Try our new research platform with insights from 80,000+ expert users

CyberArk Endpoint Privilege Manager vs One Identity Safeguard comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Endpoint Privilege...
Ranking in Privileged Access Management (PAM)
4th
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
35
Ranking in other categories
Endpoint Compliance (4th), Anti-Malware Tools (5th), Application Control (5th), Ransomware Protection (7th)
One Identity Safeguard
Ranking in Privileged Access Management (PAM)
3rd
Average Rating
8.0
Reviews Sentiment
6.9
Number of Reviews
41
Ranking in other categories
User Entity Behavior Analytics (UEBA) (6th)
 

Mindshare comparison

As of March 2025, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Endpoint Privilege Manager is 3.5%, down from 3.7% compared to the previous year. The mindshare of One Identity Safeguard is 4.2%, down from 4.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

Sumit Chavan - PeerSpot reviewer
Helps secure the infrastructure and control users with admin rights
There are many features that are currently missing. A customization option is required for certain policies. For instance, if we need to stop PowerShell scripting, we have to create a different policy for that. Being able to create a sub-level policy within a top-level policy would be good. Currently, no user-based policy option is available inside the EPM console. We can only create computer-based policies. The database is available, but there is a drawback in not being able to create local groups on the EPM console. We only have to depend on Active Directory. This limits infrastructure security as we depend on the Active Directory team to manage user groups. If they remove any users, we lose control. If we could create groups locally and block them or set specific policies, we would have more control. Local endpoint management is missing from the EPM site. Moreover, there is an issue with policies not running as expected when we make enhancements. We have to find multiple ways to whitelist applications or enhance policies.
Tor Nordhagen - PeerSpot reviewer
Transparent mode for privileged sessions will greatly simplify our client's administrative situation
We're introducing the solution's transparent mode for privileged sessions. This is part of what the client hasn't used before. It will simplify their administrative situation greatly. So far, the rollout of this feature has been a seamless process, but we're still in the midst of rolling it out. The benefits will be on the risk side. Right now, the way accounts are managed, you don't necessarily know who is using an account. There's a shared admin account, and that's not a good thing. And those accounts are shared in wallets by several people. One of the real benefits of safeguarding here is that the client will have an absolute audit of who is using an administrative interface, whether it's server or network.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The product is stable."
"In terms of ROI, deploying CyberArk Endpoint Privilege Manager has secured the infrastructure, which saves money, time, and resources."
"The tool is an endpoint management system. It monitors everything a standard user does and helps elevate privileges when necessary for advanced users. It keeps an auditable trail of all activities. Practically, it stops and blocks potentially hazardous user behavior, whether intentional or unintentional. Certain companies must use endpoint management software because of national or international rules or ISO norms."
"The department management aspect of the solution is the most valuable aspect."
"The password rotation and the session recording are the most valuable features."
"The most valuable feature is the ability to control users with admin rights. Even if developers and senior folks maintain their admin rights, we can still manage their activities."
"CyberArk Endpoint Privilege Manager (EPM) 's most valuable feature is its ability to manage user application privileges and protect against ransomware attacks by controlling access to specific files and applications."
"The most valuable feature of CyberArk Endpoint Privilege Manager is its ability to reset passwords every time that it is needed or periodically."
"One of the real benefits of safeguarding here is that the client will have an absolute audit of who is using an administrative interface, whether it's server or network."
"I like the discovery functionality and the change password feature through the check-in. I also like the bulk import with the help of templates that come with it out of the box. With the help of these few features, my tasks are made easier."
"The monitoring system is very good."
"I like Safeguard's snapshot feature that enables us to review the last time an application was opened and by whom. If there are any issues, we can look behind the scenes to see what has been done. We can suspend a user's access or close off a server."
"The solution's most valuable features are the efficiency and the quality of the recording."
"The transparent mode for privileged sessions is one of the best things for customers, because they don't see the system in-between."
"There are a lot of features, so it's going to sound funny, but one of the most simplistic features, the Favorites feature, is the one we like the best. You do a full run-through of configuration to check out a server and then you can save that whole configuration as a favorite. So the next time you go in, you click on the favorite that you configured and it automatically takes you to the end so you can check the server out that much faster. It saves a lot of time..."
"From my experience, the features are best for monitoring and the usage of LDAP and SSH."
 

Cons

"The solution is very expensive."
"The solution can be complex to use at times."
"They need much better integration with Azure AD."
"CyberArk should consider whitelisting important applications like PowerShell and DLL that are currently not allowed due to some malicious content."
"It cannot be on-prem. It is only cloud-based. Sometimes, that's a restriction in terms of usage."
"CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications."
"Compared to other tools like Linux, this solution isn't as user-friendly."
"The turnaround time of the support team is an area of concern where improvements are required."
"Our experience with technical support has been disappointing. We require more prompt and faster response times. We require answers to our questions right away but we haven't received that level of support."
"The interface is better now, but it still could be improved a lot. It needs more organization, menus, automatic refresh of information, and Web 2.0."
"One Identity's support is not appropriately structured, and it has a lot of room to improve."
"We currently have a problem with the Active Directory integrations on Windows. Some of our users need to be logged with Active Directory, but we are having communication issues between One Identity and Active Directory. It seems that Active Directory is not well-integrated."
"On a scale of one to ten, the stability is an eight."
"Even though we have two nodes, there's no way to do an upgrade without taking everything completely offline. It would be nice if they could improve that."
"We can't review or audit HTTP and HTTPS. This functionality should be added so that we can review and audit HTTP and HTTPS."
"We have feature requests and would like to see the turnaround times on those features to be faster."
 

Pricing and Cost Advice

"The tool is priced high. I would rate its pricing an eight out of ten."
"CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive."
"The tool's pricing is reasonable for customers."
"I rate the solution's pricing an eight out of ten since the price can be too high for smaller businesses."
"licensing for this solution is based on the number of APV (privileged users), and the number of sessions that you want to record."
"We pay about $17 per user."
"The professional services for one eight-hour day would be $1,800."
"I feel that the price of the product is nominal. It must be around 10 to 15 USD per installation. I rate the product price an eight to nine out of ten, where one is high price, and ten is low price."
"The full license is expensive but if you plan to use it in a big organization then it is the best option because it is more flexible."
"As compared to other products, it is reasonable, but the training sessions are too expensive."
"The license is around $3,000 per month."
"They have comparable pricing. All identity products are essentially priced in a similar way. It's a per-user base."
"Our licensing costs are on a yearly basis."
"It was definitely cheaper than the other two products that we evaluated."
"Setup cost, pricing and licensing are all very expensive."
"The pricing depends on our perspective, our budget, and, of course, the competitors we are taking into account."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
841,004 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
16%
Computer Software Company
14%
Manufacturing Company
11%
Government
8%
Computer Software Company
23%
Financial Services Firm
12%
Government
6%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What is your experience regarding pricing and costs for CyberArk Endpoint Privilege Manager?
CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive.
What do you like most about One Identity Safeguard?
The identity discovery is good, and the performance is pretty good value.
What is your experience regarding pricing and costs for One Identity Safeguard?
One Identity Safeguard is expensive. The license is around $3,000 per month.
What needs improvement with One Identity Safeguard?
One Identity's support is not appropriately structured, and it has a lot of room to improve.
 

Also Known As

Viewfinity
No data available
 

Overview

 

Sample Customers

Information Not Available
Cavium
Find out what your peers are saying about CyberArk Endpoint Privilege Manager vs. One Identity Safeguard and other solutions. Updated: January 2025.
841,004 professionals have used our research since 2012.