There are performance issues in the current version."
"If you find an error and you need it fixed, you have to upgrade. It's not like they say, "Okay, we'll fix this problem for you." You have to upgrade. The last time we upgraded, because there was an error in a previous version, we had to pay 150,000 Danish Krone (about $24,000 at the time of this review) to upgrade our systems... That means that we have to pay to get errors fixed that Omada has made in programming the system. I hope they change this way of looking at things."
"When you do a recalculation of an identity, it's hard to understand what was incorrect before you started the recalculation, and which values are actually updated... all you see are all the new fields that are provisioned, instead of seeing only the fields that are changed."
"It is not possible to customize reports on Omada Identity."
"The reporting on the warehouse data and the import process both have room for improvement."
"In our organization, all the data is event-driven, which means that if an attribute is changed in the source system, it can be updated within a few seconds in all end-user systems. There is room for improvement in Omada regarding that. Omada is still batch-based for some processes, so sometimes it can take an hour or even four hours before the execution is run and the update is sent."
"They need to improve the cost for small companies."
"Omada could make it a bit more convenient to send emails based on events automatically. Having that functionality is critical for us to maintain transparency."
"They could improve their UI and make everything more user-friendly."
"I'm not sure what needs improvement. It is a good platform."
"The OpenID features could improve in CyberArk Identity."
"We would like to see an improvement in the ability to manage mobile devices."
"CyberArk Identity's GUI is an area with certain shortcomings that need improvement."
"More integrations would be better."
"The product needs to leverage the cloud more, especially in the financial sector, where cloud adoption might be limited. Proper reporting within the cloud is essential. The tool should be more user-friendly to expedite access for users. The current agent-based system poses challenges if a user loses access to the server, making tasks difficult to perform. It should also improve technical support."
"In terms of general user feedback, the more security you put in front of a user, the more they complain. So usability and the user experience are always a challenge. So there's always room for improvement."
"There is a room for improvement. The log is a bit difficult to access, and searching the log codes is also a bit difficult. So it would be much better if, when we open a log, it could provide detailed information about errors, reasons for failure, and such."
"The technical support team is bad."
"The customization capability of Fortinet FortiAuthenticator is not very flexible."
"The solution's command line interface could be improved to provide better support for low-level debugging and advanced configurations."
"There is room for improvement in stability and support."
"I would like to see more support from Fortinet with tech support people who have as much expertise on the authenticator as they do on their firewalls."
"I would like to see more integration and inclusion of features for ransomware protection directly within the FortiAuthenticator without requiring additional devices."
"Integration with some other enterprise applications could be improved."
 

Pricing and Cost Advice

"It is not cheap. It is expensive, but compared to what we did almost three years ago, it is value for money. It is worth it."
"It is not cheap. None of these solutions are cheap, but we have good pricing at least for now from a licensing perspective."
"The pricing is okay."
"They are positioned at a good price point. They are lower than some of their competitors."
"From an on-prem point of view, the cost is quite transparent and reasonable. The direct cost is primarily for licenses and maintenance on licenses."
"Omada Identity is very reasonably and competitively priced."
"My client deals directly with the Omada Identity team in terms of licensing. I never look at pricing, so I'm not aware of how much the solution costs, but it's worth the money. Often, when you begin to use Omada Identity and it takes a while to set up, it'll be irreversible, and you'd depend on and focus more on the functionality of the solution, rather than its price tag."
"The pricing for Omada Identity is fair."
"It's not that affordable compared to Delinea or other products. They're less expensive and allow more customization. For the cost, it is expensive."
"CyberArk Identity is an expensive solution."
"The solution is cheap and I rate its pricing an eight out of ten."
"There is an initial license and then there is a subscription needed."
"The pricing of CyberArk Identity is competitive."
"We find that the pricing and licensing of this solution is adequate, as compared to the other competitors in the market."
"There could be some additional costs apart from the licensing costs of the solution when you want to develop connectors in CyberArk Identity."
"I would rate the tool’s pricing a seven out of ten. The product’s pricing is expensive and is on a yearly basis. You will need to pay around 10,000 GBP for 500 users."
"The product has affordable pricing compared to other vendors."
"I rate the price of Fortinet FortiAuthenticator a three out of five."
"I rate its pricing a three to five out of ten."
"It costs more to license the high-availability option."
"The platform provides a user-based pricing model rather than a subscription pricing model."
"I would start off with a VM including the base license and scale according to the number of users you need to authenticate."
"On a scale of one to ten, where one is a high price and ten is a low price, I rate the pricing a seven."
"Between paying them to help with the configuration, the box itself, and the support, it came to like $12,500, including a three-year service agreement."
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
825,399 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Computer Software Company
13%
Manufacturing Company
8%
Government
7%
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
11%
Insurance Company
7%
Computer Software Company
18%
Government
8%
Financial Services Firm
8%
Comms Service Provider
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Omada Identity?
We don't have to go in and do a lot of the work that we did before. It may have saved us somewhere in the range of 10...
What needs improvement with Omada Identity?
There are some technical bits and pieces that we have looked at that could be better. For instance, when you do a rec...
What is your primary use case for Omada Identity?
We wanted a solution that could help us make HR the master of identities. We wanted a solution that could take that d...
What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
I think it is a fairly priced tool. I rate the tool between six and seven on a scale of one to ten where one is expen...
What needs improvement with CyberArk Identity?
At the moment CyberArk needs to enrich Conjur and it needs to be made more viable so that its adoption can be made mu...
What is your experience regarding pricing and costs for Fortinet FortiAuthenticator?
The cost of FortiAuthenticator is rated high due to market conditions. Nevertheless, I rated its cost an eight on a s...
What needs improvement with Fortinet FortiAuthenticator?
The technical support could be improved as some staff lacks the necessary knowledge to assist effectively.
 

Also Known As

Omada Identity Suite, Omada Identity Cloud
Idaptive
FortiAuthenticator
 

Learn More

Video not available
 

Overview

 

Sample Customers

Bayer, ECCO Shoes, Vattenfall, NuStar Energy, Unicredit, Schiphol Group, BMW Group, Deutsche Leasing
MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
Find out what your peers are saying about CyberArk Identity vs. Fortinet FortiAuthenticator and other solutions. Updated: November 2024.
825,399 professionals have used our research since 2012.