We introduce One Identity Safeguard to customers, primarily Italian customers who need to partner with solutions that protect their target resources.
Senior Consultant at a tech vendor with 5,001-10,000 employees
Stable and has an easy-to-understand interface, even for people new to it
Pros and Cons
- "I like that One Identity Safeguard lets you configure the maximum number of connections to the target, a configuration I didn't find in its competitor."
- "Support for One Identity Safeguard could be improved because sometimes the support team doesn't have an answer or solution for some bugs. A feature I found in a competitor would make One Identity Safeguard better, and that is the ability to load balance the traffic in the target."
What is our primary use case?
What is most valuable?
What I like about One Identity Safeguard is its interface, which is easy to understand, even for people new to the product. I also like that the solution collects data without any access to the machine, plus it has a feature that lets people explore access to machines within a network.
Regarding the usability and functionality of One Identity Safeguard, the most common feedback I receive from users is that the solution is easy to use and can easily move data.
I also like that One Identity Safeguard lets you configure the maximum number of connections to the target, a configuration I didn't find in its competitor.
My customers use the transparent mode for privileged sessions in One Identity Safeguard, and it is easy to use, though it may be more difficult to configure. I haven't received any customer complaints about that feature, so it's not that difficult to use.
To start using One Identity Safeguard in terms of training for people who manage the solution and the end-users, my colleague and I took a course from One Identity. That training was enough for the basic features, but for some other features, my colleague and I had to create some tickets, though he and I know the database and processes. For users, it is easy because my company provides them with a two-page resource manual with screenshots. Then, I spent some time with the managers to show how One Identity Safeguard works, which is very easy because I've used the solution before.
The analytics interface of One Identity Safeguard is also easy to understand.
What needs improvement?
A feature I found in a competitor would make One Identity Safeguard better, and that is the ability to load balance the traffic in the target. For example, in two machines with some applications, I would like to balance traffic between the two machines with the help of One Identity Safeguard. It would be great if the solution allowed users to add some applications to a cluster and balance the traffic between the applications.
For how long have I used the solution?
I've been working with One Identity Safeguard for customers for six months.
Buyer's Guide
One Identity Safeguard
October 2024
Learn what your peers think about One Identity Safeguard. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
814,763 professionals have used our research since 2012.
What do I think about the stability of the solution?
Stability-wise, One Identity Safeguard is okay. It's been running for almost one year, and there's no problem with its stability, so, in terms of stability, it's a seven out of ten for me.
What do I think about the scalability of the solution?
The scalability, including the clustering for One Identity Safeguard, could be improved. It is fair right now, scalability-wise, and from an engineering perspective, it may not be as easy to do that because the appliance would have to be encrypted, and there's a security requirement. Still, it would be nicer if scalability could be improved in One Identity Safeguard.
How are customer service and support?
Support for One Identity Safeguard could be improved because sometimes the support team doesn't have an answer or solution for some bugs. Support-wise, it's an eight out of ten for me.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I used a different solution previously, but One Identity Safeguard could limit the maximum number of connections to a target. The other solution, on the other hand, could not do that but has a load-balancing feature.
How was the initial setup?
My company deploys One Identity Safeguard for customers, and I found the process easy.
What other advice do I have?
My customers use the One Identity Safeguard virtual appliances.
I have not used the Cloud Assistant feature of the solution.
I have not used the Remote Access feature for privileged users in One Identity Safeguard.
My company does not integrate the solution with any other parts of the business, such as development, operations, and RPA. It was just tested but not rolled out in production.
In terms of how the deployment of One Identity Safeguard affects privileged users may be a complex question because the customer didn't have a previous infrastructure. The customer is now building the infrastructure, so it's a dynamic environment. The customer doesn't have an old environment.
I'm a One Identity Safeguard integrator, and my company also resells it.
Regarding maintenance, usually, it's not required. Still, sometimes a user could complain about not being able to access passwords in One Identity Safeguard or that there is some misconfiguration I need to analyze, and in the end, the issue is with the target appliance and not One Identity Safeguard.
My rating for One Identity Safeguard is eight out of ten overall.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: Reseller
Solution Consultant at Quest Egypt Software
Good support, easy to use, and helpful for security and accountability
Pros and Cons
- "One of the most important things is that it is very easy to use and install. It is also agentless, so all of the operations happen more smoothly than any other product."
- "We would like to have the option of importing assets by using the CSV file. It was available in the earlier versions, but it is not available now."
What is our primary use case?
We use it to link our virtual systems. We have Windows and Linux, and we have some applications. We use One Identity Safeguard to connect to them. We also use Password Vault, and we do session monitoring.
I am one version behind the latest version. I usually wait before doing an update to make sure that there are no problems with the new release.
How has it helped my organization?
One Identity Safeguard helps with accountability. We now know which person is accessing which machine. It also helps to make sure that they are secured, and that everyone knows what changes they need.
We have used the transparent mode and non-transparent mode for privileged sessions. The transparent mode is more difficult than the normal mode, but with the help of the documentation, we figured out how to do the necessary configuration and use this mode. Generally, we use the normal mode. We do not use the transparent mode.
We use the Secure Remote Access feature for privileged users. It was very easy to manage remote access for privileged users by using this feature. When our users cannot be physically present at our place, they can access the resources using the Starling account. It is easy.
The Secure Remote Access feature does not make use of a VPN. This is very important for us because there are some problems with using VPN, so it is easier to use something like Starling. We can be sure that our users can access the network even from home and that the sessions are secure.
I have worked with other One Identity solutions. I have used One Identity Defender, One Identity SPP, and One Identity SPS. They worked very well for our users. We also use the authentication service to control the Linux machines with Active Directory accounts. They work well with each other. I have also used Safeguard Remote Access. I tried its features with Safeguard to allow our users to connect to the sessions by using the cloud so that they do not need to log in to the company servers.
What is most valuable?
One of the most important aspects is that it is very easy to use and install. It is also agentless, so all of the operations happen more smoothly than any other product. Our end-users find it easy. They have a web application. They only need to enter the credentials, and they can access the Safeguard session. They can use it very fast without any problems. Its learning curve is very low.
What needs improvement?
We can discover Windows and Linux machines, but we would also like to discover databases. It is very important for us. I have heard that in the new version, we can discover databases, but I have not tried it yet, so I am not sure if the new version does it properly or still needs some work.
We would like to have the option of importing assets by using the CSV file. It was available in the earlier versions, but it is not available now.
For how long have I used the solution?
I have been using this solution for about two years.
What do I think about the stability of the solution?
It is very stable. They always release new updates if there are any issues. For example, for the Log4j issue that happened a couple of months ago, they released an update to solve the issue and make sure that no user is affected by it. It is based on the Linux machine, so it is very stable.
What do I think about the scalability of the solution?
I did not face any problems. It is very scalable, and it can be used for a small company or a big company without any problems.
Currently, there are about 20 users who are using it.
How are customer service and support?
We have used their regular support, not the premier support. When we have any problems related to it, we open a ticket. They always help us. We might have to provide them with additional things so that they are able to troubleshoot better, but they are always helpful. I would rate their support a 9 out of 10.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did not use any other solution.
How was the initial setup?
The initial setup is straightforward. We have two installation types. We have Safeguard for Privileged Passwords and Safeguard for Privileged Sessions. For Safeguard for Privileged Passwords, we just need to import and the whole organization will be done. The process for Safeguard for Privileged Sessions is also simple. There are no problems.
The deployment duration depends on the number of systems, the number of users, and the number of applications. In a small company, it might take about two weeks or three weeks.
The deployment did not affect our privileged users. We just needed some time to get used to it. We were not using any PAM product before, so it took some time to get used to using it. It is more restrictive than the Active Directory system, but it is for the best.
For managing and deploying the solution, I took technical training. It was about five-day training with One Identity. After that, I started its deployment. In case of any problem, we could check several resources. We could check the administration guide or forums. We could also open a support ticket with One Identity. For the end-users, I gave the training, and it took one or two days at the most.
What about the implementation team?
I deployed it myself.
Which other solutions did I evaluate?
We checked out a couple of solutions, but I was not a part of the selection process.
What other advice do I have?
It is a very easy solution. In case of any problem, you can contact the distributor or the vendor, and they will help you.
I have worked with physical and virtual appliances. We went for virtual appliances because they are easy for us. We have servers in our company, so we have the space and resources to install them.
I would rate One Identity Safeguard a 10 out of 10. I have used it for some time, and I enjoyed working with it.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: Reseller
Buyer's Guide
One Identity Safeguard
October 2024
Learn what your peers think about One Identity Safeguard. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
814,763 professionals have used our research since 2012.
Chief Information Security Officer at Outscale
Provides all the information that we need for an investigation, but the interface needs more organization
Pros and Cons
- "We use the solution’s “transparent mode” feature for privileged sessions. It is very easy because it is only a simple configuration for our users. We don't have to modify our network. We install it, configure it, and it works. So, it is super easy. The rollout for our users is seamless."
- "The interface is better now, but it still could be improved a lot. It needs more organization, menus, automatic refresh of information, and Web 2.0."
What is our primary use case?
We are using the virtual appliance. We are a cloud company working widely with virtualization. We provide virtual machine to our customers. When we deploy a new solution, we try to use our system to show our customers that it works for them. That is why we are using a virtual appliance which validates the usage.
For now, we are using it for traceability of access inside the platform because we are a certified company: ISO 27001, SecNumCloud, HDS... We use this solution to monitor the session of our administrator and also to capitalize on incidents. When you have an incident in the night and our Level 3 people are working on it, they don't have the time to document all they do on the platform. The main goal is to have the service up as fast as possible. We are now recording the session, and the morning after the incident, we can see the session and understand what has been done to resolve the incident.
We are using the latest version of Safeguard.
How has it helped my organization?
When we are asked to do an investigation for a server, we have all the information that we need. We never have any problems as all the information is available to us.
What is most valuable?
The transparent proxy is the most valuable feature. When you are connecting to a server inside the platform, the user doesn't need to change their habit. They just have to make small configurations to their workstation, then it is transparent for them. Our users like the solution because it's transparent. Users doesn't need to have interaction with 3DS OUTSCALE IT or security team to work as usual. It's interesting for the users because they don't have to think, "I have to note all that I've done during the incident to remember it".
We use the solution’s “transparent mode” feature for privileged sessions. It is very easy because it is only a simple configuration for our users. We don't have to modify our network. We install it, configure it, and it works. So, it is super easy. The rollout for our users is seamless.
The "transparent mode" allows for better visibility. With its monitoring, we can do investigations which are good for us and improve our system.
What needs improvement?
The interface is better now, but it still could be improved a lot. It needs more organization, menus, automatic refresh of information, and Web 2.0.
An official HashiCorp Vault connector would be very helpful inside the platform.
SSH implementation is not 100% compatible with standard SSH (openssh). For example : JumpHost.
As a result, some options require manual tunning, and complicated user-side configs, where it could be much simpler
For how long have I used the solution?
We have been using it for a long time: six years.
What do I think about the stability of the solution?
It is very stable. We have never had incidents with it. When we lost a connection with our Active Directory, the system continued to work. When we lost the storage on the virtual appliance, we restarted it, then it was fine. Thus, the product is very stable.
One or two people are needed for deployment and maintenance. For the deployment, it's done by the security team for now. However, in the near future, it will be managed by the operations team.
We upgrade about every two months the latest version.
What do I think about the scalability of the solution?
We don't use the scalability. When we need a new appliance, we deploy it inside another network. We don't need scalability for now, but if we grow quickly, we will need to think about it.
We have about 50 users inside the company, including the security team, operations team, infrastructure team, and Level 1 support.
We are using 75 percent of the parallel session unless there is an incident, then we can use all the slots.
How are customer service and technical support?
I used the technical support once. It was good. I had the answer to my question quickly. I have direct access to the pre-sales team and my account manager. So, I called in and my problem was solved.
Which solution did I use previously and why did I switch?
Yes but we had to quit it because they didn't have what we needed and it was very expensive.
How was the initial setup?
In the beginning six years ago, we started with a small instance. We used it very simply and learned how to manage it.
With the newest version that we massively deployed, we had one week to know how to install it and how it works. Now, we know how it works very well.
Install is fairly simple, with basic options.
Configuration requires a little explanation on the way it works but is straightforward too.
What about the implementation team?
We deployed it ourselves.
What was our ROI?
We have seen ROI in terms of time. It's easier for us to investigate incidents, which is helpful. It has improved our performance with investigations. It used to take a month to write an incident. Now, it takes us a week, cutting the time down by a fourth.
What's my experience with pricing, setup cost, and licensing?
Our licensing costs are on a yearly basis.
Which other solutions did I evaluate?
We evaluated CyberArk, which was pretty good, but it is very expensive. CyberArk's interface was better. Also, CyberArk's login was not so transparent. We chose One Identity because it has a transparent login in interruption in the network.
What other advice do I have?
When you use Safeguard in production, it provides traceability and protection around your platform.
I would rate the solution as a seven (out of 10) because of the interface.
I have seen the future of analytics, and it's very interesting. I hope to have the time to try and learn something about that.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Head of Department of Technical Means of Protection at BrokerCreditService
Visualizes RDP sessions and logs SSH sessions
Pros and Cons
- "The solution transparently integrates into the infrastructure and users do not notice it. I would give this feature the highest rating."
- "I would like to see support for RDP over HTTPS so this product can be used in conjunction with the Microsoft terminal."
What is our primary use case?
We use this solution to control the access of privileged users, such as application administrators, to the internal network. This solution allows us to record and log user sessions.
We use virtual appliances on the VMware platform. The virtualization of such services allows us to flexibly scale our hardware configuration and gives significantly more opportunities for building a stable structure.
How has it helped my organization?
This solution allowed us to provide remote access to the company's internal infrastructure in the context of the COVID-19 pandemic. It made this access more transparent and controlled for information security departments.
We easily integrated this product with our SIEM system for collecting events. Thanks to this integration, we were able to build convenient, regular reports on privileged user connections. Therefore, our information security units can better see who is connecting to the remote infrastructure.
What is most valuable?
The most valuable feature is the logging sessions with their visualization, which is video recording. This functionality allows us to restore the actions of a user in the event of any incidents.
The solution transparently integrates into the infrastructure and users do not notice it. I would give this feature the highest rating.
While the "transparent mode" feature did not affect the monitoring in any way, it led to an increase in the convenience of connecting users.
This solution visualizes RDP sessions and logs SSH sessions.
What needs improvement?
I would like to see support for RDP over HTTPS so this product can be used in conjunction with the Microsoft terminal.
I would like to visualize SSH sessions.
I would like built-in traffic balancing mechanisms with the built-in load balancing mechanism when using several instances.
For how long have I used the solution?
About four years.
What do I think about the stability of the solution?
Over four years of use, we have not encountered a single system crash or failure. The product is stable.
What do I think about the scalability of the solution?
When increasing the number of users, we can rather easily add to virtual appliances processors and memory, or disks for storing records, which is more difficult to do on a hardware (physical) appliance.
We have two administrators involved in the deployment, configuration, and maintenance of this solution. During the peak of the pandemic, we had up to 3,000 users connected through the solution and able to work from home.
How are customer service and technical support?
We have used One Identity’s tech support. I would rate it as excellent. They answer all the questions asked of them quickly and efficiently.
Which solution did I use previously and why did I switch?
We did not previously use a different solution.
How was the initial setup?
The virtual appliance is deployed from the delivered image without any problems. The setup takes about 15 to 20 minutes, including initial setup and configuration. It also is available to any admin user with Unix competencies.
We use the “transparent mode” function to connect administrative users via SSH to the Unix servers. We did not encounter any problems when setting up this feature, as everything was easy. The solution is well-documented and quite understandable when setting up.
It took about one or two working days to administer the solution, read the documentation and settings, and test various configuration options. It was not very difficult. For our users, there were no special nuances since the connection is transparent. They do not understand nor see that they are connecting through the One Identity Safeguard space.
Our implementation strategy was to use this solution to control remote sessions of privileged users, first with our IT support staff. Now, we use the product for this purpose. In general, the strategy was a success.
What was our ROI?
There has been a lack of losses, since controlling the actions of privileged users is primarily to minimize risks and create an absence of losses.
What's my experience with pricing, setup cost, and licensing?
Licensing and pricing are quite straightforward. The number of recording channel licenses depends on the needs of the customer. I would suggest estimating the number of concurrent sessions per unit of time and proceed from there when purchasing a license.
Which other solutions did I evaluate?
We evaluated Safeguard and another product. We ultimately chose Safeguard.
Safeguard is an external (in relation to controlled systems) solution which allows you to record sessions. Its competitor was an agent solution that was put on target servers. With the competitor's solution, there was a risk of disconnecting of a privileged user's recording.
What other advice do I have?
Clearly assess your needs and formulate the necessary requirements, then proceed from there with the selection of an appropriate solution. In our case, One Identity Safeguard became this solution. However, this solution is not a panacea for all ills. It is possibly you’ll find that a different solution is more suitable.
I would rate the solution as a nine (out of 10). In order to rate it as a 10, it should have what I would like to see in its coming new releases.
Foreign Language: (Russian)
Как и для чего вы используете этот продукт?
Мы используем это решение для контроля доступа привилегированных пользователей, таких как администраторы приложений, к внутренней сети. Это решение позволяет нам записывать и регистрировать пользовательские сессии.
Мы используем виртуальные устройства на платформе VMware. Виртуализация таких сервисов позволяет нам гибко масштабировать конфигурацию нашего оборудования и предоставляет значительно больше возможностей для построения стабильной структуры.
Как это помогло моей организации?
Это решение позволило нам обеспечить удаленный доступ к внутренней инфраструктуре компании в контексте пандемии COVID-19. Это сделало этот доступ более прозрачным и контролируемым для отделов информационной безопасности.
Мы легко интегрировали этот продукт с нашей системой SIEM для сбора событий. Благодаря этой интеграции мы смогли создавать подходящие регулярные отчеты о привилегированных пользовательских соединениях. Поэтому наши подразделения информационной безопасности могут лучше видеть, кто подключается к удаленной инфраструктуре.
Какие функции вы нашли наиболее ценными?
Наиболее ценной функцией является регистрация сеансов с их визуализацией, то есть запись видео. Эта функциональность позволяет нам восстанавливать действия пользователя в случае каких-либо инцидентов.
Решение прозрачно интегрируется в инфраструктуру, и пользователи этого не замечают. Я бы дал этой функции самый высокий рейтинг.
Хотя функция «прозрачного режима» никак не повлияла на мониторинг, она привела к увеличению удобства подключения пользователей.
Это решение визуализирует сеансы RDP и регистрирует сеансы SSH.
Что нуждается в улучшении?
Я хотел бы видеть поддержку RDP через HTTPS, чтобы этот продукт можно было использовать вместе с терминалом Microsoft.
Я хотел бы визуализировать сессии SSH.
Я хотел бы использовать встроенные механизмы балансировки трафика со встроенным механизмом балансировки нагрузки при использовании нескольких экземпляров.
Как долго я использую этот продукт/решение?
Около четырех лет.
Что я думаю о стабильности этого продукта/решения?
За четыре года использования мы не встретили ни одного сбоя или сбоя системы. Продукт стабилен.
Что я думаю о масштабируемости решения?
Увеличивая количество пользователей, мы можем довольно легко добавить к виртуальным устройствам процессоры и память или диски для хранения записей, что труднее сделать на аппаратном (физическом) устройстве.
У нас есть два администратора, участвующих в развертывании, настройке и обслуживании этого решения. В разгар пандемии у нас было до 3000 пользователей, подключенных через решение и способных работать из дома.
Как бы вы оценили техническую поддержку этого продукта/решения?
Мы использовали техническую поддержку One Identity. Я бы оценил это как превосходное. Они отвечают на все заданные вопросы быстро и качественно.
Какое решение я использовал ранее и почему я переключился?
Ранее мы не использовали другое решение.
Как прошла начальная настройка?
Виртуальное устройство развертывается из доставленного образа без каких-либо проблем. Настройка занимает от 15 до 20 минут, включая первоначальную установку и настройку. Он также доступен для любого администратора с компетенцией Unix.
Мы используем функцию «прозрачного режима» для подключения административных пользователей через SSH к серверам Unix. При настройке этой функции проблем не возникало, так как все было просто. Решение хорошо документировано и вполне понятно при настройке.
Потребовалось около одного или двух рабочих дней для администрирования решения, ознакомления с документацией и настройками, а также для тестирования различных вариантов конфигурации. Это было не очень сложно. Для наших пользователей особых нюансов не было, так как подключение прозрачно. Они не понимают и не видят, что они соединяются через пространство One Identity Safeguard.
Наша стратегия внедрения заключалась в том, чтобы использовать это решение для управления удаленными сеансами привилегированных пользователей, в первую очередь с нашей службой поддержки Информационных Технологий. Теперь мы используем продукт для этой цели. В целом стратегия имела успех.
Какой была была ваша прибыль на инвестиции в One Identity Safeguard?
Мы не испытали никаких потерь, поскольку контроль действий привилегированных пользователей в первую очередь сводит к минимуму риска и создает отсутствие потерь.
Какой у меня опыт работы с ценами, стоимостью установки и лицензированием?
Лицензирование и ценообразование довольно просты. Количество каналов регистрации лицензий зависит от потребностей заказчика. Я бы посоветовал оценить количество одновременных сеансов за единицу времени и перейти оттуда к покупке лицензии.
Прежде чем выбрать этот продукт, вы оценивали другие варианты?
Мы оценили Safeguard и другой продукт. В конечном итоге мы выбрали Safeguard.
Safeguard - это внешнее (по отношению к управляемым системам) решение, которое позволяет вам записывать сессии. Его конкурентом было агентское решение, которое было размещено на целевых серверах. С решением конкурента был риск отключения записи привилегированного пользователя.
Какой еще у меня совет?
Четко оцените свои потребности и сформулируйте необходимые требования, а затем приступайте к выбору подходящего решения. В нашем случае One Identity Safeguard стал таким решением. Однако это решение не является панацеей от всех болезней. Возможно, вы обнаружите, что другое решение более подходит.
Я бы оценил решение как девять (из 10). Чтобы оценить его как 10, у него должно быть то, что я хотел бы видеть в его будущих новых выпусках.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Consultant at a manufacturing company with 11-50 employees
Bulk import with templates is helpful, but some competitors' products are better
Pros and Cons
- "I like the discovery functionality and the change password feature through the check-in. I also like the bulk import with the help of templates that come with it out of the box. With the help of these few features, my tasks are made easier."
- "The main thing that needs improvement is the slowness. Apart from that, the change password check-in feature also needs improvement because it is not working perfectly accurately."
What is our primary use case?
We use Safeguard for managing privileged passwords only, using physical appliances.
How has it helped my organization?
So far, I haven't seen any type of improvement from using this solution when compared with other products in the identity and access management space. It has been neutral.
What is most valuable?
I like the discovery functionality and the change password feature through the check-in. I also like the bulk import with the help of templates that come with it out of the box. With the help of these few features, my tasks are made easier.
We also use the Secure Remote Access feature for privileged users. Access is based on group membership and with that membership they connect to the remote machine. It's an easy process to manage.
What needs improvement?
The main thing that needs improvement is the slowness. Apart from that, the change password check-in feature also needs improvement because it is not working perfectly accurately.
For how long have I used the solution?
I have been using One Identity Safeguard for the last two and a half years. I work as an implementer and provide support operations to our clients.
What do I think about the stability of the solution?
It's not a stable solution, but it's not bad. It's neutral in terms of stability.
What do I think about the scalability of the solution?
It's not scalable.
How are customer service and support?
We are not using their Premier Support, but I am okay with the vendor's regular support. But if the product is running on an unsupported version, that is a very negative point. They should support unsupported versions as well so that their customers are not stuck somewhere in between.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
As an organization, we are using other PAM solutions for other projects, but I'm not sure which other solutions are in use.
How was the initial setup?
The initial setup for Safeguard is straightforward. Because it was deployed a long time ago in our organization, before my tenure, my expertise is based on adding to clusters. If we are going to add clients within a cluster, it depends on the speed, meaning how the network connectivity is between the cluster and the target device.
In terms of the effect of deployment on users, they are provisioned, with the help of group membership, into Safeguard. Once they are assigned to a particular group, they can follow the previous sites. Based on the previous site, they can log in and check out the password of their privileged account.
As for the amount of training needed, it depends on the solution. If the solution is only for privileged passwords, about three weeks' training is required to understand the solution. And if the server for privileges is also integrated with the solution, it will take a month or as much as 45 days.
We have an implementation team and an operations team. Between them, there are a total of five or six people required for this solution to deploy and maintain it.
What's my experience with pricing, setup cost, and licensing?
I'm not aware of the product cost, but if it's going to cost more, first they have to maintain and stabilize the product.
What other advice do I have?
My impression of the form factor of the Safeguard physical appliance is not good and not bad. It's neutral. Similarly, feedback about the usability and functionality is neutral.
My advice, if you have the budget, is to buy other products, like CyberArk Privileged Access Manager or BeyondTrust Endpoint Privilege Management. If you don't have that kind of budget you can use this product.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Security Business Consultant at a tech services company with 201-500 employees
Defines and updates processes and procedures into the security framework of a company
Pros and Cons
- "Safeguard can define and update processes and procedures into the security framework of a company, including mobile. It allows us to change the policies and configurations on a mass scale in regards to security."
- "I just received a question from a customer in regards to a connection with Oracle OID. I tried to integrate Safeguard with the Oracle YAML as well as something else to manage the groups and users from a different system, like AD or LDAP. This one feature could be better. At this moment, the platform system can only use the integration with LDAP or AD. The software for research and development to create a connector to a YAML platform can be very complicated."
What is our primary use case?
We primarily use the solution to manage passwords and use for the RDP access.
Our infrastructure is three SPPs and two SPSs. This is across 1,000 users and approximately 500 targets.
How has it helped my organization?
Safeguard can define and update processes and procedures into the security framework of a company, including mobile. It allows us to change the policies and configurations on a mass scale in regards to security.
What is most valuable?
The most interesting thing about this product is it is very easy to implement and configure as well as its usability. Also, for the final user, the work experience doesn't change when using the SPS for the Linux administrator, which is fantastic. You change only a little bit of the connection. Everything else is really easy.
What needs improvement?
I just received a question from a customer in regards to a connection with Oracle OID. I tried to integrate Safeguard with the Oracle YAML as well as something else to manage the groups and users from a different system, like AD or LDAP. This one feature could be better. At this moment, the platform system can only use the integration with LDAP or AD. The software for research and development to create a connector to a YAML platform can be very complicated.
For how long have I used the solution?
I started using it two years ago.
What do I think about the stability of the solution?
It is a very stable system. There are no problems when using the platform.
What do I think about the scalability of the solution?
The scalability is fantastic. It is very easy to connect and use the solution, if you need it.
How are customer service and technical support?
There are two different supports: one for SPS and another for SPP. The technical preparation of the support is very high. They have very quickly given me the solution for a couple of issues that I have seen.
Which solution did I use previously and why did I switch?
We switched from CyberArk to Safeguard. In order to manage CyberArk, it is a very big effort. The platform is very complex. The management system of Safeguard is very easy. Also, the configuration for the targeted user is easier in Safeguard rather than CyberArk. Lastly, the cost of CyberArk's licensing is very expensive.
How was the initial setup?
We try to understand what the customer needs in order to fit the solution for what they want, then we plan all the activities based on that.
What about the implementation team?
We can deploy the system in a couple of days, then the system is up and running. The next step is importing the whole system. The time frame of this depends on many targets the customer has, but it doesn't take too long.
What was our ROI?
I work at a system integrator, designing and implementing the solution for our customers. I think our customers see a return of the investment using this solution.
What's my experience with pricing, setup cost, and licensing?
Safeguard is cheaper than CyberArk.
What other advice do I have?
It is a good solution. There is no limit to its usage in a company, e.g., IT or financial.
Check the basic rules in the documentation because the solution is easy to use.
I would rate the solution as 10 out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: System Integrator
Head of Information Security at a financial services firm
Enables us to implement encryption protocols across channels
Pros and Cons
- "The most unique and valuable features are the upstream and downstream throughput capacities; the Safeguard platform provides agile integration. In actuality, all the features are valuable. They're good, user-friendly."
- "Our experience with technical support has been disappointing. We require more prompt and faster response times. We require answers to our questions right away but we haven't received that level of support."
What is our primary use case?
The primary use case for our One Identity Safeguard solution is to optimize security across private accounts, accounts which can be secured upstream and downstream. The solution enables us to implement encryption protocols across channels. It is designed so that depending on the cryptographic case, different policies can be applied in correlation.
How has it helped my organization?
I don't think it's improved our organization internally. I've had to suspend workflows and focus my time and attention on creating technical, instructional, documentation regarding user procedures and practices.
What is most valuable?
The majority of the features offered with this solution are the same as with other similar systems. The most unique and valuable features are the upstream and downstream throughput capacities; the Safeguard platform provides agile integration.
In actuality, all the features are valuable. They're good and user-friendly.
What needs improvement?
The technical support for this solution needs to be immediate, intuitive, and responsive especially as it refers to supporting ticket submissions and processing.
Furthermore, we've had trouble understanding how certain policy framework applies. I would like to see clearly laid out policies or better support and explanations around policy dynamics.
The stability and downtime of the solution could also be upgraded to include a messaging function which would give users a clear understanding of what's happening without having to navigate to a particular section of the page.
Lastly, I would also like to see the price reduced.
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
It's very stable. There are about 150 users, mostly administration, currently using this solution in our company. We don't encounter many problems with the system.
What do I think about the scalability of the solution?
I am encountering issues when it comes to the scalability of the solution.
How are customer service and technical support?
Our experience with technical support has been disappointing. We require more prompt and faster response times. We require answers to our questions right away but we haven't received that level of support.
How was the initial setup?
The initial setup was very easy. We followed the given instruction protocol. We also used white papers when necessary for clarification and better understanding. It only took us one month to implement.
What about the implementation team?
We used an integrator for the deployment. It was a good experience.
What's my experience with pricing, setup cost, and licensing?
Setup cost, pricing and licensing are all very expensive.
What other advice do I have?
We are very pleased with the Safeguard platform feature. You can't find this technology anywhere else.
On a scale from one to ten, one being the worst and ten being the best, I would give this product a nine rating. If the technical support was better I'd give it a 10 out of 10.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
IDM Architect at a tech company with 10,001+ employees
Extensible authentication framework enables use-case-dependent MFA
Pros and Cons
- "The extensible framework for authentication is one of the most valuable features. We use an MFA plug-in and a lot of different factors, depending on what the business use-cases are. And of course, the auditing functionality is also valuable."
- "Even though we have two nodes, there's no way to do an upgrade without taking everything completely offline. It would be nice if they could improve that."
What is our primary use case?
We use Safeguard for privileged sessions. It's primarily used as a solution for accessing our production environments.
How has it helped my organization?
We were able to take an environment where we had several hosts managed by different people and consolidate that into a single, centrally managed solution.
What is most valuable?
The extensible framework for authentication is one of the most valuable features. We use an MFA plug-in and a lot of different factors, depending on what the business use-cases are. And of course, the auditing functionality is also valuable.
We have also found the solution to be extensible through cloud-delivered services. It's worked out well. The SPS instances we use are located on-premise, but we can still utilize them to access resources in the cloud. That's not a problem. We haven't deployed any SPS itself in the cloud, but it works fine for our cloud environments.
What needs improvement?
Feature-wise, right now, it has most of the features that we're looking for. It could improve a bit on the management side of things. One example would be when doing an upgrade. We have a highly-available appliance spare, and even though we have two nodes, there's no way to do an upgrade without taking everything completely offline. It would be nice if they could improve that.
What do I think about the stability of the solution?
The product has generally been stable. We have had some issues, mainly due to the types of traffic. Our end-users are doing different things through SSH tunnels that were not expected on the appliance. We've been working with support to resolve that.
What do I think about the scalability of the solution?
The product is scalable.
How are customer service and technical support?
Tech support has been great. They've been responsive and knowledgeable, so we've been happy with them.
How was the initial setup?
It took us about three or four weeks for the initial setup and deploy. Part of that was developing a plug-in for the multi-factor authentication. We were able to do it in a way that wasn't disruptive, with our current infrastructure. At their discretion, the end-users were allowed to move over, one-by-one. After we deployed it, it took about two months for all of the users to actually migrate over to using it.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free One Identity Safeguard Report and get advice and tips from experienced pros
sharing their opinions.
Updated: October 2024
Popular Comparisons
Cisco Identity Services Engine (ISE)
CyberArk Privileged Access Manager
IBM Security QRadar
SailPoint Identity Security Cloud
Fortinet FortiAuthenticator
Delinea Secret Server
Securonix Next-Gen SIEM
CyberArk Endpoint Privilege Manager
BeyondTrust Endpoint Privilege Management
WALLIX Bastion
BeyondTrust Privileged Remote Access
ARCON Privileged Access Management
ManageEngine Password Manager Pro
Delinea Privileged Access Service
Buyer's Guide
Download our free One Identity Safeguard Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- Why should one choose One Identity Safeguard and One Identity Active Roles for the banking and insurance industry?
- What is One Identity Safeguard's lower-level architecture scheme?
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?
- Is BeyondTrust Endpoint Privilege Management really expensive compared to other tools or software?
- What is the difference between PAM and PAS?