Overview
One Identity Safeguard for Privileged Passwords automates, controls and secures the process of granting privileged credentials with role-based access management and automated workflows. Deployed on a hardened appliance, Safeguard for Privileged Passwords eliminates concerns about secured access to the solution itself, which helps to speed integration with your systems and simplifies management. Plus, its user-centered design means a small learning curve and the ability to manage passwords from anywhere and with nearly any device. The result is a privileged password management solution that secures your enterprise and enables your privileged users with a new level of freedom and functionality.
Highlights
- Release control - Manages user password requests via a secure web browser connection with support for mobile devices.
- Discovery - Quickly discover any privileged account or system on your network with host, directory and network-discovery options.
- Approval Anywhere - Leveraging One Identity Starling, you can approve or deny any request without being on the VPN.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Financing for AWS Marketplace purchases
Pricing
Vendor refund policy
All fees are non-refundable and non-cancellable except as required by law.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Additional details
Usage instructions
Right click Safeguard AWS image. Select "Launch" Select you preferred disk size. For testing 100Gb is fine. For production environments, you will want 1Tb or greater. Choose your preferred network NIC/network etc. review and accept Image will deploy. You can see a progress of the image that is deploying by navigating to the deploying image, "right-click instancesettings -> Get System Log. Instance will deploy and then Safeguard will deploy. This will take several minutes. System log will show the percentage of Safeguard deploy progress. Finished when reaches 100% Compete instructions: https://support.oneidentity.com/technical-documents/one-identity-safeguard-for-privileged-passwords/7.0%20lts/appliance-setup-guide/4#TOPIC-1820747Â
Resources
Vendor resources
Support
Vendor support
One Identity offers an extensive range of services from online resources, 24x7 and premier support. One Identity support provides solution support to suit any business organization.
https://support.oneidentity.com/essentials/support-offeringsÂ
Contact support at
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products

Customer reviews
Automated offboarding has cut audit effort and now streamlines quarterly access reviews
What is our primary use case?
My main use case for One Identity Safeguard is streamlining the employee offboarding and making sure that when someone leaves the firm, all their access across the Active Directory and the Microsoft 365 and a couple of SaaS apps gets revoked automatically within minutes instead of chasing tickets for days. That has been the biggest day-to-day win for me. We also use the privileged access piece for a handful of admins, but offboarding is where it saves the most headaches.
One feature that I genuinely love about One Identity Safeguard that nobody talks about is the access certification campaigns. Every quarter, I have to run a manager review for all M365 and Salesforce entitlements. Earlier, it was me exporting spreadsheets and chasing people for weeks. Now I just launch a 10-second campaign in One Identity Safeguard and managers get a clean list in their inbox with keep, revoke, and reassign buttons. Almost all of them finish it in just two days. Anything untouched after 10 days gets auto-revoked. In the last campaign, we reclaimed about 20 to 30 unused enterprise licenses which are worth real money. That one feature alone pays for the tool every year.
What is most valuable?
A quick specific example of how the offboarding works in practice with One Identity Safeguard is that last month, we had a sales rep, Sarah, resign on a Friday afternoon. HR marked her termination date and last working day in our HRIS. The moment HRIS automatically published the termination event to One Identity Safeguard, the offboarding workflow triggered in One Identity Safeguard within about 90 minutes. It instantly disabled her AD account and converted her mailbox to shared and removed all from the Microsoft 365 Teams and revoked her licenses and also pulled her accounts from the Salesforce and Slack using the pre-built API integration. For the two apps that do not have connectors, it auto-created revocation tickets in ServiceNow and assigned them to the app owners with exact instructions. By Monday morning, when she would have normally handed in her laptop, literally everything was already locked down. There was no manual checklist and no forgotten access moments.
Two things that I actually use a lot with One Identity Safeguard are that we have contractors that come and go every few months and I just drop their start and end dates into a Google Sheet. One Identity Safeguard picks it up nightly and auto-provisions on day one, and it fully de-provisions on day nine. There are no more situations where contractors still have access three months later. The self-service break-glass feature is invaluable.
The self-service break-glass privileged elevation in One Identity Safeguard helps me greatly with my workflow. When our sysadmin is on vacation and I need to jump into a server really quick, I request temporary elevation right from the portal. I get it for four hours with full MFA plus manager approval too, and it auto-revokes and logs everything. There is no more sharing the domain admin password in a vault note. That is what I live in on a day-to-day basis besides offboarding.
When we switched to these access certification campaigns in One Identity Safeguard, my team responded with zero pushback and everybody loved it. During the first campaign, I was really nervous, so I sent a 30-second Loom video showing how to click the three buttons, and managers knocked it out in under five minutes each. I got Slack messages saying this was the easiest cert they had ever done and asking to never go back to Excel. Now they actually remind me when the next one is due. It flipped from another audit to done before coffee, and I am very happy with that.
What needs improvement?
I wish more people knew about the Identity Analytics dashboard in One Identity Safeguard, which actually flags shadow admin accounts and risky entitlements automatically. Twice it caught old service accounts that still had global admin in Azure because someone forgot to clean up after a migration, which saved us from audit findings. The UI for building custom workflows is a bit clunky. Drag-and-drop would be a nicer thing to have. It works, but I always have to open documentation for syntax. Everything else is solid.
Fixing the UI for building custom workflows would make my experience 10 out of 10.
For how long have I used the solution?
I have been working in my current field for the past 1.5 years.
How was the initial setup?
For training to start using One Identity Safeguard, for me as the admin, it requires literally two half-day remote sessions with their onboarding engineer, plus I played around in the sandbox for a couple of hours. After that, I was live. For managers and end-users, there was zero formal training. The managers just get the certification emails with three big buttons, and employees only see the self-service elevation portal if they need it. It is one-click plus MFA. The full company was comfortable in under a week.
The deployment of One Identity Safeguard took exactly three weeks for my organization. Most of that was just testing and tweaking the approval rules. The actual technical deployment was done in under five business days.
What about the implementation team?
The integration with ServiceNow and Azure using One Identity Safeguard was super easy. ServiceNow was literally just plug and play, and their certified app took about 20 to 30 minutes, and it just worked. On Azure, I just had to allow list IPs and drop the lightweight connectors on one jump box. The only tiny hiccup was Azure needed a PAT with extra scopes for the first time, but their support guys fixed it in just a 10-minute call. Overall, it was super easy and I faced no real roadblocks.
What was our ROI?
I have seen a return on investment with One Identity Safeguard. We have definitely seen a massive return. In terms of time savings, offboarding used to take me, on average, four hours per employee between all the manual ticket chasing and verification. With around two employees leaving per month, that is eight hours a month I get back from that one process. Access reviews used to take me a full week of my time every quarter to prepare spreadsheets, chase managers, and manually revoke access. Now, it is about two hours total to set up the campaign and review the results. That is a saving of 38 hours per quarter or about 152 hours a year. At my blended rate, that is nearly $10,000 in saved productivity costs. On direct cost savings, those access reviews helped us reclaim about 25 unused enterprise licenses last quarter. At an average of $50 a month, that is $1,250 a month or $15,000 a year saved right there, which is almost double what we pay for the tool. Risk reduction is harder to quantify, but avoiding one breach or one failed audit because of a lingering privileged account is worth way more than the $8,000 a year we pay. The ROI is massive. It basically pays for itself in the first month from the time savings alone.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing for One Identity Safeguard is that we are a 350-seat company and pay roughly $22 per user per year on a three-year deal. This came out to about $7,800 a year total. There were no surprise overages, no workflow or poor connector fees. Everything we use is included in a flat rate, and I am really very satisfied with the pricing. The cost is really low and I am able to get my ROI.
What other advice do I have?
The deployment of One Identity Safeguard did not disrupt my privileged users at all. It was actually smooth. We rolled it out in phases. In week one, we ran everything in silent monitor-only mode with no changes, just watching what could have been done. In week two, we turned on offboarding for a pilot group of 20 people with no privileged impact yet. In week three, we enabled just-in-time elevation for the five admins. The admin's day-to-day did not change until they needed privileged access. Then instead of using their permanent high-privileged accounts or the shared DA password, they just click "elevate" in the portal and got temporary rights for four to eight hours, and everything auto-dropped when time was up. The only complaint was that the first two times, they forgot to request elevation and got access denied. They laughed it off, but after that, there were no outages, no angry calls, and no productivity dip. They actually preferred it now because everything is audited and they are not permanently over-privileged.
I have integrated One Identity Safeguard with ServiceNow where any access request or revocation outside the automatic stuff goes through ServiceNow workflows. I also push joiner, mover, leaver events into Slack via webhook, so the #it-announcements channels get a one-liner whenever someone's access changes. There is nothing with RPAÂ yet, but the ServiceNow plus Azure pieces are in production and rock solid.
I would rate my overall experience with One Identity Safeguard as an 8 out of 10.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Automated session control has protected privileged access and improved password security
What is our primary use case?
Our main use case for One Identity Safeguard is access management and session management for our privileged users.
A specific example of how we use One Identity Safeguard for privileged users involves our integration with OneLogin , which is another product by One Identity. When our privileged users sign up with OneLogin , we provide them with all the necessary details about their session, and we monitor their activities to control any mistakes they might make. This process is fully automated by One Identity Safeguard.
In addition to access and session management, we also use One Identity Safeguard for password vault safety, ensuring that most of our privileged users receive a different password each time they log in so that the admin doesn't know the password, thereby protecting the entire system.
What is most valuable?
The automation of session management with One Identity Safeguard helps us significantly, as it saves us a lot of time and reduces errors. Since many of our developers and privileged users are still learning, they tend to make mistakes, and One Identity Safeguard points those out, helping us avoid major issues.
Feedback from users regarding One Identity Safeguard's usability and functionality is mostly positive.
We mostly rely on the session management and vault system features of One Identity Safeguard. In my experience, the best features One Identity Safeguard offers are mostly related to session management, which is highly automated and makes a lot of sense.
What needs improvement?
One Identity Safeguard could be improved by reducing pricing a little bit, and while the support team is mostly good, better pricing would also be advantageous.
Regarding needed improvements, the integration process has a learning curve for most of our developers. The deployment of One Identity Safeguard took about a few weeks, and I can say it was a painful process.
The deployment of One Identity Safeguard was not disruptive to our privileged users, but they had to learn a lot about the product because its user interface is complicated, and there is definitely a learning curve.
For how long have I used the solution?
I have been using One Identity Safeguard for about six months.
What do I think about the stability of the solution?
In my experience, One Identity Safeguard is stable, with most of their updates being reliable.
What do I think about the scalability of the solution?
One Identity Safeguard's scalability for our growing organization is straightforward; it is mainly automated, so we don't have to do much.
How are customer service and support?
One Identity Safeguard's customer support is good, and I would say it's better than CyberArk's.
The integration with OneLogin was easy for our team since both products are owned by the same company, and the API integration process is straightforward, with the support team being very helpful.
On a scale of one to ten, I would rate One Identity Safeguard's customer support a nine.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously, we were using CyberArk's PAM for privileged access management, but we switched to One Identity Safeguard because CyberArk was too expensive over time, especially as the number of privileged users increased.
What was our ROI?
We have seen a 12% return on investment with One Identity Safeguard, and we have saved a significant amount of money. When we were using CyberArk, it was very costly, and One Identity Safeguard is much cheaper in the long run.
What's my experience with pricing, setup cost, and licensing?
My experience with the pricing, setup cost, and licensing of One Identity Safeguard is that pricing is good, especially in the long term, as it's way better than CyberArk's, and the other costs are relatively similar.
Which other solutions did I evaluate?
Before choosing One Identity Safeguard, we evaluated other options, mainly CyberArk's products, and I don't remember much about the other solution we considered.
What other advice do I have?
Since starting to use One Identity Safeguard, there has not been much improvement, but I can say it's affordable, and that's primarily why we are using it.
The affordability of One Identity Safeguard has allowed us to allocate budget elsewhere, particularly towards integrating it with OneLogin, which helps us manage our increasing user base's needs and costs.
My advice for others considering One Identity Safeguard is that if you have more employees and privileged users and are looking for a long-term solution, then it is a good option—it's actually the better option. One Identity Safeguard is inexpensive in the long term, and it offers a better solution than CyberArk's, and mostly the pricing is what I value about it.
I rated this review nine out of ten.
Simplified implementation and robust security infrastructure enhance user experience
What is our primary use case?
What is most valuable?
What needs improvement?
For how long have I used the solution?
What was my experience with deployment of the solution?
What do I think about the stability of the solution?
What do I think about the scalability of the solution?
How are customer service and support?
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
How was the initial setup?
What was our ROI?
What's my experience with pricing, setup cost, and licensing?
Which other solutions did I evaluate?
What other advice do I have?
Strengthens security with the hardened appliance, session recordings, and controlled access
What is our primary use case?
The purpose is to ensure that privileged users do not know their own passwords.
How has it helped my organization?
Our organization is more secure, and we are confident that the privileged users who are using the systems are actually the users they claim to be due to two-factor authentication because we are using two-factor authentication in One Identity Safeguard .
It is easy for us to revoke access as well. Previously, we did not know who had access to a system, but now, we can see what access is currently open to systems directly from one single pane of glass, allowing us to revoke that access if necessary. We have limited the possibilities for malicious actions and have made it safer for our users when they are using privileged accounts. They only have privileged access when using that account, but they do not know the password. While nothing is 100% secure, it is more difficult to misuse that privileged account. In the past, IT administrators could log in with domain administrator access on their normal PCs, which made everything work without needing to elevate their rights. Now they cannot do that because they no longer know the password. They are required to go through One Identity Safeguard to elevate their rights.
In the beginning, we had some pushback from the administrators because they could not log in directly to a server or a system. They have to go through the web interface and log in. We had to educate them and put in a little bit of effort. We made them aware that we were also taking risks away from them so that nobody could misuse their credentials. People become administrators only when they want to use the system. When they are done using it, the account is disabled, and administrative privileges are revoked.
Previously, we had external consultants who had accounts, but we did not necessarily know when they were using the account. We now know because we have put up an approval flow. The external company needs to request access for a user, they need to call us and provide a ticket number. We then can approve it. We can also approve them for a specific duration, such as two hours. After that, the user needs to request access again and he needs to be approved. We now know when external people are using our systems. All the external privileged users are now disabled, which were not disabled before because we did not know when they needed to use the system. They did not have a normal user and a privileged account. They just had one user who could log in to the systems. Now, they need to have a normal user that can log in to One Identity Safeguard, and then the privileged account will only be enabled when we have approved the access to the system. The normal user does not have any access besides logging in to One Identity Safeguard. So, there was some pushback because administrators had to raise a ticket. We also tightened up our ticket system to ensure that IT does not do any work unless there is a ticket.
Our management can see that our security posture has greatly improved because, on a normal day, we do not have any privileged users who are enabled, so it is very difficult to elevate access to various systems. If they are not active, privileged access is revoked, and there is no access without a ticket.
We use the transparent mode feature for privileged sessions. It is very easy because it just goes through the Safeguard session. That session is used as a proxy now, so we can limit our end-user's access to server assets. Only the session has access to the servers, so we can do micro-segmentation in a different way now on our network.
The transparent mode is rather seamless because the user does not see this Safeguard session. They only see the Safeguard for privileged passwords because that is the interface that is there, a single pane of glass. When they request access to an IDP session or server, they see a different background because it goes through the process that does the recording but the users do not see that.
The transparent mode helps to monitor privileged accounts which we could not do before.
We have integrated it with test and development. They do not know the password either. Previously, they were the kings of their kingdom, whereas now, they are just users of their kingdom. They also now have to go through One Identity Safeguard.
If a privileged user does something malicious or suspicious, with session recordings, we can see what happened. We can see this person authenticated with two factors when he logged into One Identity Safeguard. If it was not something malicious, we can use this information to become better so that the issue will not happen again.
What is most valuable?
The implementation time was quick. It was basically up and running within a week.
I like the features that allow you to rotate your password, give you access to an RDP session without knowing your password, and record sessions. This is helpful for external people coming in, as we can review what they have been doing and use the recordings for training purposes. For example, if I want to upgrade a system that an external consultant did, these recordings can help identify issues. We can set different keywords to cut off a session if something malicious is detected. We can prevent a malicious action.
We use it to log in to various systems such as Linux and Windows, which is very convenient. There is also a personal vault for browser use, allowing us to save credentials for business-related websites securely. If a user leaves the company, I can assign that vault to another user. I can share credentials, save files within One Identity Safeguard, and ensure that certificates and license numbers are securely stored. I can see who has access to the files. I can save license numbers and license files in One Identity Safeguard, so I know where they are saved. I can also give access only to those who need it, as opposed to them residing on a file share or OneDrive, where access is not as transparent.
What needs improvement?
From a management point of view, it would be beneficial if One Identity Safeguard Privilege Password and One Identity Safeguard Privilege Session had a more similar interface. Also, if Privilege Session pushed more data to Safeguard Privilege Password, an admin would only need to log in to one place. They could then see the sessions and everything happening, even if it is running on a separate appliance. Why should I log into Safeguard for Privilege Session separately when it has been requested through the Privilege Password appliance? It would be advantageous if it was seen as one unified box, even though they are different. This is the improvement I would like to see.
For how long have I used the solution?
I have used the solution for less than a year.
What do I think about the stability of the solution?
It is stable. I would rate it a nine out of ten for stability.
What do I think about the scalability of the solution?
It is very scalable. I would rate it a nine out of ten for scalability.
Our clients are medium to large enterprises.
How are customer service and support?
Most clients use regular support, but some clients use premium support.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
In previous work, I have used CyberArk and Secret Server. One Identity Safeguard is way cheaper, intuitive, and easier to use. Its implementation costs are much lower than CyberArk.
It is on par with Secret Server, but you do not have session recordings. You just have the privileged passwords and rotation features. You need to harden the Windows because it was installed on Windows, whereas One Identity Safeguard is already a hardened appliance. One Identity Safeguard is more secure than Secret Server. However, I used Secret Server a couple of years ago. It has probably matured now.
How was the initial setup?
We are using the virtual appliance because we already have a virtual environment. The only on-prem setup we have are the physical servers that run a hypervisor. We like to have everything virtual. We can also secure a virtual appliance in a different way compared to the physical appliance. With a physical appliance, if something happens, we have to get hold of the vendor and sort out how fast they can ship a replacement, whereas we can deploy a virtual appliance instantly and get it up and running if there is a problem.
One Identity Safeguard Privilege Password is rather straightforward, rating it as an eight out of ten. Privilege Session is more like a six out of ten, being a bit more complex if I want to use all the features. However, if I just want to use it in Transparent mode, it is easier.
In total, it takes less than two weeks, depending on the landscape. Some preparation, like obtaining certificates and securing a backup share, is required first. I do require input from others to implement it within two weeks. If I can gather all the necessary data and access, the implementation becomes more straightforward.
The deployment was disruptive in a way for the privileged users because they now needed to log in through the web interface, whereas previously, they could log in directly. There are more or different steps. Instead of clicking directly on an asset they want to log in to, they need to log in to a different web page and request access. There are a few more mouse clicks than before, but we now have a better security posture of our environment.
To manage and do the implementation, you need to know certain things. You can also use a trusted partner for implementation. If you do not change anything in the system or do not want to do other connection types, you do not need that much training. You need to be aware of what you should look for. A three-day workshop with a partner would be sufficient. For end-users who need to use the system, a two-hour training would be enough.
What about the implementation team?
We have two One Identity Safeguard specialists in our organization.
What's my experience with pricing, setup cost, and licensing?
It is more expensive than Secret Server but way less expensive than CyberArk. As a customer, I would like the pricing to be lower, but it has a good price point.
What other advice do I have?
There is no reason not to recommend it. Everyone should have a PAM solution to prevent privileged user damage and mitigate risks like stolen passwords or insecure storage. If you want to ensure recordings of activities, be it from external people or highly privileged users, then this is essential. This reduces the risk of malicious insiders. You cannot always prevent it, but having recordings allows you to pinpoint activities before a system failure. You can consider having SPA analytics for additional security. We do not have that yet because of the price, but we might add it later.
I would rate One Identity Safeguard a nine out of ten.
Fairly priced and easier to implement and administer than others
What is our primary use case?
We are using it internally because I work in a consultancy company. I use it both for our internal privileged accounts. We have different systems like Google Cloud , some internal servers, data centers, etc. To secure those privileged accounts, like the administrator accounts and root accounts, I use One Identity Safeguard to rotate passwords, authorize sessions, and more. The second use case is that we also implement One Identity Safeguard for different customers.
How has it helped my organization?
The most significant benefit is that in the past, we saved passwords in Notepad files or Excel files. Now, we do not, and we have more security. We do not have saved passwords or plain text passwords in different places within the organization. That is probably the most significant benefit regarding security.
In terms of integrations, we have basic integrations for our Windows and Unix servers. We do the transparent connection for LDP and SSH, and that is all. The integration is simple overall for this kind of connection. However, if we want to integrate different consoles or different systems, it is a bit more complex because it is not so much out of the box, but for our current systems, it was very easy.
End-users require just a couple of training sessions and some documentation, and they are ready to go. They can start using the tool as an end user in a week or less. Managers or administrators require a technical specialist training workshop, which is a full-week course. After that, they need one to three months of training with laboratories and documentation. They would need at least three months to work well with the platform.
What is most valuable?
There is ease of implementation. Compared to other PAM solutions, it is easy to implement and use from an administrator's point of view. That is the most important benefit. It is very simple to implement and use.
What needs improvement?
We should be able to create customized connectors in a better way. For ad hoc or special use cases, I sometimes find we have limitations. Improving the way we develop new connectors for non-typical systems would be beneficial.
Another area for improvement could be the threat detection capabilities, like those seen in other PAM vendors. The ability to detect strange behaviors during a transparent connection or detect risky sessions and respond immediately would also be a good improvement.
We have had good feedback about One Identity Safeguard, but for LDP and SSH sessions, when we have to connect to a different console, such as a web console, the customers sometimes complain about the efficiency of the sessions. It takes extra time, and the user experience is not so good when you are using different connectors than normal ones.
For how long have I used the solution?
I have been using it since 2020, so about five years now.
What do I think about the stability of the solution?
I would rate it a nine out of ten for stability. It is like a black box. It is an appliance. It is difficult for things to go wrong.
What do I think about the scalability of the solution?
It is scalable. I would rate it a nine out of ten for scalability. It is easy if you need to implement resources.
In our organization, we have 15-20 people working with this solution. Our clients are medium enterprises.
How are customer service and support?
We use their partner support. It is usually okay. When I have day-to-day incidents and problems, the response is good enough in terms of time and quality. However, with complex problems, the response is not as fast.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I have experience with CyberArk. I would say CyberArk is a more complex solution in terms of implementation, day-to-day administration, and maintenance. It is more complex and difficult in some ways, but for advanced or difficult connectors, CyberArk has more capabilities to develop customized connectors. It can cover more special or ad hoc use cases, but at the price of more complexity overall.
One Identity Safeguard is at the top level because it covers almost all the general PAM use cases. It covers password rotation, transparent connections, threat detection, isolation, etc. It can cover the needs of most organizations. We have also been able to better cover more complex use cases with One Identity Safeguard than with other PAM solutions.
How was the initial setup?
We have a virtual appliance. We chose the virtual appliance because we were already using a virtual machine infrastructure, so it was easy for us. Our implementation is not complex. We do not have a lot of regulations. It does not matter if we lose connectivity. It is not the end of the world, so for us, a virtual appliance was good enough. It was easier to implement. We do not need to rely on physical devices.
To implement and be functional, it takes days, probably one week, but when I go to a customer and need to do all the configuration and integrate systems, it can take a couple of months overall. It takes days to implement, but configuring and integrating everything can take some months.
In terms of maintenance, it requires less maintenance compared to other PAM solutions. There is not much maintenance regarding the infrastructure. They are, black boxes or appliances, but they do require maintenance in terms of day-to-day configuration, permissions, and connectors.
What was our ROI?
We did not cover many use cases regarding efficiency and cost reduction, so we did not see ROI directly. However, being more secure makes it less probable that we will suffer an attack or data loss, which is a cost reduction, but I did not see much time reduction. There is about 10% savings.
What's my experience with pricing, setup cost, and licensing?
It is cheaper than CyberArk. Its price is fair.
What other advice do I have?
We use the solution’s transparent mode feature for privileged sessions. There was an impact on the users with the roll-out of this feature because we changed the way people were connecting to systems and faced some problems like communication and networking problems. People did not have the correct permissions at the time. That was a bit of a problem, but we now have a seamless integration. It took us a couple of months to have everything working.
I will recommend it to some customers because it is easy to deploy, administer, and configure. The price is fair. The scalability is also good.
Overall, I would rate it an eight out of ten. It covers pretty much all use cases, but sometimes there is a lack of customization.