Ping Identity Platform and Fortinet FortiAuthenticator compete in the identity management space. Fortinet FortiAuthenticator leads with its extensive feature set and integration capabilities, whereas Ping Identity Platform is valued for its pricing and customer support.
Features:Ping Identity Platform offers flexible identity management, strong single sign-on, and adaptive authentication, making it suitable for varied applications. Fortinet FortiAuthenticator excels in multi-factor authentication, seamless integration with Fortinet security products, and substantial directory service capability, favoring security-focused environments.
Room for Improvement:Ping Identity Platform could shorten its initial setup process and enhance integration with non-standard systems. Further improvement in documentation could assist in smoother self-service redemption for users. Fortinet FortiAuthenticator might expand its social login options and bolster integration flexibility beyond Fortinet products. Enhancing user interface intuitiveness can benefit those less familiar with Fortinet's ecosystem.
Ease of Deployment and Customer Service:Fortinet FortiAuthenticator ensures seamless integration within the Fortinet ecosystem, offering straightforward deployment for existing Fortinet customers. Ping Identity Platform requires more setup steps but is significantly supported by excellent customer service that aids in deployment challenges, balancing its complexity with high-quality support.
Pricing and ROI:Ping Identity Platform is seen as cost-effective with flexible pricing, providing a favorable return on investment. Despite a higher initial cost, Fortinet FortiAuthenticator justifies its price by delivering substantial value to users who require advanced security features, offering strong ROI for security-focused investments.
At times, some technical staff lack knowledge, which delays issue resolution.
When we send a ticket to Fortinet, they go into research mode as if they are hearing the problem for the first time.
For example, authentication for wireless users expires after 24 hours, requiring re-authentication daily.
The technical support could be improved as some staff lacks the necessary knowledge to assist effectively.
I would like to see more integration and inclusion of features for ransomware protection directly within the FortiAuthenticator without requiring additional devices.
The scalability of FortiAuthenticator is good, and I would rate it an eight on a scale of one to ten.
We use multi-factor authentication for enhancing security.
The most valuable feature I find in FortiAuthenticator is web filtering.
Fortinet FortiAuthenticator is the primary secure point of approved access into the Fortinet network, authorizing users, reviewing access permissions, and relaying the information to all Fortigate devices for comparison with identity-based protocols. Fortinet FortiAuthenticator is a top-ranked authorization and SSO solution.
Appropriate secure access is fundamental to every role in an enterprise ecosystem. It is an integral function of every organization to ensure that every access and privilege is secure and to mitigate any possible risk to an organization. Approved users should only have access to the necessary information when they need it, from the appropriate location(s) to safeguard an organization's security at all times.
Fortinet FortiAuthenticator is available as an appliance, virtual machine, or in the cloud.
Fortinet FortiAuthenticator Methods
Reviews from Real Users
Ernesto C., Presales Engineer at a comms service provider, shares,
”Key Features and Benefits
Ibrahim M., Senior Network & Security Engineer at a tech services company, relates, "The initial setup is a valuable point on Fortinet products. Most of the time, putting the theory into practice on the devices is quite friendly and straightforward. As long as you can read English you can find your way around the solution and make it work. This is a high value point on Fortinet - the way everything is laid out in the web UI is user-friendly and quite straightforward. The UI is quite simple."
We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.