No more typing reviews! Try our Samantha, our new voice AI agent.

Fortinet FortiAuthenticator vs Thales SafeNet Trusted Access comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 18, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Fortinet FortiAuthenticator
Ranking in Single Sign-On (SSO)
10th
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
64
Ranking in other categories
Authentication Systems (5th), Identity Management (IM) (14th), Multi-Factor Authentication (MFA) (2nd)
Thales SafeNet Trusted Access
Ranking in Single Sign-On (SSO)
19th
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
3
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (24th), Access Management (24th)
 

Mindshare comparison

As of May 2026, in the Single Sign-On (SSO) category, the mindshare of Fortinet FortiAuthenticator is 3.7%, down from 7.6% compared to the previous year. The mindshare of Thales SafeNet Trusted Access is 2.0%, up from 0.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Single Sign-On (SSO) Mindshare Distribution
ProductMindshare (%)
Fortinet FortiAuthenticator3.7%
Thales SafeNet Trusted Access2.0%
Other94.3%
Single Sign-On (SSO)
 

Featured Reviews

Sachin Vinay - PeerSpot reviewer
Assistant Manager-Networks at a university with 1,001-5,000 employees
Supports secure remote authentication and provides comprehensive user activity tracking
The most important feature is the security capability because it provides a substantial amount of security for admin-related activities. Fortinet FortiAuthenticator can be used from anywhere in the world, and the authenticator services function globally. This global accessibility is one of the critical advantages, particularly since admin features are critical and security is a real concern. With Fortinet FortiAuthenticator, secure usage of firewall services and related functions is achieved. A complete log of all users who access the authenticator setup is maintained. Monthly logs are reviewed to check for any unnoticed activities. Each authenticated user's complete activity history is recorded. This logging capability allows for providing access to more admin users while ensuring security is not compromised and all users can be monitored.
GauravMathur - PeerSpot reviewer
Vice President Information Technology at a tech services company with 1,001-5,000 employees
Simple to use, easy to set up, and performs well
I'm not saying that we want to switch the product, however, since the requirement has increased, we are looking at other options that may be better suited. The scalability may not there. We have a few specific use cases where we have to avoid the cloud. Especially in Europe, we're not allowed to carry their phone in factories. We need some sort of secure access solution. There's a dependency on Microsoft Azure. I am paying to SafeNet and in parallel, I also need to pay Microsoft to use the same service. That makes no sense, to pay double. If they could do something about it, that would be very good.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"This is a perfect solution for authentication services."
"The current version is stable...Scalability-wise, it is a fine solution"
"I work a lot with Fortinet products and I call the support often. They are very quick to respond and the support is very good."
"The product is very easy to use and someone can easily manage working with it, so we do not need any support."
"The web feature is quite versatile. It serves as the sole server authenticator and is valuable not only with FortiGate products but also within the entire Forti system, making it highly useful for me."
"This was a regulation we needed to fill and it worked at a good price."
"The solution is easy to learn and makes it easy for our users to add FortiToken, and it's very easy to integrate if you have other Fortinet devices."
"We use this product for SSL two-factor authentication and FortiToken management."
"The solution is simple to use."
"The validation and integrity features of the endpoint are great."
"I recommend this solution because it protects information."
"The interface is easy to use."
"Right now, we only have a small use case for the product, however, it has performed well."
"The interface is easy to use."
 

Cons

"The GUI is not fancy enough and some of the settings are difficult to access."
"A better integration with other vendors."
"The hardware aspect of the solution could be improved. We are not really able to understand the hardware capabilities of the device."
"Integration with FortiGate could be more fluid."
"I have had stability issues with FortiAuthenticator."
"We had issues trying to integrate the keys properly during the initial setup."
"Fortinet FortiAuthenticator could benefit from some artificial intelligence functionality and resolution of some glitches that may exist."
"Regarding Fortinet technical support, I would say a six. Most of the time, the engineer will take time, such as 24 hours or 48 hours, maybe even more, because most of the time, they appear, gather the logs, and then disappear."
"I'd like to see more networking features, such as the ability to integrate network monitoring solutions and authenticate the app users."
"SafeNet's reporting and monitoring features could be improved."
"SafeNet's reporting and monitoring features could be improved."
"Lacks the ability to integrate network monitoring solutions and authenticate the app users."
"The scalability may not be there."
"There's a dependency on Microsoft Azure."
 

Pricing and Cost Advice

"The price seems okay. It's not that expensive compared to other authenticators."
"I price of the solution is expensive."
"The product could be more competitively priced."
"It is usually cheap. Without a license, you can use some basic features. You can buy a 20-year license and implement the solution once."
"Between paying them to help with the configuration, the box itself, and the support, it came to like $12,500, including a three-year service agreement."
"The pricing is fair."
"When we buy the Fortinet FortiAuthenticator device there is a comparison between price and security."
"It costs more to license the high-availability option."
Information not available
report
Use our free recommendation engine to learn which Single Sign-On (SSO) solutions are best for your needs.
893,164 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
11%
Comms Service Provider
10%
Computer Software Company
10%
Financial Services Firm
7%
Construction Company
11%
Performing Arts
9%
Government
7%
Legal Firm
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business38
Midsize Enterprise18
Large Enterprise11
No data available
 

Questions from the Community

What needs improvement with Fortinet FortiAuthenticator?
Fortinet can make Fortinet FortiAuthenticator better by having a cloud version of it. Currently, Fortinet FortiAuthenticator is only available for on-premises, and it is an on-premises solution. It...
What is your primary use case for Fortinet FortiAuthenticator?
Fortinet FortiAuthenticator is primarily used for authenticating admin users, including remote admin use cases. Remote admin use cases utilize Fortinet FortiAuthenticator to securely authenticate a...
Ask a question
Earn 20 points
 

Also Known As

FortiAuthenticator
SafeNet Trusted Access, Gemalto SafeNet Trusted Access
 

Overview

 

Sample Customers

Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
IBM, Western Union, Vanderbilt University Medical Centre, Novartis, and AT&T.
Find out what your peers are saying about Fortinet FortiAuthenticator vs. Thales SafeNet Trusted Access and other solutions. Updated: April 2026.
893,164 professionals have used our research since 2012.