Overview
One Identity Safeguard for Privileged Passwords automates, controls and secures the process of granting privileged credentials with role-based access management and automated workflows. Deployed on a hardened appliance, Safeguard for Privileged Passwords eliminates concerns about secured access to the solution itself, which helps to speed integration with your systems and simplifies management. Plus, its user-centered design means a small learning curve and the ability to manage passwords from anywhere and with nearly any device. The result is a privileged password management solution that secures your enterprise and enables your privileged users with a new level of freedom and functionality.
Highlights
- Release control - Manages user password requests via a secure web browser connection with support for mobile devices.
- Discovery - Quickly discover any privileged account or system on your network with host, directory and network-discovery options.
- Approval Anywhere - Leveraging One Identity Starling, you can approve or deny any request without being on the VPN.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Vendor refund policy
All fees are non-refundable and non-cancellable except as required by law.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Additional details
Usage instructions
Right click Safeguard AWS image. Select "Launch" Select you preferred disk size. For testing 100Gb is fine. For production environments, you will want 1Tb or greater. Choose your preferred network NIC/network etc. review and accept Image will deploy. You can see a progress of the image that is deploying by navigating to the deploying image, "right-click instancesettings -> Get System Log. Instance will deploy and then Safeguard will deploy. This will take several minutes. System log will show the percentage of Safeguard deploy progress. Finished when reaches 100% Compete instructions: https://support.oneidentity.com/technical-documents/one-identity-safeguard-for-privileged-passwords/7.0%20lts/appliance-setup-guide/4#TOPIC-1820747
Resources
Vendor resources
Support
Vendor support
One Identity offers an extensive range of services from online resources, 24x7 and premier support. One Identity support provides solution support to suit any business organization.
https://support.oneidentity.com/essentials/support-offerings
Contact support at
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products

Customer reviews
Centralized controls have improved privileged access security and audit visibility
What is our primary use case?
In our organization, the primary use of One Identity Safeguard is managing and securing privileged access, and we mainly use it to store and protect sensitive credentials like admin passwords, ensuring that they are not exposed or misused. It also helps in monitoring privileged sessions, allowing us to track and audit activities performed by administrators or high-level users. This adds a stronger layer of security and compliance, as all credential access is controlled, recorded, and reviewed when needed. Overall, it plays a key role in protecting sensitive systems and reducing the risk of insider or outsider threats.
A common example of how we use One Identity Safeguard to secure privileged access is when a system administrator needs access to a production server. Instead of sharing or knowing the actual admin password, they request access through One Identity Safeguard, which securely provides a temporary credential for a session without exposing the password. This system automatically records an entire session, including actions performed on the server. If anything unusual happens, such as an unauthorized change or risky commands, the session logs and recording can be viewed by a security team, ensuring that privileged access is tightly controlled, fully monitored, and auditable at all times.
One additional point about our main use case is that we use One Identity Safeguard not just for securing access but also for enforcing strict governance and accountability across teams. For example, we apply role-based access control and approval workflows, so any privileged access request must be approved before it is granted.
What is most valuable?
The best features of One Identity Safeguard mainly revolve around strong security, visibility, and control over privileged access. One of the most valuable features is its password management, where sensitive credentials are securely stored, automatically rotated, and accessed only through a controlled workflow, reducing the risk of misuse. Another standout feature is session monitoring and recording, which captures every action taken during privileged sessions.
The session monitoring and recording feature in One Identity Safeguard has been extremely valuable for our team, especially from a security and compliance perspective. We use it quite regularly whenever an administrator accesses critical systems. Every privileged session is recorded in detail, covering screen activity, commands executed, and user behavior, so we have a complete audit trail. This has helped us quickly investigate incidents, verify actions taken on sensitive systems, and ensure that all activities follow internal policies.
One Identity Safeguard has had a very positive impact on our organization, especially in terms of security, efficiency, and visibility. It has helped us centralize and control privileged access and provided a structured secure approach. As a result, we now have much better visibility into accessing credentialed systems and the actions performed, which has improved accountability and compliance.
One Identity Safeguard has significantly improved accountability and compliance by giving us complete visibility of all privileged activities. Every access requires approval, and a session is logged and recorded, which means we always have a great audit trail of who accessed what and when. This has made internal and external audits much smoother, as we can quickly provide evidence without manually tracking.
What needs improvement?
One Identity Safeguard is a strong PAM solution, but there are definitely a few areas where it could be improved based on practical experience and known limitations. One key area is performance and resource usage, especially when advanced features like session recording or OCR are enabled. These features consume significant CPU and storage, and in some cases, may slow down connections or processing time if not optimized properly. Improving efficiency here would make the platform smoother and more scalable.
One additional improvement that would be helpful in One Identity Safeguard is better integration flexibility with modern cloud and DevOps tools. While it supports many systems, connecting with newer platforms for automation workflows in dynamic environments can sometimes require extra effort or customization.
For how long have I used the solution?
I have been using One Identity Safeguard for two years.
What do I think about the stability of the solution?
One Identity Safeguard is stable.
What do I think about the scalability of the solution?
One Identity Safeguard is highly scalable, and that is a core strength in enterprise environments. It is designed for scale through clustering and a distributed architecture, allowing multiple appliances to work together as a single system. For example, organizations can add multiple One Identity Safeguard appliances to handle an increasing number of users, privileged accounts, and session traffic without impacting performance.
How are customer service and support?
Customer support for One Identity Safeguard has been generally reliable based on our experience. On the positive side, the customer team is knowledgeable and technically strong, especially when dealing with configuration issues, session monitoring, or password-related queries. For standard or well-defined issues, responses are usually helpful and resolve problems efficiently.
Which solution did I use previously and why did I switch?
We evaluated a few other privileged access management (PAM) solutions before implementing One Identity Safeguard, including CyberArk and other enterprise PAM tools in the same space.
How was the initial setup?
The deployment of One Identity Safeguard was relatively quick compared to many other IAM and PAM solutions because it is delivered as a pre-configured appliance, either physical or virtual. The initial setup can be done quite fast, which helps to reduce the time to value.
What about the implementation team?
The deployment of One Identity Safeguard was fairly smooth overall with minimal disruption for privileged users. During the initial rollout, there was a short adjustment period where users had to request access through the system instead of directly using credentials, which slightly changed their workflow. However, once they became familiar with the process, it actually improved their experience by simplifying access and removing the need to remember or manage sensitive passwords.
The training required for One Identity Safeguard was quite manageable and varied by role. For end-users and privileged users, training was minimal, and basic guidance was enough for them to understand how to request access and start sessions since the interface is fairly straightforward for daily use.
What was our ROI?
We have seen a clear return on investment with One Identity Safeguard, mainly driven by time savings, reduced manual effort, and fewer security-related incidents. One of the biggest measurable improvements has been in IT workload reduction. After implementing One Identity Safeguard, we saw a significant drop in manual tasks including password handling, privileged access approvals, and incident troubleshooting.
What other advice do I have?
My advice to others looking into using One Identity Safeguard is that we have seen a clear return on investment, mainly derived from saved operational efficiency and reduced security overhead. A simple way to explain it is time saved, faster administration, fewer security incidents, and efficiency gained.
Overall, One Identity Safeguard stands out as a strong and well-built privileged access management solution, especially for organizations that want tighter control over admin activity without slowing down operations. I would rate this product a nine out of ten.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Privileged access has become tightly controlled and audit preparation now runs faster
What is our primary use case?
I mainly use One Identity Safeguard to secure and control privileged access by managing admin credentials, granting time-based access, and monitoring sessions to ensure security and compliance.
For example, when an admin needs access to a production server, they request it through One Identity Safeguard , which grants time-limited access after approval. The system automatically injects the credentials, so the password is never exposed, and the entire session is monitored and recorded. This helps my team maintain security and quickly review activity during an audit.
What is most valuable?
One key benefit of my main use case with One Identity Safeguard is that it helped me eliminate shared admin credentials, which was a major security risk earlier. Now, every access request is tracked and tied to an individual user, improving accountability. It also simplified audits by providing clear session records, which solved a big challenge I previously faced with compliance visibility.
The best features One Identity Safeguard offers include credential injection, session monitoring, and role-based access control. Credential injection ensures passwords are never exposed to users, improving security, while session monitoring and recording provide full visibility and an audit trail of activity. Role-based access helps enforce a least privilege policy, and additional features such as real-time alerts, reporting, and integration with other systems make it a comprehensive solution for managing and securing privilege.
What needs improvement?
I would appreciate more flexibility in reporting and easier customization of dashboards in One Identity Safeguard. While the core features are strong, some advanced configuration can be somewhat complex. Features such as integration are useful but are used less frequently in daily operations compared to credential management and session monitoring. Adding a more intuitive control and simplifying advanced settings would enhance the usability.
One Identity Safeguard could be improved with a more user-friendly interface and simpler initial setup, as the learning curve can be somewhat steep. Enhancing reporting customization and expanding integration with more third-party tools would also add value. Additionally, faster support response times and smoother scalability for large environments would further improve the overall experience.
A specific challenge I faced during the use of One Identity Safeguard was during initial setup and policy configuration, which was time-consuming and required careful tuning to match my environment. At times, navigating advanced settings and generating custom reports also felt less intuitive, which slowed things down. Improving documentation and simplifying these configurations would make the experience much smoother for my team.
For how long have I used the solution?
I have been using One Identity Safeguard for two years.
What do I think about the stability of the solution?
Overall, One Identity Safeguard's authentication service is stable and reliable.
What do I think about the scalability of the solution?
One Identity Safeguard is highly scalable and can support growing environments effectively. It allows me to add more systems and users without major performance issues, and its clustering and load distribution capabilities help maintain performance as demand increases. Overall, it scales well for both mid-sized and large enterprise environments.
How are customer service and support?
Customer support for One Identity Safeguard was generally good, with a knowledgeable and helpful team assisting during the setup and troubleshooting. In most cases, issues were resolved efficiently, but response times can sometimes be slower for more complex problems.
Which solution did I use previously and why did I switch?
I was previously using a basic in-house solution for managing privileged credentials, but it lacked advanced features such as session monitoring and automated password management. I switched to One Identity Safeguard for better security, centralized control, and improved compliance capability.
How was the initial setup?
The integration of One Identity Safeguard with my DevOps environment and cloud applications was generally smooth, especially with standard systems, but it required some initial configuration and fine-tuning to align with my DevOps workflow and core cloud applications. I did face minor challenges around setup and policy configuration, but once implemented, it worked reliably and integrated well with my environment.
What was our ROI?
I have seen a clear return on investment with One Identity Safeguard. I have reduced manual effort for access management by around thirty to forty percent, which has saved significant staff hours. Audit preparation time has decreased by nearly fifty percent, and improved security controls have helped lower the risks of costly incidents. Overall, the efficiency gains and risk reduction have justified the investment.
What's my experience with pricing, setup cost, and licensing?
In terms of pricing and licensing, my experience with One Identity Safeguard has been fairly reasonable. It is based on the number of users and privileged accounts, with options for a subscription or perpetual licensing. The initial setup cost was moderate, especially considering the security benefits, although some investment was required for deployment and configuration. Overall, I found the pricing was justified with the environment.
Which other solutions did I evaluate?
Before choosing One Identity Safeguard, I evaluated a few other privileged access management solutions, such as CyberArk Privileged Access Manager , Delinea Secret Server , and BeyondTrust Privileged Access Management . These are well-known options in the market and commonly compared during the evaluation.
What other advice do I have?
My advice for others looking into using One Identity Safeguard would be to plan the implementation carefully and invest time in understanding your access policies and workflow before deployment. One Identity Safeguard is a powerful tool, but it is not plug and play. It requires proper configuration and tuning to get the best results. Start with a phased rollout, focus on high-risk privileged accounts first, and ensure your team is trained properly. Once properly implemented, it can significantly improve security, visibility, and compliance across the organization. I would rate this product nine out of ten.
Centralized control has eliminated shared credentials and provides secure audited admin access
What is our primary use case?
In my daily operations, I rely on One Identity Safeguard for administrator requests for access through One Identity Safeguard , which are approved via workflows. Once approved, sessions are launched, ensuring security without revealing passwords, and all activities are recorded for auditing purposes.
In our environment, there were multiple administrators using shared privilege accounts, which created accountability and security risks. With One Identity Safeguard, we implemented password vaulting where passwords are automatically rotated and never exposed to users, ensuring secure access and eliminating shared credential risks.
In our daily operations, One Identity Safeguard is primarily used to manage and control privilege access to critical systems such as servers, network devices, and databases. Administrators and users request access through One Identity Safeguard, which follows an approval-based workflow. Once access is approved, users can securely connect to the target system without directly viewing or knowing the privilege credentials. All sessions are proxied through One Identity Safeguard, ensuring that passwords are never exposed. Additionally, every session is monitored and recorded, allowing security teams to review activities when required. We also use One Identity Safeguard for automated password rotation, ensuring that privileged account passwords are regularly updated without manual intervention. Overall, it acts as a centralized platform for security, secure access management, auditing, and compliance in our environment.
How has it helped my organization?
The implementation of One Identity Safeguard has had a significant positive impact on our organization's security and operational efficiency, reducing the risk of credential misuse by eliminating shared privilege accounts and enforcing secure password vaulting with automated rotation. One Identity Safeguard improves security by eliminating shared credentials, enhancing visibility through session monitoring, simplifying compliance, and streamlining privilege access management.
After implementing One Identity Safeguard, we achieved several measurable improvements in our environment. We eliminated the use of shared privilege accounts, significantly improving accountability and reducing security risks. Privileged password exposure was reduced to zero, as all credentials are securely stored and managed through the vault with automatic rotation. Audit and compliance processes became faster and more efficient, as we could provide complete session logs and recordings whenever required. We implemented shared account management, achieved zero password exposure, improved audit readiness, reduced access management time, and gained full visibility into privileged activities.
What is most valuable?
The most valuable features of One Identity Safeguard are its strong privilege access control and session security capabilities. One key feature is password vaulting with automated rotation, which ensures that privileged credentials are never exposed to users and are regularly updated. Key features include password vaulting with rotation, session monitoring and recording, secure remote access without exposing credentials, approval-based workflows, and seamless integration with Active Directory.
One Identity Safeguard integrates seamlessly with Microsoft Active Directory , simplifying user authentication and access management. The integration provides centralized authentication, group-based access control, and automated management of privileged domain accounts, reducing manual efforts and improving security.
Additional features include session proxy access, granular policy control, threat detection, detailed audit logs, multifactor authentication, and high availability support.
What needs improvement?
While One Identity Safeguard is a strong privilege access management solution, there are some areas where improvements can be made. The initial deployment and configuration can be complex, especially in a large enterprise environment with multiple integrations. The user interface can be improved to make navigation more intuitive, particularly for new users and administrators. Reporting and customization options could be more flexible, as generating tailored reports sometimes requires additional effort. Integration with third-party tools, although supported, can be time-consuming and may require deeper technical expertise. Additionally, performance tuning may be required in high-load environments to ensure optimal session handling response times. Areas for improvement include complex initial setup, UI enhancement, more flexible reporting, and easier third-party integration.
Improvements can be made in areas such as simplifying the deployment and initial configuration process, especially for large complex environments. The user interface could be made more intuitive and user-friendly, making it easier for new users and administrators to navigate. Reporting capabilities can be enhanced with more customization options and easier report generation. Streamlining integration with third-party tools and platforms could reduce implementation efforts and time. Additionally, improved performance optimization for high-load environments would help ensure smoother session handling and a better user experience.
For how long have I used the solution?
I have been using One Identity Safeguard for the last one year.
What do I think about the stability of the solution?
One Identity Safeguard is stable in my environment and has been reliable in our production environment. We have not experienced any major downtime or critical issues after the initial deployment and configuration phase. The solution performs reliably for daily privilege access operations, including session management and password vaulting. With proper sizing and high availability configuration, the system handles multiple concurrent sessions efficiently, making it a dependable and stable platform suitable for enterprise environments.
What do I think about the scalability of the solution?
One Identity Safeguard is highly scalable and well-suited for enterprise environments. The solution can handle a growing number of privileged accounts and target systems without significant performance impact when properly sized, supporting horizontal scaling by adding additional appliances, allowing organizations to expand capacity as needed.
How are customer service and support?
One Identity's customer support is knowledgeable and provides helpful guidance for troubleshooting and configuration-related issues. For standard issues, the response time is responsive and the resolutions are effective. For more complex or critical issues, response time can sometimes vary, but overall, my support experience has been satisfactory. Documentation and knowledge base resources are also useful for resolving common issues and understanding product features, making customer support reliable and meeting enterprise expectations.
Which solution did I use previously and why did I switch?
Before implementing One Identity Safeguard, we relied on manual methods and basic access control mechanisms to manage privileged accounts. In some cases, privileged credentials were shared among administrators, and password management was handled manually, increasing security risks and reducing accountability. We moved to One Identity Safeguard for better security, centralized control, and session visibility.
How was the initial setup?
The deployment of One Identity Safeguard in our environment took approximately four to six weeks. The initial setup of the physical appliance was straightforward, but the overall implementation required careful planning, especially for integration with Active Directory and onboarding the target systems. One of the main challenges was defining and configuring access policies and approval workflows according to the organization's requirements, but the solution is stable after implementation.
What about the implementation team?
The training required for One Identity Safeguard was moderate. For administrators, detailed training is needed to understand policy configuration, password vaulting, session management, and integration. It typically took a few days of hands-on sessions along with initial setup implementation support. For end-users, minimal training is required as the access request and approval workflow is straightforward and user-friendly. Overall, with proper initial training and documentation, the team quickly adapts to the solution in daily operations.
What was our ROI?
I believe One Identity Safeguard delivers a strong return on investment by significantly reducing security risks and improving operational efficiency. ROI is achieved through reduced security risks, lower manual efforts, faster audits, and improved operational efficiency.
What's my experience with pricing, setup cost, and licensing?
One Identity Safeguard is priced at a premium level, typical for enterprise-grade privilege access management solutions. The licensing is generally based on the number of privileged accounts, users, or appliances, depending on the deployment model and components used. The initial setup cost includes the appliance cost, implementation efforts, and integration with existing systems, such as Active Directory and other infrastructure components.
Which other solutions did I evaluate?
Before finalizing on One Identity Safeguard, we evaluated other privilege access management solutions, such as CyberArk and BeyondTrust. CyberArk is a strong market leader with advanced features, but it can be complex to implement and manage. BeyondTrust also offers good capabilities, especially for endpoint privilege management and remote access, but we found One Identity Safeguard to be more aligned with our requirements in terms of ease of use and deployment flexibility. We chose One Identity Safeguard because it provides a good balance between security, usability, and integration capabilities, particularly with Active Directory.
What other advice do I have?
Overall, my experience with One Identity Safeguard has been very positive. It is a reliable and secure privilege access management solution that effectively protects sensitive accounts and provides full visibility into administrator activity, with minor improvements needed in terms of UI and reporting enhancements.
Before implementing One Identity Safeguard, I advise clearly defining your privilege access management strategy and identifying all critical systems and accounts. Plan integrations in advance, especially with Active Directory and other security tools, to ensure a smooth deployment. Focus on designing proper access policies and approval workflows, as these play a key role in effective implementation. Provide adequate training to administrators so they can fully utilize features like session monitoring, password vaulting, and reporting. Starting with a phased deployment approach, onboarding critical systems first and then gradually expanding across the environment is beneficial. Overall, proper planning and user training are key to maximizing the benefits of the solution.
One Identity Safeguard is a mature and enterprise-ready privilege access management solution that provides a strong balance between security and usability. The key value of the solution lies in its ability to centralize privilege access control while maintaining full visibility and auditability for user activities, making it a mature and reliable PAM solution that balances security and usability with strong long-term value for enterprise environments. I would rate this solution a nine out of ten.
Privileged access has become streamlined and compliance improves through automated monitoring
What is our primary use case?
In my day-to-day work, One Identity Safeguard helps to identify anomalous behavior, a deal breaker feature for some customers. It also helps to detect threats and streamline requests and quickly detect threats.
What is most valuable?
The out-of-box templates from One Identity Safeguard make onboarding much easier for my team in day-to-day work.
One Identity Safeguard's automation of password management and incident investigations has cut manual efforts significantly.
One Identity Safeguard has positively impacted my organization by improving compliance, posture, and audit capabilities. It has cut manual efforts by 30 to 40% via automation and also decreased privileged account incidents by up to 40%.
What needs improvement?
Regarding needed improvements, I want to mention that there is a lack of documentation and many plug-in problems.
I think One Identity Safeguard needs improvements because sometimes the support team doesn't have answers for bugs.
What do I think about the stability of the solution?
One Identity Safeguard is deployed in my organization as a hybrid model.
One Identity Safeguard is deployed in a hybrid cloud setup.
What do I think about the scalability of the solution?
How are customer service and support?
Which solution did I use previously and why did I switch?
How was the initial setup?
The deployment of One Identity Safeguard did not affect my privileged users; it was not disruptive to them.
Not much training was required to start using One Identity Safeguard, both for those who manage it and for end users. It is self-service, and it is very easy to learn how to use it. The learning curve is smooth.
What about the implementation team?
What was our ROI?
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing for One Identity Safeguard is that the pricing is very competitive.
Which other solutions did I evaluate?
What other advice do I have?
My advice for others looking into using One Identity Safeguard is that it is a serious, enterprise-grade identity safeguard. It excels at security, monitoring, and compliance, but trades off simplicity and ease of use.
One Identity Safeguard has been a cost-effective tool that has prevented major security breaches, avoided insider threats and misuse of admin privileges, and reduced audit and compliance costs. However, the initial cost plus setup effort is a bit high.
I gave this review a rating of 8 out of 10.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Centralized controls have strengthened privileged access security and simplified compliance audits
What is our primary use case?
Our primary use case for One Identity Safeguard is to secure, control, and monitor privileged access across critical systems in the organization. We mainly use it for privileged session management, password vaulting, and enforcing least-privilege access policy. It helps us manage administrative access to servers, databases, and network devices by centralizing credential storage and rotating passwords automatically. Additionally, we use it for session recording and real-time monitoring, which strengthens our audit and compliance capability. Overall, it plays a key role in reducing insider threats, improving security visibility, and ensuring regulatory compliance.
A common example of how we use One Identity Safeguard for privileged session management is when a system administrator needs access to a production server. Instead of sharing static credentials, they request access through One Identity Safeguard. For password vaulting, the admin never sees the actual passwords. One Identity Safeguard automatically injects the credential during login, and the password is rotated after the session ends. This ensures that credentials are never exposed or reused. For privileged session management, once the admin connects to the server through One Identity Safeguard, the entire session is monitored and recorded. If any suspicious activity occurs, we have the ability to terminate the session in real-time. These session recordings are also used later for auditing and compliance checks. This approach significantly improves security while still allowing admins to do their work efficiently without manual credential handling.
One additional point to add about our main use case is how well One Identity Safeguard integrated into our overall security workflow. It is not just a standalone tool; it works as a central control point for all privileged access. In our day-to-day operation, it reduces manual effort for the IT team by automating password management and access approval. It also standardizes how privileged access is handled across different teams, which improves consistency and reduces human error. Another important aspect is its role in compliance. Since all privileged activities are logged and recorded, it makes audits much smoother and faster. Instead of collecting logs from multiple systems, everything is available in one place. Overall, it fits seamlessly into our workflow by enhancing security without slowing down operations, which is critical for maintaining both productivity and control.
What is most valuable?
One Identity Safeguard offers several powerful features, but a few stand out in day-to-day use. The most important feature is privileged password vaulting. It securely stores credentials in a centralized vault and automatically rotates passwords, which significantly reduces the risk of credential misuse or leakage. Another key feature is privileged session management. It allows us to monitor, record, and even replay user sessions in real-time. This is extremely useful for both security monitoring and audit purposes, as every action can be traced back if needed. A standout capability is real-time monitoring and threat detection. The platform can generate alerts or even block suspicious activity during live sessions, which adds a strong layer of proactive security. I also find the session recording with search and indexing very valuable. Since sessions are indexed, it becomes easy to quickly investigate specific actions without reviewing entire recordings. Additionally, the analytics and behavior monitoring feature helps identify unusual user activity using behavioral patterns, which is useful for detecting insider threats or compromised accounts. Finally, automation and workflow-based access control is a significant advantage. Access requests, approvals, and provisioning are handled through automated workflows, reducing manual effort while ensuring consistent policy enforcement.
What needs improvement?
While One Identity Safeguard is a strong PAM solution, there are a few areas where it could be improved. One area is the user interface and reporting customization. Although the platform is functional, creating highly customized reports or dashboards can sometimes be less intuitive and may require additional effort. Another improvement area is integration flexibility, especially with some third-party or legacy systems. While it integrates well with standard environments like Active Directory, expanding smoother integration across a wider range of tools would make it even more versatile.
For how long have I used the solution?
I have been using One Identity Safeguard for two years.
What do I think about the stability of the solution?
One Identity Safeguard has been highly reliable and stable in our experience. Once deployed and properly configured, the platform runs consistently with minimal downtime. We have not faced any major performance issues, even while handling multiple concurrent privileged sessions and the integration across our hybrid environment. There have been occasionally minor issues, mostly related to integration or configuration, but nothing critical, and they were quickly resolved.
What do I think about the scalability of the solution?
One Identity Safeguard has shown good scalability in our experience and has effectively handled growth in our organization. As our environment expands, whether adding more users, servers, or cloud resources, it is relatively straightforward to scale by extending the deployment, especially since we are using virtual appliances. We can add capacity without major architecture changes or downtime. It also handles an increasing number of privileged sessions and access requests without noticeable performance degradation.
How are customer service and support?
Our experience with customer support has been quite positive. The support team is generally responsive and knowledgeable, especially for standard use configurations, and we have mainly expressed satisfaction in this area because we have solved almost all problems using One Identity Safeguard.
Which solution did I use previously and why did I switch?
Prior to implementing One Identity Safeguard, we were using a mix of native tools and manual processes, along with limited capability from tools like CyberArk Privileged Access Manager in some parts of the environment. We decided to switch to One Identity Safeguard mainly for its unified approach to privileged access management. It offered better centralized control, easier integration with our hybrid environment, and more streamlined workflows for both administrators and end-users. Another key reason was the ease of deployment and usability, which made it more practical for our team than maintaining multiple tools or a more complex setup.
How was the initial setup?
The deployment took approximately four to six weeks in our environment. The initial setup, including deploying the virtual appliance and basic configuration, was completed within the first one to two weeks. After that, most of the time went into integration with systems like Microsoft Active Directory and Microsoft Azure, policy configuration, and testing. We also spent time on fine-tuning access control, onboarding users, and validating workflows, which is critical to ensure everything runs smoothly in production.
What about the implementation team?
There is a formal vendor-partner ecosystem in place beyond a direct customer relationship with One Identity. One Identity operates through a structured partner program that includes system integrators, resellers, and managed service providers who help with implementation, deployment, and ongoing support for One Identity Safeguard. However, in our specific case, our relationship is primarily as a customer, and we do not have any strategic alliance, reseller, or co-development relationship with the vendor.
What was our ROI?
We have definitely seen a clear return on investment after implementing One Identity Safeguard, both in terms of cost savings and operational efficiency. From a time-saving perspective, audit preparation time has reduced by around 40 to 50 percent since all privileged activity logs and session recordings are centralized and available. What earlier took a day can be done in an hour now. In terms of operational efficiency, automation of password management and access workflows has reduced manual effort by approximately 30 to 40 percent, allowing our IT team to focus more on strategic tasks instead of routine access management. While it is harder to quantify exactly, the platform has helped us prevent potential security incidents by enforcing strict access control and real-time monitoring. Avoiding even a single major breach can result in significant financial savings.
What's my experience with pricing, setup cost, and licensing?
Our experience with pricing, setup cost, and licensing was reasonable for an enterprise-grade PAM solution, though it does require a notable initial investment. The licensing model is fairly structured, typically based on the number of users, assets, or sessions being managed. It is flexible enough to scale as the organization grows, but it is important to plan properly to optimize cost. In terms of setup cost, the main investment was around implementation, integration, and initial configuration. Since we deployed in a hybrid environment, there was some additional effort involved, but nothing unexpected for a solution of this scale.
What other advice do I have?
My advice to others considering One Identity Safeguard would be to start with a clear understanding of privileged access requirements and define strong governance policies upfront. One Identity Safeguard is a powerful tool, but its effectiveness depends on how well it aligns with your organization's PAM strategy. Another key point is to invest time in proper policy configuration, such as session recording rules, approval workflows, and access controls to avoid unnecessary friction for end-users while still maintaining strong security. Training and onboarding are equally important; administrators and the security team should be comfortable with reviewing session logs and responding to alerts. Otherwise, the value of monitoring and auditing can be diminished. Finally, continuous review is essential. Regularly analyze reports, refine policies, and ensure integration with your broader security stack to get maximum value from the platform.
One Identity Safeguard, in my experience, has had a significant positive impact on our organization, especially in terms of security, efficiency, and compliance. From a security standpoint, it has greatly reduced the risks associated with privileged accounts. By eliminating shared credentials and enforcing password rotation, we have minimized the chances of unauthorized access and insider threats. Operationally, it has improved efficiency by automating tasks such as password management and access approval. This has reduced the manual workload on the team and streamlined how privileged access is granted and monitored. It has also strengthened our compliance posture. Since all privileged activities are logged and recorded, audits have become much smoother and faster, with all the required data readily available in one place. Additionally, the real-time monitoring and session control capability have given us better visibility and faster response to potential risks, which has improved our overall incident management process. I would rate this review as a nine out of ten.