Try our new research platform with insights from 80,000+ expert users

Heimdal Privileged Access Management vs One Identity Privileged Access Suite for Unix comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Heimdal Privileged Access M...
Ranking in Privileged Access Management (PAM)
37th
Average Rating
8.0
Reviews Sentiment
8.1
Number of Reviews
1
Ranking in other categories
No ranking in other categories
One Identity Privileged Acc...
Ranking in Privileged Access Management (PAM)
33rd
Average Rating
7.6
Number of Reviews
3
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of March 2025, in the Privileged Access Management (PAM) category, the mindshare of Heimdal Privileged Access Management is 0.2%, down from 0.3% compared to the previous year. The mindshare of One Identity Privileged Access Suite for Unix is 0.3%, down from 0.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

DEEPAK KUMAR PACHDEO DUBEY - PeerSpot reviewer
Empowers user autonomy with robust access control and accountability
I haven't found any issues with the solution currently; it can effectively handle everything we've encountered. It would be beneficial if they could further integrate AI features for automatic learning and reduce alert frequency. Making the solution lighter while improving scanning and threat management efficiency could enhance it. However, Heimdal is responsive to our feedback and often works on updates quickly.
Hicham Barnoussi - PeerSpot reviewer
A reliable solution with great password and session management
The setup process depends on the environment of the customer. It's not dependent on the solution. For customers with normal use cases and scenarios, it's a straightforward implementation, but for a customer with more than one environment, they may have BeyondTrust in one environment and Safeguard in another one. When they want to consolidate later, there may be complications. It depends on the devices and assets they would like to have under their PAM solution. The standard time for implementation is four weeks. I rate the setup an eight out of ten. There needs to be a dedicated resource for maintenance.
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
842,296 professionals have used our research since 2012.
 

Also Known As

Thor AdminPrivilege
No data available
 

Overview

 

Sample Customers

Brother, Symbion, CPH West
University of East Anglia, nForce Secure, dunnhumby
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: March 2025.
842,296 professionals have used our research since 2012.