FortiAuthenticator vs. Microsoft Enterprise Mobility + Security

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
FortiAuthenticator
Score 7.9 out of 10
N/A
Fortinet offers FortiAuthenticator, an identity and authentication product available as an appliance or virtual machine to identify network users and enforce identity-driven policy across an enterprise network. FortiAuthenticator supports 2FA and single sign-on (SSO).N/A
Microsoft Enterprise Mobility + Security
Score 9.4 out of 10
N/A
Microsoft Enterprise Mobility + Security is a suite of applications supporting mobile device and application security, MDM, as well as conditional or privileged access with multi-factor authentication, and advanced security reporting. Products in the suite includes Microsoft Intune mobile device management, Azure Information Protection, Microsoft Identity Manager, Microsoft Cloud App Security, Azure Active Directory, and other ancillary applications.N/A
Pricing
FortiAuthenticatorMicrosoft Enterprise Mobility + Security
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
FortiAuthenticatorMicrosoft Enterprise Mobility + Security
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details——
More Pricing Information
Community Pulse
FortiAuthenticatorMicrosoft Enterprise Mobility + Security
Top Pros
Top Cons
Best Alternatives
FortiAuthenticatorMicrosoft Enterprise Mobility + Security
Small Businesses
WatchGuard AuthPoint
WatchGuard AuthPoint
Score 9.0 out of 10
NinjaOne
NinjaOne
Score 9.2 out of 10
Medium-sized Companies
WatchGuard AuthPoint
WatchGuard AuthPoint
Score 9.0 out of 10
KACE Systems Management Appliance
KACE Systems Management Appliance
Score 10.0 out of 10
Enterprises
Cisco Duo
Cisco Duo
Score 9.4 out of 10
KACE Systems Management Appliance
KACE Systems Management Appliance
Score 10.0 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
FortiAuthenticatorMicrosoft Enterprise Mobility + Security
Likelihood to Recommend
-
(0 ratings)
9.5
(3 ratings)
User Testimonials
FortiAuthenticatorMicrosoft Enterprise Mobility + Security
Likelihood to Recommend
Fortinet
No answers on this topic
Microsoft
Microsoft Enterprise Mobility + Security has been ideal for our organization (and would be for any I can think of) for securing user accounts through MFA and admin accounts through PIM. Its end-point management is also great for set-up and configuration as well as management of your devices. It also provides you with useful metrics and feedback on your devices.
Read full review
Pros
Fortinet
No answers on this topic
Microsoft
  • Simple pre-packed solution for many popular Microsoft products
  • Advanced threat protection
  • Simplified end user management with Intune
Read full review
Cons
Fortinet
No answers on this topic
Microsoft
  • InTune deployment via Hybrid Azure AD. The instructions seem very simple but there are lots of little areas you can get tripped up and there is little logging to see where you've gone wrong.
  • Advanced Threat Protection anti-impersonation. It is WAY too sensitive. Users emailing themselves from personal accounts get their mail sent to quarantine just because the name/label of the personal account matches their Office 365 mailbox name/label? HUH???
  • Licensing. Typical of Microsoft, what you're actually getting and details of licensing are confusing.
Read full review
Alternatives Considered
Fortinet
No answers on this topic
Microsoft
Microsoft Enterprise Mobility + Security is better than any of the products I have used that do similar things. There is a huge convenience to all the things Microsoft Enterprise Mobility + Security brings together in one place. Also, the speed and streamlining nature of Intune helps with the management and set up of devices.
Read full review
Return on Investment
Fortinet
No answers on this topic
Microsoft
  • Increased productivity, including service requests for our customers
  • Reduced operational costs, and threat/risk of cyber-attacks
Read full review
ScreenShots