Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Fortinet FortiAuthenticator comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Number of Reviews
193
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (3rd), Operational Technology (OT) Security (3rd)
Fortinet FortiAuthenticator
Average Rating
8.0
Reviews Sentiment
7.2
Number of Reviews
57
Ranking in other categories
Single Sign-On (SSO) (6th), Authentication Systems (3rd), Identity Management (IM) (7th), Multi-Factor Authentication (MFA) (3rd)
 

Mindshare comparison

While both are Identity and Access Management solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 21.2%, down 24.0% compared to last year.
Fortinet FortiAuthenticator, on the other hand, focuses on Single Sign-On (SSO), holds 11.3% mindshare, up 11.4% since last year.
Privileged Access Management (PAM)
Single Sign-On (SSO)
 

Featured Reviews

SatishIyer - PeerSpot reviewer
Jun 21, 2022
Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK
When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time. PTA is essentially the monitoring interface of the broker (e.g. Privileged Access Management, the Vault, CPM, PSM, etc.), and it's where you can capture your broker bypass and perform related actions. For this reason, we thought that this kind of mapping would be required, but CyberArk informed us that they did not have the capability we had in mind with regard to MITRE ATT&CK. I am not sure what the situation is now, but it would definitely help to have that kind of alignment with one of the more well-known frameworks like MITRE. For CyberArk as a vendor, it would also help them to clearly spell out in which areas they have full functionality and in which ares they have partial or none. Of course, it also greatly benefits the customers when they're evaluating the product.
Rias_Majeed - PeerSpot reviewer
Jun 4, 2024
Once configured properly, it runs smoothly with minimal potential for misconfiguration and enhances security by providing two-factor authentication
Customer service and support are helpful, but in the last few years, I've found that the first-level support isn't able to understand the issue. They escalate to the tier-two level, who are able to resolve it. On the first level, it takes time. Maybe they have grown too big and aren't able to give each network the unique attention it deserves. We customize some implementations, and at that time, they're not able to help because the people supporting are new and not from the field. The training seems fine, but in practice, it's different. Their support is not that great anymore. A little arrogance is there. It doesn't qualify them very well if there's arrogance in their communication. They do not understand the issue. That's why you're coming back to support. For example, one issue I'm facing is when a person leaves the organization without handing over details. They'll send an email to that person, but that person is not available. How are you going to access this email? These are a few instances where we are finding it difficult, and they take more than a week or two to resolve some issues. Their support used to be very good, but now that they're on top, they're not as responsive at the first-level support.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It has a centralized page where you can manage everything. This makes work easier. You don't have to remember different module URLs or browser applications. It is very easy to get all the secure identities of other environments into a single page, which is very important for us as it helps a lot in terms of operations, e.g., reduces management time. This is a single page where you can manage all accounts and onboard them to the CyberArk. You can then secure and see passwords from everywhere. So, there is a single pane of glass where you can manage all the identities across environments as well as across different types of identities."
"It is very simple to use."
"Password rotation, session recording & isolation and on-demand privileges."
"CyberArk makes our environment more secure and prevents possible attacks by compromised accounts."
"The most valuable feature is Special Monitoring."
"The risk of lost password and forbidden access to resources has been drastically reduced which increased the security level for the entire company,"
"On the customer accounts side, our account managers are responsive. If you ask them, they will get you whomever you need."
"Because we now have the ability to grant access to management utilities like DNS Manager, Sequel Studio, and MMC, in a secure fashion, without system admins being required to continually reenter various passwords that are stored who knows where, it has really made the system admin's job much easier. It has made the PSM's job much easier. It has made the auditor's job and the security team's job and the access manager's job significantly easier, because we're able to move much more quickly toward a role-based access management system, and that is really streamlining the whole onboarding/offboarding management process."
"The product enables SSO."
"The product is good, cost-effective, and functionally efficient."
"We use multi-factor authentication for enhancing security."
"The integration into tools, including CI/CD pipelines, is easy and handy."
"The tool's most valuable features are push notifications and integration with the FortiGate firewall. Push notifications provide an instant acceptance mechanism. When customers try to access SSL VPN, the solution sends a push notification to their mobile phone, and they can easily approve the access. The integration with FortiGate firewall is very easy if our customers use FortiGate for their firewall."
"The response from Fortinet is very fast."
"We have a perpetual license for 2FA."
"Fulfilled our requirement at a good price."
 

Cons

"There were a lot of manual steps in the initial setup which could have been automated. I read the 10.4 release that was sent out about a month or two ago, and I saw the steps required for upgrade have been reduced by about 90%. That was a big thing for me, but I still haven't seen that yet because we have not upgrade past 9.9.5."
"The current interface is not very intuitive."
"CyberArk has two disadvantages; the first is that it's insanely expensive and the other is it's very complex."
"More additional features as far as the REST is concerned, because we have something which was the predecessor to REST. A lot of the features which were in the predecessor have not necessarily been ported over to REST yet."
"It's a big program. To scale excessively, locally, on an on-prem application, takes a lot of servers."
"I'd like it to be a little more granular. I want a little bit more control over exactly what we do. I know if you do that, you add more knobs and dials to deal with, but that's just my personal approach: granular access."
"I would like to see better automation in granting access, better tools, more efficient tools, to be able to customize the solution that CyberArk provides."
"PAM could be more user-friendly and CyberArk could update the documentation to include more real-world examples. You have to learn it yourself through trial and error. In particular, the online documentation should have more information about troubleshooting."
"The technical support team is bad."
"The product must provide full support for third-party FIDO security keys."
"We've had some issues with integration."
"The technical support could be improved as some staff lacks the necessary knowledge to assist effectively."
"The only issue I encounter is that when not using FortiAuthenticator for an extended period, it's typical to encounter some obstacles in the configuration process that you need to address."
"The GUI is on the older side but I'm sure that it will be upgraded soon. It works, but it looks a little dated."
"We would like to see Linux-based operating systems be able to integrate with FortiAuthenticator to get two-factor authentication running on them. as well. This is a shortcoming that I have faced a few times already."
"If you want some other FortiAuthenticator from one site to another site, you should have requirements, but really if you have authentication and directory or another solution, you should change the password of the authenticator between the solution and the directory and other things. So transfer of data and other information should be simpler."
 

Pricing and Cost Advice

"I would rate CyberArk's pricing a nine out of ten, with one being cheap and ten being expensive. It's one of the most expensive solutions in the market, but it's worth it."
"CyberArk is one of the best PAM solutions and one of the most expensive, but it works better than the others, so the pricing is fair."
"I haven't seen the numbers. I know it is not cheap, but I don't know what it is. I would rate it a six out of ten in terms of pricing. It is definitely more expensive than the other product, but it also provides more functionality, and it is modular too. So, we pay for the functionality we're actually going to use, and that's nice."
"Licensing fees are paid on a yearly basis."
"There are additional features added to our CyberArk Privileged Access Manager license. For example, features that allow us to integrate into various kinds of platforms."
"Our risk is definitely significantly lower. Also, our resources are low."
"This solution is considered to be more expensive than others out there on the market today."
"The solution is cost-effective for the features."
"I would start off with a VM including the base license and scale according to the number of users you need to authenticate."
"We pay for licensing on a yearly basis."
"The price seems okay. It's not that expensive compared to other authenticators."
"It's not expensive."
"The product could be more competitively priced."
"The licensing structure is cost-effective for us compared to some of the other solutions that have recurring monthly costs."
"The product has affordable pricing compared to other vendors."
"The platform provides a user-based pricing model rather than a subscription pricing model."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
815,854 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
31%
Financial Services Firm
13%
Computer Software Company
11%
Manufacturing Company
6%
Computer Software Company
19%
Government
8%
Financial Services Firm
8%
Comms Service Provider
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager comes at a high cost. But the solution is worth its price.
What is your experience regarding pricing and costs for Fortinet FortiAuthenticator?
The pricing is about three on a scale where ten is low. Pricing should be more flexible.
What needs improvement with Fortinet FortiAuthenticator?
FortiAuthenticator should integrate with other applications. I currently use Google Authenticator and Office Authenticator, and it would be better if FortiAuthenticator could be added to other appl...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
FortiAuthenticator
 

Learn More

 

Overview

 

Sample Customers

Rockwell Automation
Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: November 2024.
815,854 professionals have used our research since 2012.