Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs One Identity Safeguard comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
6.6
Organizations gain enhanced security, compliance, and cost savings with CyberArk, improving efficiency, user adoption, and risk reduction.
Sentiment score
6.8
One Identity Safeguard boosts security, reduces investigation time, cuts costs, and improves efficiency by automating access control.
The return on investment lies in improved security infrastructure, addressing over-privileged access, and reducing the risk of credential compromise, which is a major source of data breaches.
Cyber Security Engineer at Isolutions Associates Ltd (ISOLS)
The end users have the authority to reconcile the password or verify it before using session isolation, which is one of the unique features that can be enabled through Privileged Session Manager, preventing any attacks from happening within the organization when connected with sessions through CyberArk Privileged Access Manager.
Senior Engineer at a tech vendor with 1,001-5,000 employees
CyberArk Privileged Access Manager has helped customers save on costs primarily by reducing the number of engineering and information security personnel.
Head of Sales Services Department at a comms service provider with 51-200 employees
We have seen a 12% return on investment with One Identity Safeguard, and we have saved a significant amount of money.
Chief Technology Officer at DishIs Technologies
The time is reduced by nearly fifty percent for our audit preparation and compliance reporting compared to earlier.
Manager, Account Services Delivery at Softcell Technologies Limited
I have seen a return on investment through reduced audit effort and fewer security incidents related to privileged access, along with significant time savings for IT and security teams by automating access control and password management.
office administrator at Gitarattan International Business School
 

Customer Service

Sentiment score
6.5
CyberArk's support receives mixed reviews, praised for expertise but criticized for delays, especially at Tier One, yet committed to improvement.
Sentiment score
6.8
One Identity Safeguard's customer service is praised for efficiency and reliability, despite occasional inconsistencies in response times.
CyberArk has been exceptional in coming back to us with immediate responses.
IT Cyber Security Lead at a mining and metals company with 1,001-5,000 employees
It could be forever until you talk to someone who knows what they are doing.
Senior PAM Consultant at iC Consult GmbH
Based on the issue resolution and support quality, I rate the support 10 out of 10.
Operation Specialists at a tech vendor with 10,001+ employees
I sometimes need escalations to reach expertise.
Consultant at a tech vendor with 11-50 employees
Sometimes, I get a very helpful response and they address issues on a call.
Systems Administrator at a university with 10,001+ employees
When I have day-to-day incidents and problems, the response is good enough in terms of time and quality.
Team Lead / Consultant at a computer software company with 5,001-10,000 employees
 

Scalability Issues

Sentiment score
7.6
CyberArk Privileged Access Manager scales efficiently for diverse needs, with flexible deployment options and positive user feedback on growth adaptability.
Sentiment score
7.3
One Identity Safeguard scales well for most environments but requires infrastructure planning and improvements in high availability and cost management.
The CPM can reportedly handle up to 50,000 accounts independently without issue.
Privileged Access Management Engineer at a hospitality company with 10,001+ employees
I would rate it a ten out of ten for scalability.
IT Cyber Security Lead at a mining and metals company with 1,001-5,000 employees
They had 40,000 passwords in this one safe, and it was saving the last ten iterations of each password object. That means they had 400,000 password objects in this safe. They exceeded the limit.
Senior PAM Consultant at iC Consult GmbH
The scalability of One Identity Safeguard is perfect, scoring ten out of ten.
Business Line Manager - IGA & PAM at a tech services company with 201-500 employees
Safeguard handles a growing number of users, systems, and sessions without significant degradation in performance.
Product Analyst at a consultancy with 51-200 employees
We have a cluster of SPPs and a cluster of SPSs, and we can add a node to that cluster without much fuss.
Systems Administrator at a university with 10,001+ employees
 

Stability Issues

Sentiment score
7.7
CyberArk Privileged Access Manager is praised for its robust stability and high availability, with minor issues noted under heavy load.
Sentiment score
7.8
One Identity Safeguard is stable, performant, with reliable support, minor bugs, and effective high availability configurations enhance robustness.
Proper fine-tuning and expertise ensure the product performs well.
Cybersecurity Specialist at a comms service provider with 5,001-10,000 employees
Overall, the stability of the solution is high.
Senior Cybersecurity Manager at a financial services firm with 10,001+ employees
It has a large customer base and positive feedback within my network.
Senior Manager at a energy/utilities company with 1,001-5,000 employees
The session proxying, password vaulting, and automated workflow run consistently even under high load.
Product Analyst at a consultancy with 51-200 employees
I would rate it a nine out of ten for stability.
Team Lead / Consultant at a computer software company with 5,001-10,000 employees
In terms of stability, I rate One Identity Safeguard nine to ten out of ten.
Business Line Manager - IGA & PAM at a tech services company with 201-500 employees
 

Room For Improvement

CyberArk Privileged Access Manager needs UI, integration, documentation, performance, complexity improvements, better plugins, licensing, reporting, and support.
One Identity Safeguard needs integration improvements, better session management, intuitive interfaces, and enhanced support, with demands for lower pricing.
They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises.
Presales Engineer at a computer software company with 201-500 employees
We cannot generate a plug-in for web-based applications.
Contractor at a pharma/biotech company with 5,001-10,000 employees
If they want clients to move to the cloud, they need to support them in real-time.
Senior Manager at a consultancy with 11-50 employees
For some configurations on the SPS side, if I need to make changes, such as for DNS servers, I must redeploy the machine.
Consultant at a tech vendor with 11-50 employees
There are many steps. We are still in the onboarding phase, and it seems very manual.
Systems Administrator at a university with 10,001+ employees
Another area for improvement could be the threat detection capabilities, like those seen in other PAM vendors.
Team Lead / Consultant at a computer software company with 5,001-10,000 employees
 

Setup Cost

CyberArk Privileged Access Manager is costly but offers robust features and security, providing value despite higher pricing.
Enterprise users find One Identity Safeguard pricey but justified by its value, offering competitive, flexible pricing and robust capabilities.
CyberArk is expensive compared to other products I know.
Cybersecurity Specialist at a comms service provider with 5,001-10,000 employees
CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.
Presales Engineer at a computer software company with 201-500 employees
CyberArk's SaaS solution is particularly expensive.
Senior Manager at a energy/utilities company with 1,001-5,000 employees
It is one of those where the more you buy, the cheaper it is.
Systems Administrator at a university with 10,001+ employees
It is cheaper than CyberArk.
Team Lead / Consultant at a computer software company with 5,001-10,000 employees
It is more expensive than Secret Server but way less expensive than CyberArk.
IAM Specialist
 

Valuable Features

CyberArk Privileged Access Manager offers password management, session monitoring, and threat analytics to enhance security and compliance.
One Identity Safeguard enhances security with session recording, privileged access management, and seamless integration while simplifying compliance and reducing risks.
CyberArk Privileged Access Manager helps ensure data privacy because we now know who is using which credentials and at what time.
Senior Cybersecurity Manager at a financial services firm with 10,001+ employees
It keeps a record of activities, allowing me to easily fetch screen recordings to detect any misuse and see who did what and what happened.
Senior Manager at a consultancy with 11-50 employees
It can integrate with Splunk, SNMP, and other solutions and technologies.
Technical Support Analyst at Capgemini
The auditing and approval mechanisms are features we did not have before and are greatly appreciated.
Systems Administrator at a university with 10,001+ employees
Automatic credential rotation helps our team by removing the need for manual changes to privileged passwords, reducing the risk of stale or shared credentials and ensuring that every access is controlled and compliant.
Technical Consultant at ProTechmanize Solutions (P) Ltd.
Just-in-time access has sped up admin task completion and improved our overall compliance reporting, allowing audits to be completed nearly half the time compared to earlier.
Manager, Account Services Delivery at Softcell Technologies Limited
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
One Identity Safeguard
Ranking in Privileged Access Management (PAM)
2nd
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
53
Ranking in other categories
User Entity Behavior Analytics (UEBA) (6th), Non-Human Identity Management (NHIM) (3rd)
 

Mindshare comparison

As of January 2026, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Privileged Access Manager is 11.6%, down from 20.0% compared to the previous year. The mindshare of One Identity Safeguard is 3.7%, down from 4.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager11.6%
One Identity Safeguard3.7%
Other84.7%
Privileged Access Management (PAM)
 

Q&A Highlights

AG
Associate VP & Cyber Security Specialist at Union Bank of California
Jan 16, 2026
 

Featured Reviews

SI
Senior PAM Consultant at iC Consult GmbH
Makes privileged access management easy with automation and granular control
Many people underestimate the value of these tools because they treat them as simple automated password management. Once you realize the volume of passwords in your organization and factor in nonhuman passwords, you realize its value. Last year, CyberArk Impact cited 45 nonhuman passwords for every human password. If you have 10,000 employees, you can imagine the number of passwords. There are also many other operations. For example, you have a Qualys scanner that needs to reach out and touch all your endpoints and scan them for vulnerabilities. They use an API call to CyberArk to pull out a Privileged credential that allows them to log in to that target. This is an automated machine call. It is tapping into CyberArk to get that credential. There can be hundreds of thousands of those operations a day. You do not want to manage those passwords by hand. Some people marginalize the significance of such a solution by saying that it is just a fancy password changer. It goes well beyond that, especially with API calls and automation. Its importance extends beyond merely changing passwords; it involves automation, API calls, and process integration, crucial in agile environments for standing up new Amazon servers or other processes needing privileged credentials. CyberArk can automate these tasks into their build processes. Another critical feature is the proxy service via Privileged Session Manager (PSM), providing not only a proxy between your user and the target servers, protecting against malware but also offering session recording. Many companies I have worked with implemented a PAM product as a knee-jerk reaction to SOX audit requirements. They discovered they needed session recording and retention for regulatory compliance. This has become a major factor for clients instituting CyberArk, so PSM is a big deal in addition to regular password rotation.
Vyas Shubham - PeerSpot reviewer
Product Analyst at a consultancy with 51-200 employees
Centralized controls have improved privileged access and simplified compliant audit workflows
We use One Identity Safeguard as a central control point for all our privileged access, which helps standardize the access policies across teams and platforms. We also use it for the approval workflows, which are enforced for high-risk systems and add an extra security layer for production access. I have been using it for one and a half years. The best feature I appreciate is the session proxying and recording. It provides transparent session access for admins without exposing the real passwords. Another valuable feature is automated password rotation, which changes the credentials automatically after each use or on a schedule. It reduces the risk of leakage and reuse of passwords. Additionally, the approval workflow and the access request feature add governance with multi-level approvals for sensitive systems. These are the features that I appreciate the most. When we started using the session proxying and recording features, overall, it was a manageable and fairly smooth process for us. However, like most security platform deployments, it had a few learning curves. Session proxying and recording worked with our major systems including Windows, Linux, and network devices with minimal configuration. Some devices and services required slight changes to firewall rules and configuration to ensure the proxy could connect cleanly. Additionally, our admins needed orientation so they understood they were joining a recorded session, particularly for remote or support use. We spent considerable time adjusting the session filtering, retention settings, and naming conventions so recordings were useful and not overwhelming. These are some areas where we encountered challenges.
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
881,036 professionals have used our research since 2012.
 

Answers from the Community

AG
Associate VP & Cyber Security Specialist at Union Bank of California
Jan 16, 2026
Jan 16, 2026
I prefer CyberArk Privileged Access Manager because it offers the strongest security, session monitoring, and compliance capabilities among PAM tools. It’s ideal for enterprise environments where privileged access needs to be tightly controlled and audited, even though it requires more effort to implement.
2 out of 3 answers
Nurlan Temirbulatov - PeerSpot reviewer
Sales Engineer at Remediant
Dec 7, 2022
Hello Avinash, it all depends on the timeline and urgency of the project. If you need to deploy a PAM tool that focuses on standing privileges, stopping lateral movement, and incorporating Zero Standing Privileges as part of Zero Trust, then please consider looking at Remediant. I've worked for BeyondTrust and have gone up against the other big players such as Delinea, Centrify, CyberArk, and HashiCorp. They more or less all offer similar solutions, but looking at your current requirements, Remediant really excels in delivering a simple, yet very effective tool in a matter of days and weeks, not months and years. 
DN
IT Manager at CAS Trading House
Aug 14, 2023
Based on your extensive list of requirements, CyberArk Privileged Access Manager appears to align well with your needs due to its comprehensive feature set, strong security controls, integration capabilities, and advanced analytics for privileged access. However, it's important to conduct in-depth evaluations, demos, and discussions with each vendor to ensure that the chosen tool meets all your specific needs and integrates seamlessly into your existing infrastructure. However, I recommend visiting the official website of Broadcom (the company that acquired Symantec's enterprise security business) or contacting their sales representatives to get the most up-to-date information about their PAM solutions, including any rebranding or changes that may have occurred. When evaluating any PAM solution, it's essential to consider factors such as security, integration capabilities, ease of use, vendor support, scalability, and alignment with your organization's specific needs and compliance requirements. It's also a good practice to request demonstrations, proofs of concept, and references from vendors to ensure that the solution meets your expectations. Remember to involve key stakeholders, such as IT, security, compliance, and management teams, in the decision-making process to ensure alignment with organizational goals and requirements.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Manufacturing Company
10%
Computer Software Company
9%
Government
6%
Computer Software Company
11%
University
9%
Manufacturing Company
7%
Comms Service Provider
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise40
Large Enterprise173
By reviewers
Company SizeCount
Small Business27
Midsize Enterprise17
Large Enterprise19
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
What is your experience regarding pricing and costs for One Identity Safeguard?
My experience with pricing, setup cost, and licensing has been a good experience overall, as the back and forth with One Identity is something that is acceptable; other tools have options to do thi...
What needs improvement with One Identity Safeguard?
One Identity Safeguard could be improved with a password manager and an identity manager as one big access management system. I believe improvements could be made around integrating with other tools.
What is your primary use case for One Identity Safeguard?
My main use case for One Identity Safeguard is using only one module for privileged session, which we use for admins and contractors. A quick specific example of how my team uses One Identity Safeg...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Cavium
Find out what your peers are saying about CyberArk Privileged Access Manager vs. One Identity Safeguard and other solutions. Updated: December 2025.
881,036 professionals have used our research since 2012.