Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Fortinet FortiToken comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
219
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
Fortinet FortiToken
Average Rating
8.4
Reviews Sentiment
7.3
Number of Reviews
29
Ranking in other categories
Authentication Systems (3rd)
 

Mindshare comparison

While both are Identity and Access Management solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 19.0%, down 23.1% compared to last year.
Fortinet FortiToken, on the other hand, focuses on Authentication Systems, holds 6.5% mindshare, down 7.2% since last year.
Privileged Access Management (PAM)
Authentication Systems
 

Featured Reviews

Lasantha Wijesinghe - PeerSpot reviewer
We have visibility and control through real-time user behavior analytics
It took us some time to realize its benefits because there was a learning curve for us. It took us about a year to get our heads around this product and start effectively using it. It is a journey. It takes at least five years for any company to make this product very useful and reach maturity. It is not only the product's fault. The company needs to have a vision, and the company culture needs to go with it. Senior leadership needs to support the vision. You need to have lots of ingredients for success. If everything is in place, you will see success after one year. In the first year, it is a struggle for everybody. My company was bought by a bigger company, and they were very new to privileged access management. Everybody was struggling. The advice I would give is to have a good vision for privileged access management. You need dedicated teams, senior management support, and proper company policies and standards before implementing the solution. Start building knowledge slowly and avoid jumping into the deep end without preparation. I would rate CyberArk Privileged Access Manager a nine out of ten.
Sachin Vinay - PeerSpot reviewer
Facilitates secure 2FA for admins, facilitates OTP generation, and enhances security
One suggestion is to develop a more user-friendly solution that is cost-effective so that a hardware-based solution can be provided to all users using VPN services or any configuration service requiring confidentiality. This would allow for broader distribution among a larger number of system admins and software engineers, which is currently not feasible with the existing hardware-only approach.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The tool has safe vaults. We keep our passwords in the Vault. The tool’s recording feature is also valuable for us."
"I'm no longer the product owner for PAM, but I can say that the most useful feature is the vault functionality, which keeps all your passwords secure in a digital vault."
"It's secure and reliable. I especially appreciate that it's locked down and only allows access to authorized components."
"The feature that I like the most is the Privileged Session Manager. It offers session recordings, logging, and tracking of user workstreams."
"The most valuable features of the solution are control and analytics."
"It is a scalable product."
"Technical support is very helpful whenever we have any questions."
"The biggest feature is the security of the overall solution. It's very secure. The vaulting technology and the number of security layers involved in the vault, where privileged accounts are actually stored, is the heart of the solution."
"Overall, I rate the FortiToken solution as nine out of ten. I would definitely recommend it due to its effectiveness in enhancing security."
"Bangladesh is a price-sensitive market, and FortiToken is popular because it's more affordable than the Palo Alto and Cisco authentication solutions. Fortinet has a local director for Bangladesh, so they can deliver solutions to customers quickly."
"We like the mobile FortiToken."
"The initial setup is easy. You receive a QR code via email, scan it, and add it. No complicated procedures involved."
"Their resolution time is timely, and they provide solutions efficiently."
"The most valuable feature of the solution is its mobile application. It is particularly beneficial as it eliminates the need for hardware management."
"It provides me with the token so that I can do the Multi-Factor Authentication."
"FortiToken is integrated with FortiClient solution for users working from home, providing an additional layer of security by sending OTPs for authentication."
 

Cons

"When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time."
"CyberArk has brought a feature called Vendor Team Manager, but it does not provide full access. It requires the vendor team leader to be onboarded as a local account instead of using their email address. Improvements could be made to onboard the vendor team leaders using their email, allowing them to manage their own team. That would greatly reduce the overhead in managing vendor team members."
"The solution's architecture could be improved. It requires installation on four to five different servers. Each server has a purpose, but when you need to troubleshoot, it can be difficult because you need to access each of them. Reducing the number of servers would be helpful."
"As they grow, the technical support is having growing pains. One of the things is just being able to get somebody on the phone sometimes."
"Stability is a huge concern right now. We are on a version which is very unstable. We have to upgrade to stabilize it. It is fine, but the problem is we have to hire CyberArk to do the upgrade. This costs money, and it is their bug."
"One of our current issues is a publishing issue. If we whitelist Google Chrome, all the events of Google Chrome should be gone. It is not happening."
"We found a lot of errors during the initial setup. They should work to improve the implementation experience and to remove errors from the process."
"The graphical user interface could be simplified and harmonized for better usability. It should be consistent. Its GUI is very confusing."
"It needs a lot of coupling with their other Fortinet products. To implement FortiToken, I most probably need to couple it with FortiAuthenticator for full implementation. An RSA token can be used with many devices, whereas Fortinet FortiToken is always linked to only one FortiGate device. If I want to reuse the token across five or six FortiGates, I would have to get the FortiAuthenticator product. I can't use one token to connect to different FortiGates, and I need to get another product to enable this functionality. They should also improve the support for their mobile client. There should be a more detailed roadmap for the operating systems being supported. Some of our users were using an old iOS iPhone, and they were forced to get a newer phone because FortiToken didn't support that version of iOS. Similarly, there may be a version of Android that is not supported, so the users need to change the phone. This was one of the reasons why our deployment took longer."
"We can only use the tool with the FortiToken Mobile app."
"I'm not sure if it's already available, however, I wonder if there's an option to have it sent to my email address instead of having it on the mobile app."
"Fortinet support has some room for improvement. It has taken a long time to resolve some issues or find a workaround."
"It could be integrated better if you could have your FortiToken, and the license would allow you to work across multiple FortiGate solutions."
"They could enhance synchronization with mobile applications, and addressing minor issues with authentication could further improve user experience."
"The solution could be more user-friendly."
"I would like to see the product improvements in dynamic VLAN pooling. Specifically, when users are assigned different VLANs based on their SSID, ensuring no unintended lateral traffic between users would enhance security and efficiency."
 

Pricing and Cost Advice

"The solution is cost-effective for the features."
"Compared to other solutions, it is costly."
"In comparison to other products on the market, CyberArk is a more costly product."
"This product is very expensive."
"This solution is expensive."
"There are no additional costs other than the standard licensing fees."
"I believe that this solution is priced well. It's the market leader and I think that it's the best solution."
"The license CyberArk Privileged Access Manager is on an annual basis."
"The platform's licensing cost is reasonable for our organization."
"I rate the tool's pricing a five out of ten."
"On a scale of one to ten, where one is the cheapest, and ten is the highest, I rate the pricing an eight."
"The pricing is not very high, so I'd rate it around six out of ten, where one is high and ten is low."
"The solution’s pricing is moderate and reasonable."
"The solution’s price is good."
"Overall, it's cheaper than other solutions. Of course, we evaluated it five years back, and I haven't checked to see its current market position, but one reason we adopted FortiToken is its lower cost of ownership relative to other solutions we evaluated."
"On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing a six out of ten."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
848,716 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
34%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
Computer Software Company
18%
Financial Services Firm
8%
Government
7%
University
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What do you like most about Fortinet FortiToken?
The solution is simple and similar to Google Authenticator. It follows time-based authentication. We use it for hardware and software in one environment. The tool offers simple and fast authenticat...
What is your primary use case for Fortinet FortiToken?
I am using FortiToken for logging into the Fortinet hardware. I have four FortiGate hardware units. I am connected through a simulator on FortiToken.
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: April 2025.
848,716 professionals have used our research since 2012.