No more typing reviews! Try our Samantha, our new voice AI agent.

Fortinet FortiAuthenticator vs Thales SafeNet Trusted Access comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 18, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Fortinet FortiAuthenticator
Ranking in Single Sign-On (SSO)
10th
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
64
Ranking in other categories
Authentication Systems (5th), Identity Management (IM) (14th), Multi-Factor Authentication (MFA) (2nd)
Thales SafeNet Trusted Access
Ranking in Single Sign-On (SSO)
19th
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
3
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (24th), Access Management (24th)
 

Mindshare comparison

As of May 2026, in the Single Sign-On (SSO) category, the mindshare of Fortinet FortiAuthenticator is 3.7%, down from 7.6% compared to the previous year. The mindshare of Thales SafeNet Trusted Access is 2.0%, up from 0.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Single Sign-On (SSO) Mindshare Distribution
ProductMindshare (%)
Fortinet FortiAuthenticator3.7%
Thales SafeNet Trusted Access2.0%
Other94.3%
Single Sign-On (SSO)
 

Featured Reviews

Sachin Vinay - PeerSpot reviewer
Assistant Manager-Networks at a university with 1,001-5,000 employees
Supports secure remote authentication and provides comprehensive user activity tracking
The most important feature is the security capability because it provides a substantial amount of security for admin-related activities. Fortinet FortiAuthenticator can be used from anywhere in the world, and the authenticator services function globally. This global accessibility is one of the critical advantages, particularly since admin features are critical and security is a real concern. With Fortinet FortiAuthenticator, secure usage of firewall services and related functions is achieved. A complete log of all users who access the authenticator setup is maintained. Monthly logs are reviewed to check for any unnoticed activities. Each authenticated user's complete activity history is recorded. This logging capability allows for providing access to more admin users while ensuring security is not compromised and all users can be monitored.
GauravMathur - PeerSpot reviewer
Vice President Information Technology at a tech services company with 1,001-5,000 employees
Simple to use, easy to set up, and performs well
I'm not saying that we want to switch the product, however, since the requirement has increased, we are looking at other options that may be better suited. The scalability may not there. We have a few specific use cases where we have to avoid the cloud. Especially in Europe, we're not allowed to carry their phone in factories. We need some sort of secure access solution. There's a dependency on Microsoft Azure. I am paying to SafeNet and in parallel, I also need to pay Microsoft to use the same service. That makes no sense, to pay double. If they could do something about it, that would be very good.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature I find in FortiAuthenticator is web filtering."
"The product enables SSO."
"The product's initial setup phase was easy. It is also easy to deploy."
"The feature I value the most is the one-time passwords because it helps to authenticate users so you know the timing of their usage."
"We are using Fortinet FortiAuthenticator to implement token-based authentication for wireless network access."
"It reduces the need for network administrator intervention by allowing the user to perform their own registration and resolve their own password problems and issues."
"The most valuable feature is the OTP on the mobile phone."
"If you want a more efficient way to manage two-factor authentication for your users, or implement the unit as a cluster member role, the FortiAuthenticator can be incorporated very well into your environment."
"Right now, we only have a small use case for the product, however, it has performed well."
"The validation and integrity features of the endpoint are great."
"The interface is easy to use."
"I recommend this solution because it protects information."
"The interface is easy to use."
"The solution is simple to use."
 

Cons

"I think FortiAuthenticator is more expensive than other products like Cisco Duo."
"Integration with some other enterprise applications could be improved."
"We had some stability issues. Our first LBS unit wouldn't work properly the first time and that wasted a lot of time."
"Initially, we deployed Fortinet FortiAuthenticator on VMware and faced challenges when migrating to an OpenStack environment, which required reconfiguration. I recommend Fortinet make its images migratable between environments."
"I would like to see more integration and inclusion of features for ransomware protection directly within the FortiAuthenticator without requiring additional devices."
"The hardware aspect of the solution could be improved. We are not really able to understand the hardware capabilities of the device."
"It does the job I paid for, but the graphical interface could be improved."
"A lot of configurations are available only from CLI."
"There's a dependency on Microsoft Azure."
"Lacks the ability to integrate network monitoring solutions and authenticate the app users."
"SafeNet's reporting and monitoring features could be improved."
"SafeNet's reporting and monitoring features could be improved."
"I'd like to see more networking features, such as the ability to integrate network monitoring solutions and authenticate the app users."
"The scalability may not be there."
 

Pricing and Cost Advice

"The cost of the license could be less expensive. The license is paid on a yearly basis."
"The product has affordable pricing compared to other vendors."
"The product could be more competitively priced."
"The pricing is fair."
"I rate its pricing a three to five out of ten."
"The platform provides a user-based pricing model rather than a subscription pricing model."
"The solution is not very expensive."
"It costs more to license the high-availability option."
Information not available
report
Use our free recommendation engine to learn which Single Sign-On (SSO) solutions are best for your needs.
894,830 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Comms Service Provider
10%
Manufacturing Company
10%
Computer Software Company
10%
Financial Services Firm
7%
Construction Company
12%
Performing Arts
10%
Government
7%
Legal Firm
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business38
Midsize Enterprise18
Large Enterprise11
No data available
 

Questions from the Community

What needs improvement with Fortinet FortiAuthenticator?
Fortinet can make Fortinet FortiAuthenticator better by having a cloud version of it. Currently, Fortinet FortiAuthenticator is only available for on-premises, and it is an on-premises solution. It...
What is your primary use case for Fortinet FortiAuthenticator?
Fortinet FortiAuthenticator is primarily used for authenticating admin users, including remote admin use cases. Remote admin use cases utilize Fortinet FortiAuthenticator to securely authenticate a...
Ask a question
Earn 20 points
 

Also Known As

FortiAuthenticator
SafeNet Trusted Access, Gemalto SafeNet Trusted Access
 

Overview

 

Sample Customers

Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
IBM, Western Union, Vanderbilt University Medical Centre, Novartis, and AT&T.
Find out what your peers are saying about Fortinet FortiAuthenticator vs. Thales SafeNet Trusted Access and other solutions. Updated: April 2026.
894,830 professionals have used our research since 2012.