Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs Fortinet FortiToken comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 11, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Identity
Ranking in Authentication Systems
8th
Average Rating
8.2
Reviews Sentiment
7.0
Number of Reviews
23
Ranking in other categories
Identity Management (IM) (11th), Authorization Software (3rd), Enterprise Password Managers (8th), User Entity Behavior Analytics (UEBA) (9th), Access Management (6th), Active Directory Management (9th), Cloud Resource Access Management (2nd), Customer Identity and Access Management (CIAM) (6th)
Fortinet FortiToken
Ranking in Authentication Systems
3rd
Average Rating
8.4
Reviews Sentiment
7.3
Number of Reviews
29
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of April 2025, in the Authentication Systems category, the mindshare of CyberArk Identity is 1.7%, up from 1.0% compared to the previous year. The mindshare of Fortinet FortiToken is 6.5%, down from 7.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Authentication Systems
 

Featured Reviews

Julio Montero - PeerSpot reviewer
Access management system provides strong security and effortless user authentication
The solution can be deployed on cloud or on-premises. CyberArk is more on the cloud than on local hardware. The deployment is initially quite difficult. That said, when you are doing the implementation of CyberArk, there are so many tutorials that make the learning process very easy. The only complaint could be the language barrier. It's difficult if you don't have a very good level of English. Otherwise, it is very easy. You can have it set up within three months without much difficulty. It's hard to get started, however, once you get going, it gets easier. A full deployment takes half a year or less. There is some maintenance necessary. A company is constantly hiring and letting go of employees. The access is always changing, so access must always be adjusted. Or, if we need another law of filter, we would need to add those, or even take them away. That's another aspect of maintenance.
Sachin Vinay - PeerSpot reviewer
Facilitates secure 2FA for admins, facilitates OTP generation, and enhances security
One suggestion is to develop a more user-friendly solution that is cost-effective so that a hardware-based solution can be provided to all users using VPN services or any configuration service requiring confidentiality. This would allow for broader distribution among a larger number of system admins and software engineers, which is currently not feasible with the existing hardware-only approach.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It has machine learning and can help clients to learn the environment and understand what is happening."
"The features that I personally find most effective in terms of security stem from the fact that it is easy to integrate and also the adoption is faster."
"I had one machine that I could not use due to an invalid token. They resolved the problem immediately after I reported it, on the same day, within one hour. It is a very good experience."
"CyberArk Identity is a mature product."
"The most valuable feature of CyberArk Identity is the adaptive interface."
"The feature that we find most valuable is the ability to integrate multiple IDs for on-premises Active Directory."
"I like the RBAC (Role-Based Access Control). It basically involves defining various roles, and then simply assigning those roles to users."
"The best thing I like about CyberArk Identity is that it does not require heavy implementation, complex hardware, or complex training."
"The integrated Fortinet security with the app that allows you to easily do the two-factor authentication is most valuable."
"The solution is unique in catering to Fortinet, making it very useful and secure."
"Overall, I give the product a nine out of ten."
"Its ease of use is most valuable. It is simple to use and can be deployed out-of-the-box. It is quite a mature product with all the required features."
"Fortinet FortiToken is used for double factor authentication."
"One of the product's most valuable features is its ease of use."
"The most valuable feature of the solution is its mobile application. It is particularly beneficial as it eliminates the need for hardware management."
"The token-based authentication is good and modern aspect."
 

Cons

"Integration or deployment is extremely difficult for CyberArk Identity."
"The product needs to leverage the cloud more, especially in the financial sector, where cloud adoption might be limited. Proper reporting within the cloud is essential. The tool should be more user-friendly to expedite access for users. The current agent-based system poses challenges if a user loses access to the server, making tasks difficult to perform. It should also improve technical support."
"To enhance the product, they can consider improving the user interface of the software and possibly the customer support team."
"Something they could improve is the management of multifactor authentication. When you translate the page from one language to another, it can be a difficult process."
"To enhance the product, they can consider improving the user interface of the software and possibly the customer support team. Sometimes, there is a delay in handling my inquiries via email, which could be addressed for better service."
"Integration or deployment is extremely difficult for CyberArk Identity."
"In terms of general user feedback, the more security you put in front of a user, the more they complain. So usability and the user experience are always a challenge. So there's always room for improvement."
"CyberArk Identity's GUI is an area with certain shortcomings that need improvement."
"They need to develop a more user-friendly solution that is cost-effective so that a hardware-based solution can be provided to all users using VPN services or any configuration service requiring confidentiality."
"We can only use the tool with the FortiToken Mobile app."
"The tool could be a little cheaper."
"Configuration can be confusing due to the lack of community and context-sensitive help. We've had to rely on technical support, which slows down the setup process."
"They could enhance synchronization with mobile applications, and addressing minor issues with authentication could further improve user experience."
"I would like to see the product improvements in dynamic VLAN pooling. Specifically, when users are assigned different VLANs based on their SSID, ensuring no unintended lateral traffic between users would enhance security and efficiency."
"Fortinet FortiToken should improve its push notifications."
"It could be integrated better if you could have your FortiToken, and the license would allow you to work across multiple FortiGate solutions."
 

Pricing and Cost Advice

"In terms of pricing, BeyondTrust and CyberArk tend to be more expensive, with CyberArk receiving an eight out of ten, in this regard."
"The pricing point is very good. I compared it with other products, and it does not require a heavy investment."
"Their pricing is obviously a lot higher than many vendors in the marketplace but their service is also unmatched."
"There is an initial license and then there is a subscription needed."
"The pricing is acceptable. It is worth considering what we are protecting with the amount charged."
"I would rate the tool’s pricing a seven out of ten. The product’s pricing is expensive and is on a yearly basis. You will need to pay around 10,000 GBP for 500 users."
"It's not that affordable compared to Delinea or other products. They're less expensive and allow more customization. For the cost, it is expensive."
"CyberArk Identity is an expensive solution."
"On a scale of one to ten, where one is the cheapest, and ten is the highest, I rate the pricing an eight."
"The pricing is not very high, so I'd rate it around six out of ten, where one is high and ten is low."
"I rate the tool's pricing a five out of ten."
"On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing a six out of ten."
"I would rate the pricing as an eight out of ten. We purchased the solution at a reasonable price in 2019."
"The platform's licensing cost is reasonable for our organization."
"Overall, it's cheaper than other solutions. Of course, we evaluated it five years back, and I haven't checked to see its current market position, but one reason we adopted FortiToken is its lower cost of ownership relative to other solutions we evaluated."
"Fortinet FortiToken is not an expensive solution."
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
846,617 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Computer Software Company
13%
Manufacturing Company
11%
Healthcare Company
6%
Computer Software Company
18%
Financial Services Firm
7%
Government
7%
University
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
The pricing point is very good. I compared it with other products, and it does not require a heavy investment.
What needs improvement with CyberArk Identity?
It does not have global market penetration, and sometimes, there are support issues. CyberArk Identity can definitely improve on the IAM rules when I create them. The stability can also be better.
What do you like most about Fortinet FortiToken?
The solution is simple and similar to Google Authenticator. It follows time-based authentication. We use it for hardware and software in one environment. The tool offers simple and fast authenticat...
What is your primary use case for Fortinet FortiToken?
I am using FortiToken for logging into the Fortinet hardware. I have four FortiGate hardware units. I am connected through a simulator on FortiToken.
 

Also Known As

Idaptive
No data available
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
Find out what your peers are saying about CyberArk Identity vs. Fortinet FortiToken and other solutions. Updated: April 2025.
846,617 professionals have used our research since 2012.