Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs One Identity Safeguard comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
6.6
Organizations gain enhanced security, compliance, and cost savings with CyberArk, improving efficiency, user adoption, and risk reduction.
Sentiment score
6.9
Organizations achieved ROI with One Identity Safeguard through enhanced security, cost savings, efficiency, and better protection against threats.
The return on investment lies in improved security infrastructure, addressing over-privileged access, and reducing the risk of credential compromise, which is a major source of data breaches.
Cyber Security Engineer at Isolutions Associates Ltd (ISOLS)
The end users have the authority to reconcile the password or verify it before using session isolation, which is one of the unique features that can be enabled through Privileged Session Manager, preventing any attacks from happening within the organization when connected with sessions through CyberArk Privileged Access Manager.
Senior Engineer at a tech vendor with 1,001-5,000 employees
CyberArk Privileged Access Manager has helped customers save on costs primarily by reducing the number of engineering and information security personnel.
Head of Sales Services Department at a comms service provider with 51-200 employees
The time is reduced by nearly fifty percent for our audit preparation and compliance reporting compared to earlier.
Manager, Account Services Delivery at Softcell Technologies Limited
I have seen a return on investment through reduced audit effort and fewer security incidents related to privileged access, along with significant time savings for IT and security teams by automating access control and password management.
office administrator at Gitarattan International Business School
The efficiency of our team has increased as we have reduced manual credential management, allowing our IT team to focus on higher value tasks.
Technical Head Cloud Services at Softcell Technologies Limited
 

Customer Service

Sentiment score
6.5
CyberArk's support receives mixed reviews, praised for expertise but criticized for delays, especially at Tier One, yet committed to improvement.
Sentiment score
6.9
One Identity Safeguard's customer service is praised for technical strength but needs improvement in response times for complex issues.
CyberArk has been exceptional in coming back to us with immediate responses.
IT Cyber Security Lead at a mining and metals company with 1,001-5,000 employees
It could be forever until you talk to someone who knows what they are doing.
Senior PAM Consultant at iC Consult GmbH
Based on the issue resolution and support quality, I rate the support 10 out of 10.
Operation Specialists at a tech vendor with 10,001+ employees
I sometimes need escalations to reach expertise.
Consultant at a tech vendor with 11-50 employees
Sometimes, I get a very helpful response and they address issues on a call.
Systems Administrator at a university with 10,001+ employees
When I have day-to-day incidents and problems, the response is good enough in terms of time and quality.
Team Lead / Consultant at a computer software company with 5,001-10,000 employees
 

Scalability Issues

Sentiment score
7.6
CyberArk Privileged Access Manager scales efficiently for diverse needs, with flexible deployment options and positive user feedback on growth adaptability.
Sentiment score
7.3
One Identity Safeguard efficiently scales for medium to enterprise levels but may require adjustments for optimal performance.
The CPM can reportedly handle up to 50,000 accounts independently without issue.
Privileged Access Management Engineer at a hospitality company with 10,001+ employees
I would rate it a ten out of ten for scalability.
IT Cyber Security Lead at a mining and metals company with 1,001-5,000 employees
They had 40,000 passwords in this one safe, and it was saving the last ten iterations of each password object. That means they had 400,000 password objects in this safe. They exceeded the limit.
Senior PAM Consultant at iC Consult GmbH
The scalability of One Identity Safeguard is perfect, scoring ten out of ten.
Business Line Manager - IGA & PAM at a tech services company with 201-500 employees
Safeguard handles a growing number of users, systems, and sessions without significant degradation in performance.
Automation tester at a consultancy with 51-200 employees
We have a cluster of SPPs and a cluster of SPSs, and we can add a node to that cluster without much fuss.
Systems Administrator at a university with 10,001+ employees
 

Stability Issues

Sentiment score
7.7
CyberArk Privileged Access Manager is praised for its robust stability and high availability, with minor issues noted under heavy load.
Sentiment score
7.8
One Identity Safeguard is praised for its stability, reliability, and minimal downtime, with minor challenges resolved through support.
Proper fine-tuning and expertise ensure the product performs well.
Cybersecurity Specialist at a comms service provider with 5,001-10,000 employees
Overall, the stability of the solution is high.
Senior Cybersecurity Manager at a financial services firm with 10,001+ employees
It has a large customer base and positive feedback within my network.
Senior Manager at a energy/utilities company with 1,001-5,000 employees
The session proxying, password vaulting, and automated workflow run consistently even under high load.
Automation tester at a consultancy with 51-200 employees
I would rate it a nine out of ten for stability.
Team Lead / Consultant at a computer software company with 5,001-10,000 employees
In terms of stability, I rate One Identity Safeguard nine to ten out of ten.
Business Line Manager - IGA & PAM at a tech services company with 201-500 employees
 

Room For Improvement

CyberArk Privileged Access Manager needs UI, integration, documentation, performance, complexity improvements, better plugins, licensing, reporting, and support.
One Identity Safeguard requires better integration, user experience, performance, intuitive configuration, and improved documentation for broader adoption.
They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises.
Presales Engineer at a computer software company with 201-500 employees
We cannot generate a plug-in for web-based applications.
Contractor at a pharma/biotech company with 5,001-10,000 employees
If they want clients to move to the cloud, they need to support them in real-time.
Senior Manager at a consultancy with 11-50 employees
For some configurations on the SPS side, if I need to make changes, such as for DNS servers, I must redeploy the machine.
Consultant at a tech vendor with 11-50 employees
There are many steps. We are still in the onboarding phase, and it seems very manual.
Systems Administrator at a university with 10,001+ employees
Another area for improvement could be the threat detection capabilities, like those seen in other PAM vendors.
Team Lead / Consultant at a computer software company with 5,001-10,000 employees
 

Setup Cost

CyberArk Privileged Access Manager is costly but offers robust features and security, providing value despite higher pricing.
Enterprise users find One Identity Safeguard costly but valuable for its robust security and flexibility despite extra costs.
CyberArk is expensive compared to other products I know.
Cybersecurity Specialist at a comms service provider with 5,001-10,000 employees
CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.
Presales Engineer at a computer software company with 201-500 employees
CyberArk's SaaS solution is particularly expensive.
Senior Manager at a energy/utilities company with 1,001-5,000 employees
It is one of those where the more you buy, the cheaper it is.
Systems Administrator at a university with 10,001+ employees
It is cheaper than CyberArk.
Team Lead / Consultant at a computer software company with 5,001-10,000 employees
It is more expensive than Secret Server but way less expensive than CyberArk.
IAM Specialist
 

Valuable Features

CyberArk Privileged Access Manager offers password management, session monitoring, and threat analytics to enhance security and compliance.
One Identity Safeguard enhances security with advanced authentication, auditing, session management, and integrations, simplifying organizational access and compliance.
CyberArk Privileged Access Manager helps ensure data privacy because we now know who is using which credentials and at what time.
Senior Cybersecurity Manager at a financial services firm with 10,001+ employees
It keeps a record of activities, allowing me to easily fetch screen recordings to detect any misuse and see who did what and what happened.
Senior Manager at a consultancy with 11-50 employees
It can integrate with Splunk, SNMP, and other solutions and technologies.
Technical Support Analyst at Capgemini
The auditing and approval mechanisms are features we did not have before and are greatly appreciated.
Systems Administrator at a university with 10,001+ employees
Automatic credential rotation helps our team by removing the need for manual changes to privileged passwords, reducing the risk of stale or shared credentials and ensuring that every access is controlled and compliant.
Technical Consultant at ProTechmanize Solutions (P) Ltd.
Just-in-time access has sped up admin task completion and improved our overall compliance reporting, allowing audits to be completed nearly half the time compared to earlier.
Manager, Account Services Delivery at Softcell Technologies Limited
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
One Identity Safeguard
Ranking in Privileged Access Management (PAM)
2nd
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
52
Ranking in other categories
User Entity Behavior Analytics (UEBA) (6th), Non-Human Identity Management (NHIM) (3rd)
 

Mindshare comparison

As of February 2026, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Privileged Access Manager is 11.2%, down from 19.7% compared to the previous year. The mindshare of One Identity Safeguard is 3.9%, down from 4.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager11.2%
One Identity Safeguard3.9%
Other84.9%
Privileged Access Management (PAM)
 

Q&A Highlights

AG
Associate VP & Cyber Security Specialist at Union Bank of California
Jan 16, 2026
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
SV
Automation tester at a consultancy with 51-200 employees
Centralized controls have improved privileged access and simplified compliant audit workflows
We use One Identity Safeguard as a central control point for all our privileged access, which helps standardize the access policies across teams and platforms. We also use it for the approval workflows, which are enforced for high-risk systems and add an extra security layer for production access. I have been using it for one and a half years. The best feature I appreciate is the session proxying and recording. It provides transparent session access for admins without exposing the real passwords. Another valuable feature is automated password rotation, which changes the credentials automatically after each use or on a schedule. It reduces the risk of leakage and reuse of passwords. Additionally, the approval workflow and the access request feature add governance with multi-level approvals for sensitive systems. These are the features that I appreciate the most. When we started using the session proxying and recording features, overall, it was a manageable and fairly smooth process for us. However, like most security platform deployments, it had a few learning curves. Session proxying and recording worked with our major systems including Windows, Linux, and network devices with minimal configuration. Some devices and services required slight changes to firewall rules and configuration to ensure the proxy could connect cleanly. Additionally, our admins needed orientation so they understood they were joining a recorded session, particularly for remote or support use. We spent considerable time adjusting the session filtering, retention settings, and naming conventions so recordings were useful and not overwhelming. These are some areas where we encountered challenges.
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
881,757 professionals have used our research since 2012.
 

Answers from the Community

AG
Associate VP & Cyber Security Specialist at Union Bank of California
Jan 16, 2026
Jan 16, 2026
I prefer CyberArk Privileged Access Manager because it offers the strongest security, session monitoring, and compliance capabilities among PAM tools. It’s ideal for enterprise environments where privileged access needs to be tightly controlled and audited, even though it requires more effort to implement.
2 out of 3 answers
Nurlan Temirbulatov - PeerSpot reviewer
Sales Engineer at Remediant
Dec 7, 2022
Hello Avinash, it all depends on the timeline and urgency of the project. If you need to deploy a PAM tool that focuses on standing privileges, stopping lateral movement, and incorporating Zero Standing Privileges as part of Zero Trust, then please consider looking at Remediant. I've worked for BeyondTrust and have gone up against the other big players such as Delinea, Centrify, CyberArk, and HashiCorp. They more or less all offer similar solutions, but looking at your current requirements, Remediant really excels in delivering a simple, yet very effective tool in a matter of days and weeks, not months and years. 
DN
IT Manager at CAS Trading House
Aug 14, 2023
Based on your extensive list of requirements, CyberArk Privileged Access Manager appears to align well with your needs due to its comprehensive feature set, strong security controls, integration capabilities, and advanced analytics for privileged access. However, it's important to conduct in-depth evaluations, demos, and discussions with each vendor to ensure that the chosen tool meets all your specific needs and integrates seamlessly into your existing infrastructure. However, I recommend visiting the official website of Broadcom (the company that acquired Symantec's enterprise security business) or contacting their sales representatives to get the most up-to-date information about their PAM solutions, including any rebranding or changes that may have occurred. When evaluating any PAM solution, it's essential to consider factors such as security, integration capabilities, ease of use, vendor support, scalability, and alignment with your organization's specific needs and compliance requirements. It's also a good practice to request demonstrations, proofs of concept, and references from vendors to ensure that the solution meets your expectations. Remember to involve key stakeholders, such as IT, security, compliance, and management teams, in the decision-making process to ensure alignment with organizational goals and requirements.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Manufacturing Company
10%
Computer Software Company
9%
Government
6%
Computer Software Company
10%
University
8%
Comms Service Provider
7%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise40
Large Enterprise173
By reviewers
Company SizeCount
Small Business29
Midsize Enterprise17
Large Enterprise19
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
What is your experience regarding pricing and costs for One Identity Safeguard?
My experience with pricing, setup cost, and licensing has been a good experience overall, as the back and forth with One Identity is something that is acceptable; other tools have options to do thi...
What needs improvement with One Identity Safeguard?
One Identity Safeguard could be improved with a password manager and an identity manager as one big access management system. I believe improvements could be made around integrating with other tools.
What is your primary use case for One Identity Safeguard?
My main use case for One Identity Safeguard is using only one module for privileged session, which we use for admins and contractors. A quick specific example of how my team uses One Identity Safeg...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Cavium
Find out what your peers are saying about CyberArk Privileged Access Manager vs. One Identity Safeguard and other solutions. Updated: February 2026.
881,757 professionals have used our research since 2012.