Castle vs. FortiAuthenticator

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Castle
Score 10.0 out of 10
N/A
Castle is a solution for protecting customers in web and mobile apps. The vendor says their simple developer-friendly APIs lets users send activity from web and mobile apps. Castle builds behavior models over what's normal for the user’s site and each user account. When there is a potential account takeover, the customer is notified and can resolve the incident without involving the site administrator. Additionally, the vendor says the security analytics dashboard offers complete visibility into…
$33
per month (per 10,000 good events)
FortiAuthenticator
Score 9.9 out of 10
N/A
Fortinet offers FortiAuthenticator, an identity and authentication product available as an appliance or virtual machine to identify network users and enforce identity-driven policy across an enterprise network. FortiAuthenticator supports 2FA and single sign-on (SSO).N/A
Pricing
CastleFortiAuthenticator
Editions & Modules
Professional
$33
per month (per 10,000 good events)
Enterprise
$2,800
per month (per 1,000,000 good events)
No answers on this topic
Offerings
Pricing Offerings
CastleFortiAuthenticator
Free Trial
YesNo
Free/Freemium Version
YesNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
CastleFortiAuthenticator
Best Alternatives
CastleFortiAuthenticator
Small Businesses
WatchGuard AuthPoint
WatchGuard AuthPoint
Score 9.1 out of 10
WatchGuard AuthPoint
WatchGuard AuthPoint
Score 9.1 out of 10
Medium-sized Companies
WatchGuard AuthPoint
WatchGuard AuthPoint
Score 9.1 out of 10
WatchGuard AuthPoint
WatchGuard AuthPoint
Score 9.1 out of 10
Enterprises
Cisco Duo
Cisco Duo
Score 9.5 out of 10
Cisco Duo
Cisco Duo
Score 9.5 out of 10
All AlternativesView all alternativesView all alternatives
User Testimonials
CastleFortiAuthenticator
ScreenShots

Castle Screenshots

Screenshot of See which devices and locations that are part of a users normal behaviorScreenshot of Approve and Flag Threats from the dashboard, or let your users take action through the self-service login notification emailsScreenshot of Build custom Threat Segments to highlight users with specific properties such as Tor IPs or high authentication risk