Try our new research platform with insights from 80,000+ expert users
2021-03-09T21:48:01Z

What is your primary use case for Fortinet FortiToken?

Miriam Tover - PeerSpot reviewer
  • 0
  • 61
PeerSpot user
15

15 Answers

Yohann David - PeerSpot reviewer
Real User
Top 20
2024-08-16T12:22:00Z
Aug 16, 2024
Search for a product comparison
AT
Real User
Top 20
2024-06-27T13:56:32Z
Jun 27, 2024
ÖzdenAydın - PeerSpot reviewer
Reseller
Top 5
2024-06-07T14:06:00Z
Jun 7, 2024
Ivgeny Shklarman - PeerSpot reviewer
Real User
Top 20
2024-04-25T07:08:50Z
Apr 25, 2024
MT
Real User
Top 20
2024-04-15T15:18:48Z
Apr 15, 2024
MOHAN SUKUMAR - PeerSpot reviewer
Real User
Top 5
2024-02-05T09:57:42Z
Feb 5, 2024
Learn what your peers think about Fortinet FortiToken. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
814,649 professionals have used our research since 2012.
JunedhRehman - PeerSpot reviewer
Real User
Top 5Leaderboard
2023-12-26T16:35:13Z
Dec 26, 2023
CO
Real User
Top 5Leaderboard
2023-09-27T08:38:24Z
Sep 27, 2023
MM
Real User
Top 5Leaderboard
2023-08-10T10:05:36Z
Aug 10, 2023
Paul Duxfield - PeerSpot reviewer
Real User
Top 5
2023-06-14T07:55:01Z
Jun 14, 2023
C N R Prabashan - PeerSpot reviewer
Real User
Top 5
2023-02-24T08:41:00Z
Feb 24, 2023
SC
Real User
Top 20
2023-01-18T14:10:53Z
Jan 18, 2023
Ehab.Fawzy Mohamed - PeerSpot reviewer
Real User
2022-09-27T10:56:30Z
Sep 27, 2022
US
Real User
2022-02-23T11:52:55Z
Feb 23, 2022
PG
Real User
2021-03-09T21:48:01Z
Mar 9, 2021
As we've seen, passwords alone don't keep unwanted guests out of your network. Password-only authentication has led to security breaches, malware infections, and policy violations. With two-factor authentication, a password is used along with a security token and authentication server to provide far better security.  Authorized employees can remotely access company resources safely using a variety of devices, ranging from lpatops to mobile phones.
Download Fortinet FortiToken ReportRead more