Symantec Advanced Authentication and Fortinet FortiAuthenticator provide robust authentication solutions, each with strengths in different areas. Symantec Advanced Authentication is preferred for its comprehensive feature set and strong user support, while Fortinet FortiAuthenticator is favored for its performance and integration capabilities.
What features are offered by Symantec Advanced Authentication in comparison to Fortinet FortiAuthenticator?Symantec Advanced Authentication offers versatile authentication methods, customizable policies, and high security. Fortinet FortiAuthenticator provides seamless integration with other Fortinet products, strong emphasis on user credential security, and efficient performance.
What areas of improvement can be found in Symantec Advanced Authentication in comparison to Fortinet FortiAuthenticator?Symantec Advanced Authentication users suggest enhancing mobile app functionalities, simplifying the configuration process, and improving mobility features. Fortinet FortiAuthenticator users desire better documentation, a more user-friendly initial setup, and clearer guidance in the initial stages.
How is the ease of deployment and customer service of Symantec Advanced Authentication in comparison to Fortinet FortiAuthenticator?Symantec Advanced Authentication is noted for a straightforward deployment process and responsive customer support. Fortinet FortiAuthenticator, while efficient in deployment, has users pointing out occasional complexity and the need for more accessible customer assistance.
What setup costs and ROI can be seen with Symantec Advanced Authentication in comparison to Fortinet FortiAuthenticator?Symantec Advanced Authentication is often seen as cost-effective with a significant return on investment due to its comprehensive security features. Fortinet FortiAuthenticator provides good ROI but users mention higher initial setup costs.
At times, some technical staff lack knowledge, which delays issue resolution.
The technical support could be improved as some staff lacks the necessary knowledge to assist effectively.
We use multi-factor authentication for enhancing security.
Fortinet FortiAuthenticator is the primary secure point of approved access into the Fortinet network, authorizing users, reviewing access permissions, and relaying the information to all Fortigate devices for comparison with identity-based protocols. Fortinet FortiAuthenticator is a top-ranked authorization and SSO solution.
Appropriate secure access is fundamental to every role in an enterprise ecosystem. It is an integral function of every organization to ensure that every access and privilege is secure and to mitigate any possible risk to an organization. Approved users should only have access to the necessary information when they need it, from the appropriate location(s) to safeguard an organization's security at all times.
Fortinet FortiAuthenticator is available as an appliance, virtual machine, or in the cloud.
Fortinet FortiAuthenticator Methods
Reviews from Real Users
Ernesto C., Presales Engineer at a comms service provider, shares,
”Key Features and Benefits
Ibrahim M., Senior Network & Security Engineer at a tech services company, relates, "The initial setup is a valuable point on Fortinet products. Most of the time, putting the theory into practice on the devices is quite friendly and straightforward. As long as you can read English you can find your way around the solution and make it work. This is a high value point on Fortinet - the way everything is laid out in the web UI is user-friendly and quite straightforward. The UI is quite simple."
CA Advanced Authentication provides a secure, user-convenient and cost-effective way to protect online and mobile applications. The solution consists of two components: CA Risk Authentication allows the enterprise to silently and transparently collect data and assess risk based on device identification, location and user behavior, among other factors, and CA Strong Authentication provides a wide variety of software-based, two-factor authentication credentials and technology to make passwords more secure. Together they enable an intelligent, layered security approach to protect user identities and organizational data.
We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.