Try our new research platform with insights from 80,000+ expert users
2021-03-09T21:48:01Z

What do you like most about Fortinet FortiToken?

Miriam Tover - PeerSpot reviewer
  • 0
  • 4
PeerSpot user
14

14 Answers

MT
Real User
Top 20
2024-04-15T15:18:48Z
Apr 15, 2024
Search for a product comparison
MOHAN SUKUMAR - PeerSpot reviewer
Real User
Top 5
2024-02-05T09:57:42Z
Feb 5, 2024
Suraj  Reddy - PeerSpot reviewer
Reseller
Top 10
2023-12-28T16:43:26Z
Dec 28, 2023
JunedhRehman - PeerSpot reviewer
Real User
Top 5Leaderboard
2023-12-26T16:35:13Z
Dec 26, 2023
Noor-E-MozammilAlighan - PeerSpot reviewer
Real User
Top 5
2023-10-24T10:35:11Z
Oct 24, 2023
CO
Real User
Top 5Leaderboard
2023-09-27T08:38:24Z
Sep 27, 2023
Learn what your peers think about Fortinet FortiToken. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
814,649 professionals have used our research since 2012.
MM
Real User
Top 5Leaderboard
2023-08-10T10:05:36Z
Aug 10, 2023
Paul Duxfield - PeerSpot reviewer
Real User
Top 5
2023-06-14T07:55:01Z
Jun 14, 2023
C N R Prabashan - PeerSpot reviewer
Real User
Top 5
2023-02-24T08:41:00Z
Feb 24, 2023
SC
Real User
Top 20
2023-01-18T14:10:53Z
Jan 18, 2023
Ehab.Fawzy Mohamed - PeerSpot reviewer
Real User
2022-09-27T10:56:30Z
Sep 27, 2022
US
Real User
2022-02-23T11:52:55Z
Feb 23, 2022
KL
Real User
2021-03-30T10:03:42Z
Mar 30, 2021
PG
Real User
2021-03-09T21:48:01Z
Mar 9, 2021
As we've seen, passwords alone don't keep unwanted guests out of your network. Password-only authentication has led to security breaches, malware infections, and policy violations. With two-factor authentication, a password is used along with a security token and authentication server to provide far better security.  Authorized employees can remotely access company resources safely using a variety of devices, ranging from lpatops to mobile phones.
Download Fortinet FortiToken ReportRead more