We are a One Identity partner, and our clients use One Identity Safeguard for password vaults, session management for Linux and Windows servers, and network appliances.
Senior Vice President (Infrastructure Systems/Information Security) at MAXUT
Th password vault feature has proven to be most effective for managing privileged access
Pros and Cons
- "The most valuable feature of One Identity Safeguard is the user-friendly interface."
- "One Identity's support is not appropriately structured, and it has a lot of room to improve."
What is our primary use case?
How has it helped my organization?
One Identity Safeguard now prevents unauthorized access to servers by eliminating privileged passwords and requiring all connections to go through a PAM-authorized process. This means no one, including hackers, can access servers without explicit approval, significantly enhancing overall security.
One Identity Safeguard is easy to use with a good partner to support you, and it can be up and running within a few days.
We have successfully integrated One Identity Safeguard with cloud targets, and the process was straightforward.
One Identity Safeguard has improved our incident response time by 300 percent.
What is most valuable?
The most valuable feature of One Identity Safeguard is the user-friendly interface.
The password vault feature has proven to be most effective for managing privileged access. Recycling passwords has been critical. The environment is on lockdown with the One Identity privileged access management solution. No hacker can get in.
What needs improvement?
One Identity's support is not appropriately structured, and it has a lot of room to improve.
Buyer's Guide
One Identity Safeguard
April 2025

Learn what your peers think about One Identity Safeguard. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
849,190 professionals have used our research since 2012.
For how long have I used the solution?
I have been using One Identity Safeguard for three years.
What do I think about the stability of the solution?
One Identity Safeguard is exceptionally stable.
What do I think about the scalability of the solution?
One Identity Safeguard is highly scalable.
We have plans to increase the use of One Identity Safeguard.
How are customer service and support?
Technical support is all right, but they will not offer support until we have One Identity running. If we have issues during the deployment, they will not provide support unless we pay for professional services.
How would you rate customer service and support?
Negative
How was the initial setup?
The initial setup was straightforward and took three months because the client had a problematic environment.
Our strategy was to deploy this on a single VM appliance and replicate it to an offline data site public setup.
What was our ROI?
One Identity Safeguard provides a significant return on investment.
What's my experience with pricing, setup cost, and licensing?
One Identity Safeguard is expensive. The license is around $3,000 per month.
Which other solutions did I evaluate?
We evaluated CyberArk but found One Identity Safeguard easier to use, deploy, and administer.
What other advice do I have?
I would rate One Identity Safeguard five out of ten.
Do not deploy One Identity Safeguard unless you have extensive training, classroom training, and infrastructure experience.
We have around 100 administrators; our clients are medium and enterprise businesses.
Minimal maintenance is required because it is a virtual appliance, and everything is preconfigured.
One Identity Safeguard is a good solution, and I recommend it.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Last updated: Aug 4, 2024
Flag as inappropriate
Head of Department of Technical Means of Protection at BrokerCreditService
Visualizes RDP sessions and logs SSH sessions
Pros and Cons
- "The solution transparently integrates into the infrastructure and users do not notice it. I would give this feature the highest rating."
- "I would like to see support for RDP over HTTPS so this product can be used in conjunction with the Microsoft terminal."
What is our primary use case?
We use this solution to control the access of privileged users, such as application administrators, to the internal network. This solution allows us to record and log user sessions.
We use virtual appliances on the VMware platform. The virtualization of such services allows us to flexibly scale our hardware configuration and gives significantly more opportunities for building a stable structure.
How has it helped my organization?
This solution allowed us to provide remote access to the company's internal infrastructure in the context of the COVID-19 pandemic. It made this access more transparent and controlled for information security departments.
We easily integrated this product with our SIEM system for collecting events. Thanks to this integration, we were able to build convenient, regular reports on privileged user connections. Therefore, our information security units can better see who is connecting to the remote infrastructure.
What is most valuable?
The most valuable feature is the logging sessions with their visualization, which is video recording. This functionality allows us to restore the actions of a user in the event of any incidents.
The solution transparently integrates into the infrastructure and users do not notice it. I would give this feature the highest rating.
While the "transparent mode" feature did not affect the monitoring in any way, it led to an increase in the convenience of connecting users.
This solution visualizes RDP sessions and logs SSH sessions.
What needs improvement?
I would like to see support for RDP over HTTPS so this product can be used in conjunction with the Microsoft terminal.
I would like to visualize SSH sessions.
I would like built-in traffic balancing mechanisms with the built-in load balancing mechanism when using several instances.
For how long have I used the solution?
About four years.
What do I think about the stability of the solution?
Over four years of use, we have not encountered a single system crash or failure. The product is stable.
What do I think about the scalability of the solution?
When increasing the number of users, we can rather easily add to virtual appliances processors and memory, or disks for storing records, which is more difficult to do on a hardware (physical) appliance.
We have two administrators involved in the deployment, configuration, and maintenance of this solution. During the peak of the pandemic, we had up to 3,000 users connected through the solution and able to work from home.
How are customer service and technical support?
We have used One Identity’s tech support. I would rate it as excellent. They answer all the questions asked of them quickly and efficiently.
Which solution did I use previously and why did I switch?
We did not previously use a different solution.
How was the initial setup?
The virtual appliance is deployed from the delivered image without any problems. The setup takes about 15 to 20 minutes, including initial setup and configuration. It also is available to any admin user with Unix competencies.
We use the “transparent mode” function to connect administrative users via SSH to the Unix servers. We did not encounter any problems when setting up this feature, as everything was easy. The solution is well-documented and quite understandable when setting up.
It took about one or two working days to administer the solution, read the documentation and settings, and test various configuration options. It was not very difficult. For our users, there were no special nuances since the connection is transparent. They do not understand nor see that they are connecting through the One Identity Safeguard space.
Our implementation strategy was to use this solution to control remote sessions of privileged users, first with our IT support staff. Now, we use the product for this purpose. In general, the strategy was a success.
What was our ROI?
There has been a lack of losses, since controlling the actions of privileged users is primarily to minimize risks and create an absence of losses.
What's my experience with pricing, setup cost, and licensing?
Licensing and pricing are quite straightforward. The number of recording channel licenses depends on the needs of the customer. I would suggest estimating the number of concurrent sessions per unit of time and proceed from there when purchasing a license.
Which other solutions did I evaluate?
We evaluated Safeguard and another product. We ultimately chose Safeguard.
Safeguard is an external (in relation to controlled systems) solution which allows you to record sessions. Its competitor was an agent solution that was put on target servers. With the competitor's solution, there was a risk of disconnecting of a privileged user's recording.
What other advice do I have?
Clearly assess your needs and formulate the necessary requirements, then proceed from there with the selection of an appropriate solution. In our case, One Identity Safeguard became this solution. However, this solution is not a panacea for all ills. It is possibly you’ll find that a different solution is more suitable.
I would rate the solution as a nine (out of 10). In order to rate it as a 10, it should have what I would like to see in its coming new releases.
Foreign Language: (Russian)
Как и для чего вы используете этот продукт?
Мы используем это решение для контроля доступа привилегированных пользователей, таких как администраторы приложений, к внутренней сети. Это решение позволяет нам записывать и регистрировать пользовательские сессии.
Мы используем виртуальные устройства на платформе VMware. Виртуализация таких сервисов позволяет нам гибко масштабировать конфигурацию нашего оборудования и предоставляет значительно больше возможностей для построения стабильной структуры.
Как это помогло моей организации?
Это решение позволило нам обеспечить удаленный доступ к внутренней инфраструктуре компании в контексте пандемии COVID-19. Это сделало этот доступ более прозрачным и контролируемым для отделов информационной безопасности.
Мы легко интегрировали этот продукт с нашей системой SIEM для сбора событий. Благодаря этой интеграции мы смогли создавать подходящие регулярные отчеты о привилегированных пользовательских соединениях. Поэтому наши подразделения информационной безопасности могут лучше видеть, кто подключается к удаленной инфраструктуре.
Какие функции вы нашли наиболее ценными?
Наиболее ценной функцией является регистрация сеансов с их визуализацией, то есть запись видео. Эта функциональность позволяет нам восстанавливать действия пользователя в случае каких-либо инцидентов.
Решение прозрачно интегрируется в инфраструктуру, и пользователи этого не замечают. Я бы дал этой функции самый высокий рейтинг.
Хотя функция «прозрачного режима» никак не повлияла на мониторинг, она привела к увеличению удобства подключения пользователей.
Это решение визуализирует сеансы RDP и регистрирует сеансы SSH.
Что нуждается в улучшении?
Я хотел бы видеть поддержку RDP через HTTPS, чтобы этот продукт можно было использовать вместе с терминалом Microsoft.
Я хотел бы визуализировать сессии SSH.
Я хотел бы использовать встроенные механизмы балансировки трафика со встроенным механизмом балансировки нагрузки при использовании нескольких экземпляров.
Как долго я использую этот продукт/решение?
Около четырех лет.
Что я думаю о стабильности этого продукта/решения?
За четыре года использования мы не встретили ни одного сбоя или сбоя системы. Продукт стабилен.
Что я думаю о масштабируемости решения?
Увеличивая количество пользователей, мы можем довольно легко добавить к виртуальным устройствам процессоры и память или диски для хранения записей, что труднее сделать на аппаратном (физическом) устройстве.
У нас есть два администратора, участвующих в развертывании, настройке и обслуживании этого решения. В разгар пандемии у нас было до 3000 пользователей, подключенных через решение и способных работать из дома.
Как бы вы оценили техническую поддержку этого продукта/решения?
Мы использовали техническую поддержку One Identity. Я бы оценил это как превосходное. Они отвечают на все заданные вопросы быстро и качественно.
Какое решение я использовал ранее и почему я переключился?
Ранее мы не использовали другое решение.
Как прошла начальная настройка?
Виртуальное устройство развертывается из доставленного образа без каких-либо проблем. Настройка занимает от 15 до 20 минут, включая первоначальную установку и настройку. Он также доступен для любого администратора с компетенцией Unix.
Мы используем функцию «прозрачного режима» для подключения административных пользователей через SSH к серверам Unix. При настройке этой функции проблем не возникало, так как все было просто. Решение хорошо документировано и вполне понятно при настройке.
Потребовалось около одного или двух рабочих дней для администрирования решения, ознакомления с документацией и настройками, а также для тестирования различных вариантов конфигурации. Это было не очень сложно. Для наших пользователей особых нюансов не было, так как подключение прозрачно. Они не понимают и не видят, что они соединяются через пространство One Identity Safeguard.
Наша стратегия внедрения заключалась в том, чтобы использовать это решение для управления удаленными сеансами привилегированных пользователей, в первую очередь с нашей службой поддержки Информационных Технологий. Теперь мы используем продукт для этой цели. В целом стратегия имела успех.
Какой была была ваша прибыль на инвестиции в One Identity Safeguard?
Мы не испытали никаких потерь, поскольку контроль действий привилегированных пользователей в первую очередь сводит к минимуму риска и создает отсутствие потерь.
Какой у меня опыт работы с ценами, стоимостью установки и лицензированием?
Лицензирование и ценообразование довольно просты. Количество каналов регистрации лицензий зависит от потребностей заказчика. Я бы посоветовал оценить количество одновременных сеансов за единицу времени и перейти оттуда к покупке лицензии.
Прежде чем выбрать этот продукт, вы оценивали другие варианты?
Мы оценили Safeguard и другой продукт. В конечном итоге мы выбрали Safeguard.
Safeguard - это внешнее (по отношению к управляемым системам) решение, которое позволяет вам записывать сессии. Его конкурентом было агентское решение, которое было размещено на целевых серверах. С решением конкурента был риск отключения записи привилегированного пользователя.
Какой еще у меня совет?
Четко оцените свои потребности и сформулируйте необходимые требования, а затем приступайте к выбору подходящего решения. В нашем случае One Identity Safeguard стал таким решением. Однако это решение не является панацеей от всех болезней. Возможно, вы обнаружите, что другое решение более подходит.
Я бы оценил решение как девять (из 10). Чтобы оценить его как 10, у него должно быть то, что я хотел бы видеть в его будущих новых выпусках.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
One Identity Safeguard
April 2025

Learn what your peers think about One Identity Safeguard. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
849,190 professionals have used our research since 2012.
Business Line Manager - IGA & PAM at a tech services company with 201-500 employees
Simplified implementation and robust security infrastructure enhance user experience
Pros and Cons
- "The scalability of One Identity Safeguard is perfect, scoring ten out of ten."
- "I rate customer support six out of ten. It needs improvement as it can significantly impact customer access."
What is our primary use case?
I am not a customer; I am a partner. Therefore, I assist clients in implementing One Identity Safeguard to manage privileged account access and their passwords. The primary aim is to reduce the attack surface of those accounts.
What is most valuable?
The best feature of One Identity Safeguard is its infrastructure simplicity compared to other solutions. Joining two clusters together makes it easy and robust at the same time. The interface is robust and secure, and with recent releases, it has become more stable. Implementation is straightforward, and user experience is simple.
What needs improvement?
There is room for improvement in integration between modules. The native integration between SPP and SPS, which is currently based on a plugin, could be enhanced. Customization for lookup passwords could also be made easier.
For how long have I used the solution?
I have been working with One Identity Safeguard since 2019.
What was my experience with deployment of the solution?
Most of my users have been using the on-premises solution. There was a customer who used the physical appliance, but most installations involved virtual appliances. Deployment for my clients takes from three to eight months.
What do I think about the stability of the solution?
In terms of stability, I rate One Identity Safeguard nine to ten out of ten. It is a fairly stable solution with improvements over time.
What do I think about the scalability of the solution?
The scalability of One Identity Safeguard is perfect, scoring ten out of ten. It is suitable for medium to enterprise-level clients.
How are customer service and support?
I rate customer support six out of ten. It needs improvement as it can significantly impact customer access. It would be beneficial to have a more direct route to second-level support from partners.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I am aware of CyberArk. Compared to CyberArk, One Identity Safeguard could be more mature. However, it is a good solution in terms of cost-benefit.
How was the initial setup?
The initial setup is relatively simple compared to other solutions. It is straightforward for most users.
What was our ROI?
While it does not directly reduce costs in terms of personnel, One Identity Safeguard offers increased security, especially in password management.
What's my experience with pricing, setup cost, and licensing?
The pricing of One Identity Safeguard is fairly priced and cheaper than other solutions of the same enterprise level. It provides a good cost-benefit ratio.
Which other solutions did I evaluate?
I have knowledge of CyberArk as an alternative solution.
What other advice do I have?
I recommend One Identity Safeguard because it is valuable in terms of cost-benefit. It is simple to implement, and its infrastructure costs are lower than other solutions. It provides a flexible approach, offering both on-premises and cloud solutions. Overall, I rate One Identity Safeguard eight out of ten.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: Partner
Last updated: Apr 4, 2025
Flag as inappropriateChief Information Security Officer at a financial services firm with 51-200 employees
Reduces operational costs and eliminates password sharing
Pros and Cons
- "We use the solution’s Approval Anywhere feature which enables us to add an extra layer of security for critical passwords without adding time-consuming approval processes. By using this platform, if someone goes on a vacation, out of office, or needs urgent/planned leave, then our setup will select the functions tied to that person and automatically delegate them to the next person. That person can start performing that duty based on their access. No sharing of passwords is required."
- "The multilanguage functionality does not support the Arabic language, even though this solution is deployed in an Arabic region."
What is our primary use case?
Our company is regulated by the central bank in our country. There are about 4,000 employees in our organization.
Our main need was to reduce the operational cost of our department by increasing the window of operations to 24-hour rather than have office unemployment.
We are now digitizing the access control function through One Identity. Whoever forgets their password can reset it on their own rather than reaching out to the security desk. Whenever we have a new employee, we found that it was taking at least two days to get them a username or access to the system. Now, once they are logged into the organization and are registered on our ERP system, their complete access will be ready within five seconds. They will receive an SMS with their username and password so they can start working. This has increased efficiency and effectiveness of the access control function. It has reduced operational costs as well as providing services 24/7 with a platform that can be used anytime and anywhere for investigation in case we have a requirement.
We use the physical appliances, as they are more reliable. Around the world, dedicated appliances are more reliable than having a virtual version/copy. We went with the physical appliances because they are dedicated and closed like a black box. However, we haven't reported any misses with the virtual version.
What is most valuable?
We use the solution’s Approval Anywhere feature which enables us to add an extra layer of security for critical passwords without adding time-consuming approval processes. In the past, we were having problems when a user went on vacation. There were many recalled cases of password sharing. When we received this type of incidence and started to investigate, we found out the past setup had no solution. For example, if someone with a daily duty went on vacation, they still had to do it within the office. That is why sometimes people tried to justify the sharing of passwords by the importance of their duties. Now, by using this platform, if someone goes on a vacation, out of office, or needs urgent/planned leave, then our setup will select the functions tied to that person and automatically delegate them to the next person. That person can start performing that duty based on their access. No sharing of passwords is required.
What needs improvement?
The multilanguage functionality does not support the Arabic language, even though this solution is deployed in an Arabic region. However, it matches our criteria and requirements overall.
One Identity is using a third-party to create one-time passwords. Due to our security restrictions, we needed to build our own. When we discussed this with One Identity, "Why they don't provide a technology that can be hosted on our data center and be built by One Identity," they said they are using a third-party. This was their justification, so I think it's based on their strategy and there's no harm using a third party. However, we were having an issue using a third-party.
For how long have I used the solution?
I have using this solution for about six months. The project started about one year back. We started product introduction through phases. We went full-fledged with One Identity using Cloud Access Manager, Password Manager, and Privileged Access Management along with identity and access management.
What do I think about the stability of the solution?
We have been trying to stabilize the system until now. We haven't had the chance to revisit the deployment to find out if there are any expansion plans, as we are working to sustain the set up. We want to increase end user awareness and start building the number of reports.
What do I think about the scalability of the solution?
I didn't have a requirement to test the scalability of the solution. We did discuss the scalability with the system integrator at the beginning, and it's on the license level. I don't think we will have an issue once we come to the point of needing to scale.
We have 3,000 end users and 10 administrators.
How are customer service and technical support?
I haven't had a chance to work the One Identity technical team. We work with the local partner instead.
None of my team has gone for training yet. However, they did have a handover for operation of the solution. It doesn't need that much training as long as you know the basics of access control functions. End users only need to have a tutorial to the portal. This is what we provide: a tutorial for how to use it and the know-how.
Which solution did I use previously and why did I switch?
We previously were using a manual process. One Identity helped us to automate this process.
How was the initial setup?
We integrated One Identity with our ERP system (Oracle) and also with our security operations center (Splunk). The integration went perfectly. It was an easy connection. We built the connectivity directly through the API. What we found time consuming: the setup and connecting One Identity. E.g., Oracle takes more time than Splunk to connect because Splunk's system is ready to send the security logs to the security operations centers. With Oracle, the integration depends on the business needs and there are a number of different requirements based on those business needs. The enhancement One Identity made is the historical part related to system access control goes through our SOC to this tool.
What about the implementation team?
My team worked on the initial setup. I don't remember any critical escalations related to technicalities during their field deployments. The local system integrator helped us with any deployment challenges. There was zero disruption to privilege users during the deployment, which can be attributed to the work of the project management team. The deployment took about six months using two outsourced resources.
For the consultation services, we went with a well-known, famous system integration company (Exceed Gulf), who is local. They were cooperative, experienced, and professional. They have led many successful deployments in our region. Sometimes, they provide better advice when we are releasing an RFP to the market, e.g., when they got this RFP, they added value by doing a slight amendment to the deployment. This contributed a lot to the success of this project. Their advice comes based on their experience in the deployment for such a solution in our region. I strongly recommend working with Exceed Gulf and the same team that we worked with, as their technical skills were perfect.
What was our ROI?
We have not yet seen ROI. The benefit that we get from using One Identity is that it reduces operational costs.
What's my experience with pricing, setup cost, and licensing?
We have a yearly license. The cost depends on how much a company wants to invest in technology. In our organization, we believe in modern digitization and automation processes so we found it affordable. One Identity was not that much less than other solutions and it is not a cheap solution. There were number of cheaper solutions. However, it's the most effective, according to our evaluation.
Which other solutions did I evaluate?
When we started thinking about approaching such a solution, there was an increased need to digitize or have a platform that helped to provided access control functions. There were a number of solutions in the market, like Oracle and Microsoft. One Identity (per our evaluation) was our selected solution. One Identity won when we match these criteria against other solutions in the market:
- Support
- The system integrator
- Strength of the solution
- Complexity of the solution (less complex than other solutions).
What other advice do I have?
Make sure to always get the support. This solution could not be successfully implemented with no support of the HR and procurement system. You will need to mature all of your HR and procurement processes to do the deployment in a secure manner. This is a security solution, not an IT solution. If you want to deploy it as a security requirement, you need to ensure that the HR and procurement processes are correctly in place. You can use it as a technology solution, because not all the technology requires security, but all security requires technology.
We haven't activated the session recordings yet. We have tested it, and while it worked successfully, we didn't apply it fully because of internal technical issues.
All the logs in the system are recorded and sent to our security operations center (SOC) for analysis. In our SOC, we have end user behavior analysis, but do not depend directly on One Identity to provide this. However, I might ask to have a report for the user behavioral analysis going forward.
I can rate the solution as an eight (out of 10).
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Senior Vice President (Infrastructure Systems/Information Security) at MAXUT
This product is an excellent for controlling role-based access without administrative overhead
Pros and Cons
- "The Transparent Mode is the number one advantage of the product."
- "It is generally easy-to-use and install."
- "Being able to use a proxy server is an advantage."
- "The product uses a lot of resources in current sessions."
- "The Transparent Mode could be somewhat easier to use."
What is our primary use case?
With Safeguard, there are two virtual appliances. There is one that helps you manage passwords and then there is another one that helps you record the sessions. You can configure it to record whatever you do when you make the remote calls.
We use this solution for a bank. My current project is to onboard all the bank's security assets onto Safeguard. It will be used for admins to have secure access to the server.
What is most valuable?
The part of this product that I like the most is the transparent mode. That is the number one advantage of the product. I also like the ease-of-use. That is what Quest is known for. The interface is interactive, relatively easy-to-use.
I like the fact that we are using a proxy server. Also, I like the fact that it is integrated in such a way that I can connect to my Linux and Unix resources using my AD credentials. They map the AD credentials to Linux accounts. So, when I am connected to my AD accounts, it acts as a sort of proxy to convert it to the Unix account that it is configured for. That is quite useful.
What needs improvement?
The only part of the Safeguard solution that I think could be a problem over time is the amount of storage it takes in the sessions. For example, because it records in real-time video it takes a lot of resources. So, it has not been a problem yet, but we are looking at a solution where we allocate the cost of that additional capacity differently. Then there will be enough resources to compensate for whatever the storage needs are. It just takes a large amount of storage for each current session.
Another thing that I would like to see them improve is that I would like them to make the transparent board a little bit more transparent. The transparent mode is something I use often and it is the best feature of the product but that is also why I see how it can be improved. It might just be a little bit easier to use.
For how long have I used the solution?
We are a long-time Quest partner and have only been using the product for the past five months. We just got onboarded to the One Identity product. This is my first project with One Identity.
What do I think about the stability of the solution?
One of the things I really like about the One Identity solution is the fact that it can be configured in active-active cluster mode. It is just a little pricey because you have to purchase the additional licensing just to be able to do an active-active configuration.
But I like it also because it is a virtual appliance. This means I can configure a high-availability cluster anyhow I want. If I have it on a VMware cluster, I can enable high-availability or any virtual cluster solution that makes sure it is highly available. I would do that using VMware storage. This makes it a more stable and flexible solution.
The fact that I do not have to worry about other incidental things is good. I am not connected to an external database server. So all the dependencies, patching, and additional setup is something I do not have to do on the One Identity appliance. Everything is on a hardware appliance. In other words, I do not really even have to worry about securing my security device. It may not be the first thing to think about, but because you deployed a security device, now you have to worry about securing it. As it is all-in-one as a hardware appliance, I do not have to worry about all that.
What do I think about the scalability of the solution?
We have not had any issues with scalability to this point and it is handling our capacity and needs. The only potential issue would be budgeting for additional licensing, which would not be a problem in our case, and handling the resource usage. These are not really limiting.
Between the banking client and our company, not everyone has been onboarded yet to the One Identity Safeguard. But in the end, we are looking at probably about 500 servers and I think a total of about 180 admins. This seems realistic using this product.
How are customer service and technical support?
My impression of support is that the guys there are very helpful. They are eager to jump in and to help you out. Yes, I think it is a great service.
How was the initial setup?
I think that the initial setup was very straight forward. Pretty much a piece of cake, actually. With our implementation strategy, the deployment actually took only about two hours. That is including the discovery of the assets. It is a relatively large enterprise network, so discovery can potentially take some time. This was very reasonable.
What's my experience with pricing, setup cost, and licensing?
The approximate cost on a yearly basis is in the ballpark of about 80 grand, $80,000. That is for about 100 servers. That is the standard license fee. There are not really any additional costs once you purchase that. Sometimes you can have professional services included with it. For example, if you take a week of professional services or if you need them to do the install. That is the only additional charge.
Which other solutions did I evaluate?
As a long-time Quest partner, this was an easy choice to make. Because we were already partners it made sense to work with their other solutions.
What other advice do I have?
The advice I would give to organizations considering this solution would be that before they make a commitment they need to try to find a local support resource. They will want to be able to get local support because that can be critical. But otherwise, I think it is a good product and a good buy. I would buy it again. As a partner, I would also sell it again because I am confident in it as a product and a solution.
On a scale from one to ten, where one is the worst and ten is the best, I would rate the One Identity Safeguard solution as a nine-point-five out of ten. I'm very happy. If I have to choose an integer, it would have to be a nine. Ten would mean it is perfect and there are things I think can be improved.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Chief Information Security Officer at Outscale
Provides all the information that we need for an investigation, but the interface needs more organization
Pros and Cons
- "We use the solution’s “transparent mode” feature for privileged sessions. It is very easy because it is only a simple configuration for our users. We don't have to modify our network. We install it, configure it, and it works. So, it is super easy. The rollout for our users is seamless."
- "The interface is better now, but it still could be improved a lot. It needs more organization, menus, automatic refresh of information, and Web 2.0."
What is our primary use case?
We are using the virtual appliance. We are a cloud company working widely with virtualization. We provide virtual machine to our customers. When we deploy a new solution, we try to use our system to show our customers that it works for them. That is why we are using a virtual appliance which validates the usage.
For now, we are using it for traceability of access inside the platform because we are a certified company: ISO 27001, SecNumCloud, HDS... We use this solution to monitor the session of our administrator and also to capitalize on incidents. When you have an incident in the night and our Level 3 people are working on it, they don't have the time to document all they do on the platform. The main goal is to have the service up as fast as possible. We are now recording the session, and the morning after the incident, we can see the session and understand what has been done to resolve the incident.
We are using the latest version of Safeguard.
How has it helped my organization?
When we are asked to do an investigation for a server, we have all the information that we need. We never have any problems as all the information is available to us.
What is most valuable?
The transparent proxy is the most valuable feature. When you are connecting to a server inside the platform, the user doesn't need to change their habit. They just have to make small configurations to their workstation, then it is transparent for them. Our users like the solution because it's transparent. Users doesn't need to have interaction with 3DS OUTSCALE IT or security team to work as usual. It's interesting for the users because they don't have to think, "I have to note all that I've done during the incident to remember it".
We use the solution’s “transparent mode” feature for privileged sessions. It is very easy because it is only a simple configuration for our users. We don't have to modify our network. We install it, configure it, and it works. So, it is super easy. The rollout for our users is seamless.
The "transparent mode" allows for better visibility. With its monitoring, we can do investigations which are good for us and improve our system.
What needs improvement?
The interface is better now, but it still could be improved a lot. It needs more organization, menus, automatic refresh of information, and Web 2.0.
An official HashiCorp Vault connector would be very helpful inside the platform.
SSH implementation is not 100% compatible with standard SSH (openssh). For example : JumpHost.
As a result, some options require manual tunning, and complicated user-side configs, where it could be much simpler
For how long have I used the solution?
We have been using it for a long time: six years.
What do I think about the stability of the solution?
It is very stable. We have never had incidents with it. When we lost a connection with our Active Directory, the system continued to work. When we lost the storage on the virtual appliance, we restarted it, then it was fine. Thus, the product is very stable.
One or two people are needed for deployment and maintenance. For the deployment, it's done by the security team for now. However, in the near future, it will be managed by the operations team.
We upgrade about every two months the latest version.
What do I think about the scalability of the solution?
We don't use the scalability. When we need a new appliance, we deploy it inside another network. We don't need scalability for now, but if we grow quickly, we will need to think about it.
We have about 50 users inside the company, including the security team, operations team, infrastructure team, and Level 1 support.
We are using 75 percent of the parallel session unless there is an incident, then we can use all the slots.
How are customer service and technical support?
I used the technical support once. It was good. I had the answer to my question quickly. I have direct access to the pre-sales team and my account manager. So, I called in and my problem was solved.
Which solution did I use previously and why did I switch?
Yes but we had to quit it because they didn't have what we needed and it was very expensive.
How was the initial setup?
In the beginning six years ago, we started with a small instance. We used it very simply and learned how to manage it.
With the newest version that we massively deployed, we had one week to know how to install it and how it works. Now, we know how it works very well.
Install is fairly simple, with basic options.
Configuration requires a little explanation on the way it works but is straightforward too.
What about the implementation team?
We deployed it ourselves.
What was our ROI?
We have seen ROI in terms of time. It's easier for us to investigate incidents, which is helpful. It has improved our performance with investigations. It used to take a month to write an incident. Now, it takes us a week, cutting the time down by a fourth.
What's my experience with pricing, setup cost, and licensing?
Our licensing costs are on a yearly basis.
Which other solutions did I evaluate?
We evaluated CyberArk, which was pretty good, but it is very expensive. CyberArk's interface was better. Also, CyberArk's login was not so transparent. We chose One Identity because it has a transparent login in interruption in the network.
What other advice do I have?
When you use Safeguard in production, it provides traceability and protection around your platform.
I would rate the solution as a seven (out of 10) because of the interface.
I have seen the future of analytics, and it's very interesting. I hope to have the time to try and learn something about that.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Provides valuable data protection, access to immediate support, and doesn't rely on VPN
Pros and Cons
- "There are numerous valuable data protection features, including the content and information that offer us more scalable protection as needed."
- "Some of our users find the functionality a bit complex, and it could be made more user-friendly."
What is our primary use case?
We are using One Identity Safeguard for our data protection.
We are utilizing the virtual appliance solution because it is slightly more cost-effective and allows us to manage it remotely.
How has it helped my organization?
Secure Remote Access feature is being utilized by non-technical users, primarily for multi-factor authentications. We are implementing MFA; however, some users in our branch are not yet connected. Consequently, we are resorting to using a VPN in our access control measures. At times, we have also employed remote branches for auditing and monitoring any potentially suspicious activities. Our endpoint security is consistently updated and ensures encryption for all the internet services we utilize.
It is important that the Secure Remote Access feature does not rely on a VPN. One Identity Safeguard provides us with the ability to manage access to the system network and data from our remote branches through the Secure Remote Access feature, ensuring a secure and confidential connection on the backend.
We have integrated One Identity Safeguard with our DevOps processes to assist in managing the parameters. Prior to the integration, we used to wait for certain automation related to security, either already completed or sometimes people would proceed without reporting. However, after the implementation, it has proven to be highly effective for security testing through automation at various stages, particularly in the pipeline, and for conducting critical analysis. This has significantly improved our understanding.
What is most valuable?
There are numerous valuable data protection features, including the content and information that offer us more scalable protection as needed.
We also have access to immediate support for situations that we are unable to handle.
What needs improvement?
Some of our users find the functionality a bit complex, and it could be made more user-friendly.
The integration of automation, security monitoring, and secure configuration can be enhanced. We can integrate these elements using Ansible or any other necessary tools. This would be advantageous in terms of time and effort saved during implementation, especially when dealing with merged branches. This approach will guarantee that the code is approved, tested, and verified, potentially resulting in substantial time savings.
For how long have I used the solution?
I have been using One Identity Safeguard for ten years.
How are customer service and support?
Premier Support is valuable because it enables us to receive prompt assistance whenever we encounter any type of issue.
How would you rate customer service and support?
Positive
How was the initial setup?
The time to deploy varies from a few minutes to several hours depending on the scenario.
We integrate security tests into our CI/CD pipeline for privileged users to ensure that these users are not affected.
Which other solutions did I evaluate?
We also assessed CyberArk, which is a more robust Privileged Access Management solution compared to One Identity Safeguard. However, it comes with a significantly higher cost.
What other advice do I have?
I would rate One Identity Safeguard an eight out of ten.
We conducted training sessions for all employees and managers in our company. The training was tailored to each person's skills in order to streamline the training process and facilitate the deployment procedures.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Consultant at a tech vendor with 11-50 employees
Monitoring features enhance infrastructure control but documentation and disaster recovery need improvements
Pros and Cons
- "From my experience, the features are best for monitoring and the usage of LDAP and SSH."
- "I find it complicated to implement HTTPS monitoring because the documentation is unclear."
What is our primary use case?
My main use cases include LDAP, SSH, and some utilization of HTTPS. My primary uses are LDAP and SSH.
What is most valuable?
From my experience, the features are best for monitoring and the usage of LDAP and SSH. I think One Identity should improve its documentation because it is vast and not clear, and clear documentation on implementing the solution would be advantageous for consultants. I find clear documentation helpful for clients and customers to achieve what they want.
What needs improvement?
I find it complicated to implement HTTPS monitoring because the documentation is unclear. The disaster recovery process is complicated for me. For some configurations on the SPS side, if I need to make changes, such as for DNS servers, I must redeploy the machine. Transparent Mode can be improved in newer versions, and the failover process is the most complicated for me.
For how long have I used the solution?
I have been working with this solution for the last two years.
What do I think about the stability of the solution?
The stability is consistent for me until a problem arises; then it becomes difficult. I encounter problems primarily with the failover procedure.
What do I think about the scalability of the solution?
Scalability is acceptable for me. If customer usage increases, I can add new appliances, but this incurs costs.
How are customer service and support?
I find the support good, but not excellent. When I open a ticket, resolutions can take a long time, and I sometimes need escalations to reach expertise.
How would you rate customer service and support?
Negative
Which solution did I use previously and why did I switch?
I always compare this solution with CyberArk. I feel CyberArk is not like a black box; it allows a lot of customization.
How was the initial setup?
The initial setup is not complex for me; it's straightforward. I would rate it a seven, as it takes me thirty to forty minutes per machine for deployment.
What about the implementation team?
I install the solution and offer the services to the end-users.
What was our ROI?
Any PAM solution, when I deploy it well and customers use it, leads to a return on investment. This is applicable not just to One Identity or CyberArk, but to any PAM solution that provides what customers need to achieve.
What other advice do I have?
It's about controlling what people are doing in their infrastructure. Overall, I would rate the product six out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer:
Last updated: Mar 2, 2025
Flag as inappropriate
Buyer's Guide
Download our free One Identity Safeguard Report and get advice and tips from experienced pros
sharing their opinions.
Updated: April 2025
Product Categories
Privileged Access Management (PAM) User Entity Behavior Analytics (UEBA) Non-Human Identity Management (NHIM)Popular Comparisons
CyberArk Privileged Access Manager
Delinea Secret Server
CyberArk Endpoint Privilege Manager
BeyondTrust Endpoint Privilege Management
WALLIX Bastion
BeyondTrust Privileged Remote Access
ARCON Privileged Access Management
ManageEngine PAM360
Delinea Privileged Access Service
Symantec Privileged Access Manager
senhasegura SaaS
Buyer's Guide
Download our free One Identity Safeguard Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- Why should one choose One Identity Safeguard and One Identity Active Roles for the banking and insurance industry?
- What is One Identity Safeguard's lower-level architecture scheme?
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- How was the 2020 Twitter Hack carried out? How could it have been prevented?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?
- Is BeyondTrust Endpoint Privilege Management really expensive compared to other tools or software?