Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Fortinet FortiToken comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
210
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
Fortinet FortiToken
Average Rating
8.4
Reviews Sentiment
7.3
Number of Reviews
29
Ranking in other categories
Authentication Systems (3rd)
 

Mindshare comparison

While both are Identity and Access Management solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 19.7%, down 23.7% compared to last year.
Fortinet FortiToken, on the other hand, focuses on Authentication Systems, holds 6.6% mindshare, down 7.4% since last year.
Privileged Access Management (PAM)
Authentication Systems
 

Featured Reviews

Lasantha Wijesinghe - PeerSpot reviewer
We have visibility and control through real-time user behavior analytics
It took us some time to realize its benefits because there was a learning curve for us. It took us about a year to get our heads around this product and start effectively using it. It is a journey. It takes at least five years for any company to make this product very useful and reach maturity. It is not only the product's fault. The company needs to have a vision, and the company culture needs to go with it. Senior leadership needs to support the vision. You need to have lots of ingredients for success. If everything is in place, you will see success after one year. In the first year, it is a struggle for everybody. My company was bought by a bigger company, and they were very new to privileged access management. Everybody was struggling. The advice I would give is to have a good vision for privileged access management. You need dedicated teams, senior management support, and proper company policies and standards before implementing the solution. Start building knowledge slowly and avoid jumping into the deep end without preparation. I would rate CyberArk Privileged Access Manager a nine out of ten.
Sachin Vinay - PeerSpot reviewer
Facilitates secure 2FA for admins, facilitates OTP generation, and enhances security
One suggestion is to develop a more user-friendly solution that is cost-effective so that a hardware-based solution can be provided to all users using VPN services or any configuration service requiring confidentiality. This would allow for broader distribution among a larger number of system admins and software engineers, which is currently not feasible with the existing hardware-only approach.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Password Vault's main advantage is its scalability. We constantly see huge enterprises implementing something like this, and the privileged session management is an excellent piece. You can kind of watch videos of whatever an admin has done."
"We have the identity provider for all the authentication processes. However, sometimes, we need access to different applications for customers or clients that are not integrated into the identity provider. For these, we need to store a password to gain access. For example, we use the CyberArk Password Vault for third-party services. This vault needs to be shared with many people in our company."
"On the customer accounts side, our account managers are responsive. If you ask them, they will get you whomever you need."
"We are utilizing CyberArk to secure applications, credentials, and endpoints."
"We have accomplished our security goals. We have two-factor authenticated and vaulted our important accounts, so people can't just steal stuff from us."
"Provides improved security around having your credentials locked down and rotated regularly."
"The fact that I can put my vault here in a central location on one net for example, and I'll have a CPM in California, a CPM in Texas, a CPM in New York, a CPM in Florida, and actually be able to grow with my company and not necessarily have to continue to grow my vault until I get to a certain number accounts - yet I can still manage everything across the country, if not the world - I love that. I love the flexibility and the capability of being able to pull those components out."
"The automatic change of the password and Privileged Session Manager (PSM) are the most valuable features. With Privileged Session Manager, you can control the password management in a centralized way. You can activate these features in a session; the session isolation and recording. You apply the full intermediation principle. So, you must pass through CyberArk PAM to get access to the target system. You don't need to know the password, and everything that you do is registered and auditable. In this case, no one gets to touch the password directly. Also, you can implement detection and response behavior in case of a breach."
"The initial setup is easy. You receive a QR code via email, scan it, and add it. No complicated procedures involved."
"Fortinet offers a comprehensive solution for network security, particularly with its very effective zero-trust network access approach."
"Their resolution time is timely, and they provide solutions efficiently."
"The solution is simple and similar to Google Authenticator. It follows time-based authentication. We use it for hardware and software in one environment. The tool offers simple and fast authentication for SSL."
"Stability-wise, I rate the solution a ten out of ten."
"The most valuable feature of the solution is its mobile application. It is particularly beneficial as it eliminates the need for hardware management."
"It provides me with the token so that I can do the Multi-Factor Authentication."
"The product provides secure access to our internal server."
 

Cons

"Our DevOps team is looking in the direction of cloud, because we are not in it today. We are hoping to build it with Conjur from the ground up."
"If you are an administrator or architect, then the solution is kind of complicated, as it is mostly focused on the end user. So, they need to also focus on the people who are implementing it."
"What could be improved in CyberArk Privileged Access Manager is the licensing model. It should be more flexible in terms of the users. Currently, it's based on the number of users, but many users only log in once in four months or once in five months. It would be great if the licensing model could be modified based on user needs. We even have users who have not logged in even once."
"We should be able to join small components."
"The interface could be improved it is not user-friendly, but they have improved but it could still improve. In the policies configuration, it would be a benefit to have more details."
"The tool’s pricing and scalability can be better."
"Transitioning from a traditional on-premises deployment to the privileged cloud has resulted in losing access to many logs and administrative tools typically available on the back end."
"Stability is a huge concern right now. We are on a version which is very unstable. We have to upgrade to stabilize it. It is fine, but the problem is we have to hire CyberArk to do the upgrade. This costs money, and it is their bug."
"One suggestion is to develop a more user-friendly solution that is cost-effective so that a hardware-based solution can be provided to all users using VPN services or any configuration service requiring confidentiality."
"Fortinet FortiToken should improve its push notifications."
"I would like to see the product improvements in dynamic VLAN pooling. Specifically, when users are assigned different VLANs based on their SSID, ensuring no unintended lateral traffic between users would enhance security and efficiency."
"The tool could be a little cheaper."
"I'm not sure if it's already available, however, I wonder if there's an option to have it sent to my email address instead of having it on the mobile app."
"Configuration can be confusing due to the lack of community and context-sensitive help. We've had to rely on technical support, which slows down the setup process."
"It could be integrated better if you could have your FortiToken, and the license would allow you to work across multiple FortiGate solutions."
"FortiToken should provide enhanced SMS services for those users who do not have smartphones."
 

Pricing and Cost Advice

"Payments have to be made on a yearly basis toward the licensing costs of the solution."
"Compared to other solutions, it is costly."
"The license CyberArk Privileged Access Manager is on an annual basis."
"The price of CyberArk Privileged Access Manager is expensive. There are no other fees other than the standard licensing fees."
"Cost efficiency is the number one thing that can be improved in my mind. This would change lots of companies minds on purchasing the product."
"There are no additional costs other than the standard licensing fees."
"I would rate the cost of CyberArk Privileged Access Manager seven out of ten with ten being the most expensive."
"The price of this solution is quite reasonable."
"Overall, it's cheaper than other solutions. Of course, we evaluated it five years back, and I haven't checked to see its current market position, but one reason we adopted FortiToken is its lower cost of ownership relative to other solutions we evaluated."
"The pricing is not very high, so I'd rate it around six out of ten, where one is high and ten is low."
"I rate the tool's pricing a five out of ten."
"Fortinet FortiToken is not an expensive solution."
"On a scale of one to ten, where one is the cheapest, and ten is the highest, I rate the pricing an eight."
"From an Indian perspective, it's definitely costlier."
"The solution’s price is good."
"It is included as part of our firewall license."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
838,713 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
34%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
Computer Software Company
18%
Financial Services Firm
7%
Government
7%
University
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
I focus more on the technical side, but I hear customers say that if CyberArk was more affordable, they might have acquired more licenses. Some clients consider alternative solutions due to pricing...
What do you like most about Fortinet FortiToken?
The solution is simple and similar to Google Authenticator. It follows time-based authentication. We use it for hardware and software in one environment. The tool offers simple and fast authenticat...
What is your primary use case for Fortinet FortiToken?
I am using FortiToken for logging into the Fortinet hardware. I have four FortiGate hardware units. I am connected through a simulator on FortiToken.
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: January 2025.
838,713 professionals have used our research since 2012.