Sign in Agent Mode
Categories
Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

7 AWS reviews

External reviews

40 reviews
from

External reviews are not included in the AWS star rating for the product.


    Kartik Swami

Privileged access has become more secure and password management saves significant time

  • April 30, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for One Identity Safeguard is to manage and control privileged accounts and store passwords. For example, if an IT admin needs access to a server, I use One Identity Safeguard to manage and control privileged accounts. One Identity Safeguard helps companies avoid data breaches regarding my main use case, influencing other teams and types of users who interact with it.

What is most valuable?

One best feature One Identity Safeguard offers is multi-factor authentication, which adds extra security by requiring more than one verification step. When I mention requiring more than one verification step, I am referring to multi-factor authentication, and it helps to secure systems because it will protect the data. One Identity Safeguard has positively impacted my organization by helping to increase security because of password vaulting.

Password management has improved as it is easier now; for example, I experienced improved efficiency when my IT team needs to access a production server. I have noticed measurable outcomes regarding reduced time to access servers and fewer security incidents since using One Identity Safeguard because it helps me to secure my data and it is reliable.

What needs improvement?

One Identity Safeguard could be improved, and some user tools can be enhanced. I would add more about the needed improvements related to user tools or any other area. The improvement I suggest is to add AI and smart automation; One Identity Safeguard already uses analytics to detect risks, but there is room for enhancement. I believe One Identity Safeguard can be improved by enhancing the user experience.

For how long have I used the solution?

I have been working in my current field for one and a half years.

What do I think about the stability of the solution?

One Identity Safeguard is stable, and this is actually expected by most organizations, commonly compared with CyberArk.

What do I think about the scalability of the solution?

For scalability, instead of one system handling everything, multiple systems are used.

How are customer service and support?

Customer support is good and meets my expectations. I would give a rating of 4.5; I think it is good for customer support.

Which solution did I use previously and why did I switch?

I have previously used a different solution and it was a good experience.

How was the initial setup?

The training required to use the solution is straightforward and effective. It took about one to two weeks for deployment of the solution.

What about the implementation team?

I typically integrate One Identity Safeguard with several parts of the business to make access more seamless. The integration process was balanced because of moderate challenges but manageable overall.

What was our ROI?

For ROI, I have seen a return on investment based on time saved, which is nearly a 50 to 70% reduction.

What's my experience with pricing, setup cost, and licensing?

A strong and honest answer about pricing is that it shows both cost and value.

Which other solutions did I evaluate?

I evaluated other options before choosing One Identity Safeguard.

What other advice do I have?

The feedback regarding the solution's usability and functionality is positive; from my perspective, it is easy to use. I have additional thoughts about One Identity Safeguard. I find this interview very appreciating; it is very helpful, and overall it is a good experience.

I can provide a short poem: Locked doors, silent keys, access flows, watched and secure. This poem captures my sentiments regarding the solution. My overall review rating for One Identity Safeguard is 8.5.


    Chetan Bhati

Privileged access has become controlled and auditing provides clear visibility into admin activity

  • April 30, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for One Identity Safeguard is managing and securing privileged access on a day-to-day basis. It is used for password vaulting, controlled admin access to servers, and monitoring privileged sessions to ensure security and compliance.

Recently, I used One Identity Safeguard to retrieve a privileged account password from the vault for server access during troubleshooting. The access was time-bound and automatically logged. I also checked session activity logs to verify the actions performed, ensuring everything was secure and compliant.

What is most valuable?

Some of the best features of One Identity Safeguard in my opinion are its password vaulting, session monitoring, and detailed auditing capabilities. It securely stores privileged credentials, provides real-time monitoring and recording of admin sessions, and maintains complete audit logs, which helps in improving security and meeting compliance requirements.

One Identity Safeguard has positively impacted our organization by improving our overall security through controlled and monitored privileged access. We have reduced risk related to password misuse, and auditing has become much easier. It also helps in maintaining compliance and gives better visibility into admin activities across the environment.

What needs improvement?

Overall, One Identity Safeguard works well, but it could be improved in terms of UI simplicity and ease of navigation, especially for new users. Some configuration can feel complex, so better documentation or more intuitive workflows would help. Additionally, faster performance in session monitoring and reporting would enhance the overall experience.

A better integration with other security and monitoring tools would improve the overall experience. Also, more user-friendly reporting and a customizable dashboard would make it easier to track activities and generate insights quickly.

For how long have I used the solution?

I have been using One Identity Safeguard for six months to one year.

What do I think about the stability of the solution?

One Identity Safeguard is stable in our environment.

What do I think about the scalability of the solution?

One Identity Safeguard is highly scalable in our environment. We are able to add more users, systems, and privileged accounts without impacting performance. As our infrastructure grows, the solution continues to handle the increased load smoothly, especially for password vaulting and session monitoring, without any major changes required.

How are customer service and support?

I would say the customer support for One Identity Safeguard has been generally responsive and helpful. Whenever we raise issues related to configuration or access, the support team assists with proper guidance.

Which solution did I use previously and why did I switch?

Previously, we were using a more manual process for privileged access management, which involved shared credentials and less centralized control. We switched to One Identity Safeguard to improve security, implement proper access control, and gain better auditing and monitoring of privileged activities.

How was the initial setup?

Deployment of One Identity Safeguard in our organization took approximately a few days to a couple of weeks, including installation, configuration, and integration with Active Directory and internal systems as well. Most of the time was spent on testing and ensuring proper access policies were applied.

What about the implementation team?

Only basic training was required to start using One Identity Safeguard. For administrators, a bit more training was needed to understand configuration, policies, and session management. For end users, minimal training was required since they mainly use it for requesting and accessing privileged credentials.

What was our ROI?

We have seen ROI mainly in terms of time saving and improved efficiency with One Identity Safeguard. Administrators spend less time managing privileged access and handling password requests because most processes are now automated. It has also reduced security risks by minimizing password sharing and manual access handling, which indirectly saves costs by preventing incidents and reducing audit effort. My advice would be to plan the deployment properly and ensure clear access policies are defined before implementation. It is important to invest time in understanding the configuration and integration with Active Directory. Once set up correctly, it provides strong security, better control over privileged access, and improves auditing and compliance significantly.

What's my experience with pricing, setup cost, and licensing?

I was not directly involved in the pricing, setup cost, or licensing decisions for One Identity Safeguard. However, from an operational perspective, the solution is considered a premium enterprise tool, and the licensing is managed centrally by our IT security team based on organization requirements.

Which other solutions did I evaluate?

Before selecting One Identity Safeguard, we evaluated a few other privileged access management solutions, including CyberArk and BeyondTrust. We chose One Identity Safeguard based on its features, integration capabilities, and ease of deployment within our existing infrastructure.

What other advice do I have?

Overall feedback from users regarding One Identity Safeguard's usability and functionality has been positive. However, some users feel the interface is slightly complex initially and requires some learning. Once familiar, they find it reliable for accessing privileged accounts and monitoring sessions effectively.

Since implementing One Identity Safeguard, we have seen better control over privileged access and reduced manual password handling. It has saved time during troubleshooting by providing quick, secure access, and auditing has improved, making it easier to track activities and support compliance requirements.

The integration with Active Directory was moderately easy. The initial setup required proper configuration of trust and mapping of users' roles, which took some time. However, once configured correctly, it works smoothly and provides centralized authentication and better control over privileged access.

I would rate this review an overall score of eight.


    Prithviraj

Privileged access has become controlled and auditable while password rotation runs automatically

  • April 26, 2026
  • Review from a verified AWS customer

What is our primary use case?

One Identity Safeguard's main use case in our organization is to manage and secure privileged access across our environment, primarily controlling administration access to critical systems like servers, databases, and network devices. It helps us enforce secure password management and provides session monitoring, allowing us to track what privileged users are doing in real time or review it later for auditing purposes. In day-to-day operations, we use it to grant temporary access to admins, rotate credentials automatically, and ensure that no one has standing privileged access longer than necessary. It has become an important tool for maintaining compliance and reducing the risk of unauthorized access.

Recently, we faced a situation where one of our database servers needed urgent troubleshooting from a senior admin. Instead of sharing credentials or giving permanent access, we used One Identity Safeguard to grant temporary privileged access. The admin requested access through the system, it got approved, and One Identity Safeguard automatically provided the credentials without exposing the actual password. The entire session was recorded, which gave us confidence from a security and audit perspective. What made a difference was that once the task was completed, the access was automatically revoked and the password was rotated or changed, alleviating concerns about lingering access or manual cleanup. This made the entire process much more secure and streamlined compared to previous methods.

What is most valuable?

The best features of One Identity Safeguard include several standout capabilities we rely on heavily. The biggest feature for us is privileged session monitoring and recording, which gives full visibility into what admins are doing, and the ability to replay sessions later is particularly useful for audits or troubleshooting. It enhances security since everything is tracked and traceable. Another key feature is secure password management with automatic rotation, eliminating the need for manual credential management. The system handles password changes regularly, significantly reducing risk. We also find the access request and approval workflow very valuable. Instead of informal access sharing, everything goes through a structured process that maintains control and compliance. We would also highlight real-time monitoring and alerting; if any suspicious activity occurs during a session, it can be flagged or halted immediately, adding an extra layer of protection. Overall, the combination of visibility, control, and automation makes it very useful, focusing on securing access while making the process manageable and auditable.

Beyond the main use case, One Identity Safeguard has integrated into our daily operations for access control, not just for high-risk situations. We use it routinely for managing privileged sessions, especially for admins who need temporary access to different systems. One standout aspect is how it enforces a structured workflow. Instead of informal access requests over email or chat, everything goes through an approval process, keeping things clean and auditable. It reduces dependency on individuals since credentials are not shared manually anymore, fostering better security habits across the team. People are more aware of access policies, and there is a clear accountability trail for every action. It is not just a tool we use occasionally; it is essential to our regular IT and security processes.

There are smaller features worth noting as well. One we find particularly useful is the ability to launch sessions directly through the platform without exposing credentials, allowing admins to connect through One Identity Safeguard without needing to see the password. Another beneficial feature is the session search and indexing; if an investigation is necessary, we can quickly identify specific sessions based on users, time, or activity rather than manually sifting through logs. This capability has been extremely helpful during audits or incident reviews. Furthermore, the policy-based access controls are quite flexible. Once set up properly, access governance operates automatically in the background, reducing manual effort. Integration with Active Directory services facilitates onboarding and management, avoiding the need to recreate everything from scratch. It is these smaller practical features that enhance usability on a daily basis, not just in audits or critical situations.

What needs improvement?

One Identity Safeguard works well for us overall, but there are several areas where improvements could be made. The initial setup and deployment can be quite complex, particularly if you are new to privileged access management tools, and understanding the architecture and configuration requires time. A more guided setup or simpler onboarding would be beneficial. The user interface could also be improved; while functional, it is not always intuitive, especially for new users. A more modern and user-friendly UI would facilitate daily operations. We have also found that reporting and customization of reports could be more flexible; although the data is available, it sometimes requires extra effort to obtain the desired format or detail level for audits or management reporting. Additionally, customer support response times could improve, particularly for non-critical issues; while the support team is knowledgeable, faster turnaround would make a difference. Overall, these are not deal breakers, but enhancing these areas would make the product more efficient and easier to adopt.

We would appreciate more automation and smarter workflows. While the approvals process functions effectively, adding more flexibility, such as conditional approvals or risk-based access, would enhance its strength. We also believe that better dashboarding and visibility would help; while data can be obtained, having customizable or real-time dashboards for aspects like active sessions, risk alerts, or access trends would allow for a quick overview without requiring in-depth report digging. Overall, these enhancements do not indicate major gaps, but they would improve usability and give the product a more modern and future-ready feel.

For how long have I used the solution?

I have been using One Identity Safeguard for a year.

What do I think about the stability of the solution?

One Identity Safeguard has proven to be stable and reliable within our environment. Once we managed to get past the initial setup and configuration, it operates consistently without major issues or downtime. Day-to-day tasks such as access requests, session monitoring, and password rotation function smoothly. It appears designed as a dependable enterprise-grade solution, reflecting well in its production performance. Similar to most complex security tools, we encountered minor issues during deployment and fine-tuning, but none that significantly impacted operations. Stability has not been a concern; it has been a reliable part of our environment.

What do I think about the scalability of the solution?

One Identity Safeguard has managed scalability effectively in our experience. As our environment grows—adding more servers, users, and privileged accounts—we have scaled its use without significant complications since we are using the virtual appliances model. Scaling primarily involves allocating additional resources or deploying more instances as needed. Platform-wise, it is designed to support enterprise-scale environments, capable of managing large numbers of sessions and users as long as it is correctly sized and configured. However, we have noticed that performance can vary based on how it is deployed; the type of workload and the number of active sessions influence capacity. Proper infrastructure planning is therefore crucial. Overall, it has adapted to our growth without necessitating major redesigns, requiring only resource tuning and scaling as demand escalated. We would say it is highly scalable, particularly for mid to large enterprise environments, provided the architecture is well planned.

How are customer service and support?

Overall, our experience with One Identity Safeguard support has been quite positive. The support team is generally knowledgeable and technically adept, particularly when addressing complex issues. Whenever we raise critical tickets, they guide us appropriately and provide workable solutions. From our observations, once we connect with the right support engineer, the quality of assistance is high. The primary area for improvement is response speed and escalation, which aligns with general user feedback, noting strong support but inconsistent response times. Overall, we would assess the support as reliable and knowledgeable, although there is scope for improvement regarding response consistency.

Which solution did I use previously and why did I switch?

Before transitioning to One Identity Safeguard, we mainly relied on a mixture of manual processes and basic access control tools, using native solutions such as Active Directory for access management along with internal processes for handling privileged credentials. We decided to switch due to scalability and security concerns; the existing approach was inadequate, leading to challenges with shared credentials, limited visibility of privileged sessions, and insufficient audit trails. It required substantial manual effort to manage and track access. After evaluating several dedicated PAM solutions, we selected One Identity Safeguard because it offered a more comprehensive and centralized approach, highlighting features such as session recording, automated password rotation, and structured access workflows. The move stemmed from our need for improved security, compliance, and operational efficiency as our environment expanded.

How was the initial setup?

The initial deployment took us around three weeks. Setting up the virtual appliances was relatively fast, but a significant amount of time went into configuration, integrating it with existing systems such as Active Directory, and defining access policies. We also allocated time to test different use cases and ensure everything operated as expected before broader rollout. While the technical setup was quick, the overall time was largely influenced by planning, integration, and fine-tuning.

Overall, the deployment was fairly smooth, though there was a slight adjustment period for our privileged users. Initially, some admins found it somewhat disruptive as they were accustomed to direct access, and now had to use an approval workflow in One Identity Safeguard to initiate sessions. There was a small learning curve and some resistance initially; however, once they became familiar with the process, things settled down quickly. Many users even began appreciating the simplified access requests and the removal of the need to manage or remember privileged credentials. We facilitated the transition by implementing a phased rollout and providing basic training, which helped minimize disruptions. While there was initial friction, it was temporary, and overall adoption progressed smoothly.

What about the implementation team?

The team managing One Identity Safeguard required a moderate level of training. We spent several days reviewing the architecture, configuration, and best practices, followed by a couple of weeks of hands-on learning during the implementation phase. While the tool is not overly complex, understanding how to design privileged access workflows and policies is essential for maximizing its use. For end users, particularly admins just needing to request and use access, the training requirements were minimal; a short session or demonstration sufficed to illustrate how to request access and launch sessions through the platform. Most people adapted quickly after one or two uses. Overall, more effort is needed on the admin side, while regular users find it quite straightforward.

What was our ROI?

We have seen a return on investment since implementing One Identity Safeguard. From a time-saving perspective, access provisioning has accelerated dramatically; what used to take twenty to thirty minutes per request can now be completed in just a few minutes, which accumulates significantly across multiple daily requests. Overall, we have likely reduced admin effort related to access management by forty percent, and from an operational efficiency standpoint, we no longer need to manage or rotate privileged credentials manually. This shift saves a considerable amount of ongoing effort and diminishes dependency on a few key individuals. We have also experienced indirect ROI by reducing security risk; quantifying it precisely is challenging, but eliminating shared credentials and enforcing session monitoring has materially lowered our exposure to potential incidents, which could be costly if they occurred. In terms of audit compliance, we have cut preparation time by approximately forty to fifty percent since most required data is readily available through logs and sessions. While headcount has not decreased, it has allowed our teams to focus more on strategic tasks instead of manual access management. Therefore, the ROI stems from a combination of time savings, enhanced security posture, and streamlined audit processes rather than direct cost reduction.

What's my experience with pricing, setup cost, and licensing?

Our pricing and licensing experience was fairly typical for an enterprise security solution. It is not the cheapest option available, but it aligns with the level of security and control it delivers. The initial setup cost was moderate; we did not incur major hardware expenses as we opted for virtual appliances, but there was still some investment needed for configuration and internal resources. Licensing is structured and scalable, which is beneficial as the environment grows, although it can seem complex initially to fully understand what is included and how to size it appropriately, requiring close collaboration with the vendor during that phase. From a value perspective, we see it as justified because it replaces many manual processes and mitigates security risks. However, organizations should plan their licensing thoughtfully to avoid over or under-provisioning. Overall, it represents a solid investment, although entering with a clear understanding of requirements is essential for maximizing value.

Which other solutions did I evaluate?

Before selecting One Identity Safeguard, we assessed a few PAM solutions, specifically CyberArk and BeyondTrust. Both are reputable solutions and widely recognized in the market. CyberArk is particularly feature-rich, but we found it somewhat complex and costly relative to our requirements. BeyondTrust was also a strong contender, especially regarding usability, but in our case, One Identity Safeguard presented a better balance between functionality, ease of use, and overall cost. We also took into account how well One Identity Safeguard integrated into our existing environment and the speed at which we could deploy it compared to alternatives. Overall, the decision was not due to shortcomings of the other tools, but rather finding the right fit for our specific needs.

What other advice do I have?

My main advice for those considering One Identity Safeguard is to carefully plan your implementation beforehand. This is not a plug-and-play tool; you will extract the most value by clearly defining your privileged access policies, workflows, and use cases in advance. We also highly recommend conducting a proof of concept in your environment to test real scenarios, particularly edge cases such as legacy systems or service accounts, as challenges often arise in these areas. This testing approach is strongly advocated by practitioners since real-world scenarios provide a clearer picture than demos. Additionally, invest time training your admins and establishing clear processes. The tool is powerful, but it works most effectively when your team understands how to use it properly. From a technical standpoint, ensure you size and secure your deployment accurately—planning for storage, access restrictions, and network setup, especially in cloud environments, is vital. Overall, it is a robust solution whose success hinges on effective planning, implementation, and alignment with your organization's processes. I would rate this product an eight out of ten.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    Aditi Kunte-Gummul

Centralized controls have transformed privileged access and now ensure accountable daily operations

  • April 25, 2026
  • Review provided by PeerSpot

What is our primary use case?

One Identity Safeguard is used primarily in our day-to-day operations to manage and secure privileged access across our IT environment by controlling, monitoring, and auditing all administrative sessions. Instead of sharing static credentials, users request access through One Identity Safeguard, which grants time-bound privileged sessions with proper approval workflows. It automatically records and monitors these sessions for security and compliance purposes, while also securely storing and rotating passwords for critical systems, reducing the risk of credential misuse. Overall, it helps us to enforce strong governance, maintain accountability, and ensure that all sensitive access is controlled, traceable, and aligned with our security policies on a daily basis.

A recent example of using One Identity Safeguard was when a team member needed temporary administrative access to a production server for troubleshooting. Instead of sharing credentials directly, they raised a request through One Identity Safeguard that went through an approval workflow. Once approved, they were granted a time-limited session without ever seeing the actual password. The entire session was recorded and monitored in real-time. After the task was completed, access was automatically revoked and the password was rotated. This ensures security, accountability, and compliance without any manual intervention or risk of credential misuse.

In addition to the core use case, One Identity Safeguard fits seamlessly into our workflow by acting as a central control point for all privileged activities. This means every sensitive access request, whether for servers, databases, or network devices, follows a standardized and secure process with approvals, session monitoring, and automatic credential management. It has significantly reduced the need for manual password sharing and tracking, while also improving coordination between teams because everyone follows the same access process, making our operations more structured, secure, and audit-ready without slowing down productivity.

What is most valuable?

One Identity Safeguard's best features that stand out the most are its strong combination of password vault, session monitoring, and automated access control. It securely stores and automatically rotates privileged credentials, so users never see the actual password, which greatly reduces security risk. The session recording and real-time monitoring provide complete visibility into all administrative activities, making auditing and compliance much easier. Another key feature is its approval-based workflow system that ensures every privileged access request is controlled and time-bound, along with real-time alerting for threat detection that helps quickly identify suspicious behavior. Overall, these features work together to provide a highly secure, transparent, and well-governed privileged access environment that fits seamlessly into daily operations.

Session monitoring and real-time alerting have improved our security by giving full visibility into admin activities. For example, we once detected an unusual command during a privileged session and could immediately review the live session recording and take action, which helped prevent a potential threat. Overall, it has made our approach more proactive by allowing us to monitor, detect, and respond to suspicious behavior instantly, instead of reacting after an issue occurs.

One Identity Safeguard has had a strong positive impact on our organization by significantly improving security, control, and accountability around privileged access. We no longer rely on shared or static credentials and instead use controlled, time-bound access with full session monitoring, which has reduced the risk of misuse and insider threats. It also makes audits much easier because every activity is recorded and traceable. Operationally, it has streamlined workflows by automating password management and access approvals, saving time for the IT team and creating a more structured, secure, and compliant environment overall.

What needs improvement?

One Identity Safeguard can be improved by making the user interface more intuitive and easier to navigate, especially for new users who may find the initial experience slightly complex. Simplifying the setup and configuration process, which can require technical expertise and time during deployment, would also be beneficial. There is room to enhance its reporting and dashboard customization to provide more flexible, real-time insights without relying on external tools. Improving integration capabilities with modern cloud platforms and third-party applications would make it more adaptable in hybrid environments. Overall, while it is a strong solution, these improvements would make it more user-friendly and efficient to manage.

Beyond the earlier points, better performance optimization and faster load times when dealing with large volumes of session recordings or logs would be valuable. Sometimes searching or reviewing sessions can feel slightly slow. Enhancing alert customization with more granular controls would help reduce noise and focus only on critical security events. More detailed and simplified documentation or in-product guidance would make troubleshooting and advanced configuration easier for teams, especially during initial adoption. These small enhancements would further improve usability and overall efficiency.

For how long have I used the solution?

I have been using One Identity Safeguard for the last one and a half years.

What do I think about the stability of the solution?

One Identity Safeguard is quite stable and reliable, as it consistently handles privileged access management tasks without major disruption. This aligns with user feedback where it is often rated very high for stability, sometimes around 9 out of 10, with minimal downtime and strong performance even in enterprise environments. Although like any system, there can be occasional minor issues such as small bugs or upgrade-related challenges, overall it is dependable and performs smoothly for day-to-day operations.

What do I think about the scalability of the solution?

One Identity Safeguard handles scalability quite well, as it is designed with a flexible architecture that can grow with our organization, supporting additional users, systems, and workloads without major performance issues. Features like clustering and distributed deployments help manage load effectively as the environment expands. Overall, it scales smoothly for enterprise use with only minor challenges, such as needing proper planning and resource allocation when scaling to very large environments.

How are customer service and support?

Customer support for One Identity Safeguard has been generally good in our experience, as the support team is knowledgeable and helpful in resolving standard issues, especially during setup and troubleshooting. However, there have been occasional delays in response time for more complex cases, which aligns with some user feedback where support is effective but could be improved in responsiveness and consistency for critical issues. Overall, our experience has been positive, but with slight room for improvement in faster turnaround for advanced or urgent problems.

Which solution did I use previously and why did I switch?

Before using One Identity Safeguard, we relied on manual credential management and some basic tools within Microsoft Active Directory, but we switched because those lacked proper security, auditing, and centralized control for privileged access, which One Identity Safeguard handles much more effectively.

How was the initial setup?

The deployment of One Identity Safeguard in our organization was relatively moderate in terms of timeline. The initial setup of the virtual appliances and basic configuration was completed within a few days, but the overall deployment, including integration, policy setup, access workflow, and testing, took a couple of weeks to fully stabilize. While the core installation is quick, achieving a fully optimized and production-ready setup requires proper planning and time to align with existing security and operational processes.

What about the implementation team?

We do not have any business relationship with the vendor beyond being a customer, as we use One Identity Safeguard purely for internal privileged access management and security purposes. We are not part of their partner ecosystem, such as a reseller, integrator, or service partner, although we are aware that One Identity Safeguard does offer a structured partner program that includes resellers, service providers, and implementation partners within its global partner network.

What was our ROI?

We have seen a clear return on investment with One Identity Safeguard, as it has reduced manual efforts by around 40 to 50%, improved audit readiness significantly, and saved time on access management tasks, allowing the IT team to focus on more critical work without needing additional resources.

What's my experience with pricing, setup cost, and licensing?

Our experience with pricing, setup cost, and licensing for One Identity Safeguard was generally straightforward, as the licensing model is typically based on the number of users or managed assets, which makes it scalable. The procurement and setup process was smooth with clear guidance from the vendor. Although the overall cost is on the higher side compared to similar tools and some effort was needed to fully understand licensing and the feature inclusion, considering the strong security, automation, and compliance benefits it provides, we found the investment justified with no major challenges during implementation.

Which other solutions did I evaluate?

Before selecting One Identity Safeguard, we evaluated other privileged access management solutions such as CyberArk, BeyondTrust, and Delinea, but we chose One Identity Safeguard because it offered a strong balance of security, ease of use, and integration capabilities suited to our environment.

What other advice do I have?

The training required for One Identity Safeguard was moderate. Administrators needed a more in-depth understanding of policies, session management, and configuration, which took some structured learning and hands-on practice over a few days. For our end-users, the training was fairly simple since they mainly needed to learn how to request access and use approved sessions, which was easy to pick up with basic guidance. Overall, it was not overly complex, but it did require some initial effort for admins to fully utilize the platform effectively.

The deployment of One Identity Safeguard had a manageable impact on our privileged users. There was a slight initial adjustment period where users had to adapt to the new process of requesting access and working through controlled sessions instead of using direct credentials, which caused minor disruption in the beginning. However, with proper communication and training, the transition became smooth. Over time, users actually found it more convenient and secure since they no longer needed to manage or remember privileged passwords. Overall, the deployment did not significantly disrupt operations and quickly became a normal part of the workflow.

Feedback from our team on One Identity Safeguard has generally been positive, especially regarding its strong security features, reliable session monitoring, and the convenience of not having to handle or remember privileged passwords, which has improved both confidence and compliance in daily operations. However, some users have mentioned that the interface can feel a bit complex initially and takes time to get used to. There have been occasional comments about performance being slightly slow when searching session recordings, but overall, the usability is considered good once familiar, and the functionality is highly valued for maintaining secure and controlled access across the organization.

The integration of One Identity Safeguard with systems such as Microsoft Azure and Active Directory was generally manageable but required some planning and technical understanding. The core integrations were fairly straightforward with available connectors and documentation. However, certain configurations, especially around secure credential handling, session policies, and aligning with existing workflows, took additional effort and testing. In some cases, we faced minor challenges with fine-tuning permissions and ensuring seamless automation in DevOps processes. But overall, once properly set up, the integrations have been stable and effective in supporting our security and operational needs.

I would rate this review as an 8 out of 10 overall.


    Twinkle Solanki

Centralized controls have improved privileged access security and audit visibility

  • April 20, 2026
  • Review from a verified AWS customer

What is our primary use case?

In our organization, the primary use of One Identity Safeguard is managing and securing privileged access, and we mainly use it to store and protect sensitive credentials like admin passwords, ensuring that they are not exposed or misused. It also helps in monitoring privileged sessions, allowing us to track and audit activities performed by administrators or high-level users. This adds a stronger layer of security and compliance, as all credential access is controlled, recorded, and reviewed when needed. Overall, it plays a key role in protecting sensitive systems and reducing the risk of insider or outsider threats.

A common example of how we use One Identity Safeguard to secure privileged access is when a system administrator needs access to a production server. Instead of sharing or knowing the actual admin password, they request access through One Identity Safeguard, which securely provides a temporary credential for a session without exposing the password. This system automatically records an entire session, including actions performed on the server. If anything unusual happens, such as an unauthorized change or risky commands, the session logs and recording can be viewed by a security team, ensuring that privileged access is tightly controlled, fully monitored, and auditable at all times.

One additional point about our main use case is that we use One Identity Safeguard not just for securing access but also for enforcing strict governance and accountability across teams. For example, we apply role-based access control and approval workflows, so any privileged access request must be approved before it is granted.

What is most valuable?

The best features of One Identity Safeguard mainly revolve around strong security, visibility, and control over privileged access. One of the most valuable features is its password management, where sensitive credentials are securely stored, automatically rotated, and accessed only through a controlled workflow, reducing the risk of misuse. Another standout feature is session monitoring and recording, which captures every action taken during privileged sessions.

The session monitoring and recording feature in One Identity Safeguard has been extremely valuable for our team, especially from a security and compliance perspective. We use it quite regularly whenever an administrator accesses critical systems. Every privileged session is recorded in detail, covering screen activity, commands executed, and user behavior, so we have a complete audit trail. This has helped us quickly investigate incidents, verify actions taken on sensitive systems, and ensure that all activities follow internal policies.

One Identity Safeguard has had a very positive impact on our organization, especially in terms of security, efficiency, and visibility. It has helped us centralize and control privileged access and provided a structured secure approach. As a result, we now have much better visibility into accessing credentialed systems and the actions performed, which has improved accountability and compliance.

One Identity Safeguard has significantly improved accountability and compliance by giving us complete visibility of all privileged activities. Every access requires approval, and a session is logged and recorded, which means we always have a great audit trail of who accessed what and when. This has made internal and external audits much smoother, as we can quickly provide evidence without manually tracking.

What needs improvement?

One Identity Safeguard is a strong PAM solution, but there are definitely a few areas where it could be improved based on practical experience and known limitations. One key area is performance and resource usage, especially when advanced features like session recording or OCR are enabled. These features consume significant CPU and storage, and in some cases, may slow down connections or processing time if not optimized properly. Improving efficiency here would make the platform smoother and more scalable.

One additional improvement that would be helpful in One Identity Safeguard is better integration flexibility with modern cloud and DevOps tools. While it supports many systems, connecting with newer platforms for automation workflows in dynamic environments can sometimes require extra effort or customization.

For how long have I used the solution?

I have been using One Identity Safeguard for two years.

What do I think about the stability of the solution?

One Identity Safeguard is stable.

What do I think about the scalability of the solution?

One Identity Safeguard is highly scalable, and that is a core strength in enterprise environments. It is designed for scale through clustering and a distributed architecture, allowing multiple appliances to work together as a single system. For example, organizations can add multiple One Identity Safeguard appliances to handle an increasing number of users, privileged accounts, and session traffic without impacting performance.

How are customer service and support?

Customer support for One Identity Safeguard has been generally reliable based on our experience. On the positive side, the customer team is knowledgeable and technically strong, especially when dealing with configuration issues, session monitoring, or password-related queries. For standard or well-defined issues, responses are usually helpful and resolve problems efficiently.

Which solution did I use previously and why did I switch?

We evaluated a few other privileged access management (PAM) solutions before implementing One Identity Safeguard, including CyberArk and other enterprise PAM tools in the same space.

How was the initial setup?

The deployment of One Identity Safeguard was relatively quick compared to many other IAM and PAM solutions because it is delivered as a pre-configured appliance, either physical or virtual. The initial setup can be done quite fast, which helps to reduce the time to value.

What about the implementation team?

The deployment of One Identity Safeguard was fairly smooth overall with minimal disruption for privileged users. During the initial rollout, there was a short adjustment period where users had to request access through the system instead of directly using credentials, which slightly changed their workflow. However, once they became familiar with the process, it actually improved their experience by simplifying access and removing the need to remember or manage sensitive passwords.

The training required for One Identity Safeguard was quite manageable and varied by role. For end-users and privileged users, training was minimal, and basic guidance was enough for them to understand how to request access and start sessions since the interface is fairly straightforward for daily use.

What was our ROI?

We have seen a clear return on investment with One Identity Safeguard, mainly driven by time savings, reduced manual effort, and fewer security-related incidents. One of the biggest measurable improvements has been in IT workload reduction. After implementing One Identity Safeguard, we saw a significant drop in manual tasks including password handling, privileged access approvals, and incident troubleshooting.

What other advice do I have?

My advice to others looking into using One Identity Safeguard is that we have seen a clear return on investment, mainly derived from saved operational efficiency and reduced security overhead. A simple way to explain it is time saved, faster administration, fewer security incidents, and efficiency gained.

Overall, One Identity Safeguard stands out as a strong and well-built privileged access management solution, especially for organizations that want tighter control over admin activity without slowing down operations. I would rate this product a nine out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    Ahitesh Anumala

Privileged access has become tightly controlled and audit preparation now runs faster

  • April 20, 2026
  • Review provided by PeerSpot

What is our primary use case?

I mainly use One Identity Safeguard to secure and control privileged access by managing admin credentials, granting time-based access, and monitoring sessions to ensure security and compliance.

For example, when an admin needs access to a production server, they request it through One Identity Safeguard, which grants time-limited access after approval. The system automatically injects the credentials, so the password is never exposed, and the entire session is monitored and recorded. This helps my team maintain security and quickly review activity during an audit.

What is most valuable?

One key benefit of my main use case with One Identity Safeguard is that it helped me eliminate shared admin credentials, which was a major security risk earlier. Now, every access request is tracked and tied to an individual user, improving accountability. It also simplified audits by providing clear session records, which solved a big challenge I previously faced with compliance visibility.

The best features One Identity Safeguard offers include credential injection, session monitoring, and role-based access control. Credential injection ensures passwords are never exposed to users, improving security, while session monitoring and recording provide full visibility and an audit trail of activity. Role-based access helps enforce a least privilege policy, and additional features such as real-time alerts, reporting, and integration with other systems make it a comprehensive solution for managing and securing privilege.

What needs improvement?

I would appreciate more flexibility in reporting and easier customization of dashboards in One Identity Safeguard. While the core features are strong, some advanced configuration can be somewhat complex. Features such as integration are useful but are used less frequently in daily operations compared to credential management and session monitoring. Adding a more intuitive control and simplifying advanced settings would enhance the usability.

One Identity Safeguard could be improved with a more user-friendly interface and simpler initial setup, as the learning curve can be somewhat steep. Enhancing reporting customization and expanding integration with more third-party tools would also add value. Additionally, faster support response times and smoother scalability for large environments would further improve the overall experience.

A specific challenge I faced during the use of One Identity Safeguard was during initial setup and policy configuration, which was time-consuming and required careful tuning to match my environment. At times, navigating advanced settings and generating custom reports also felt less intuitive, which slowed things down. Improving documentation and simplifying these configurations would make the experience much smoother for my team.

For how long have I used the solution?

I have been using One Identity Safeguard for two years.

What do I think about the stability of the solution?

Overall, One Identity Safeguard's authentication service is stable and reliable.

What do I think about the scalability of the solution?

One Identity Safeguard is highly scalable and can support growing environments effectively. It allows me to add more systems and users without major performance issues, and its clustering and load distribution capabilities help maintain performance as demand increases. Overall, it scales well for both mid-sized and large enterprise environments.

How are customer service and support?

Customer support for One Identity Safeguard was generally good, with a knowledgeable and helpful team assisting during the setup and troubleshooting. In most cases, issues were resolved efficiently, but response times can sometimes be slower for more complex problems.

Which solution did I use previously and why did I switch?

I was previously using a basic in-house solution for managing privileged credentials, but it lacked advanced features such as session monitoring and automated password management. I switched to One Identity Safeguard for better security, centralized control, and improved compliance capability.

How was the initial setup?

The integration of One Identity Safeguard with my DevOps environment and cloud applications was generally smooth, especially with standard systems, but it required some initial configuration and fine-tuning to align with my DevOps workflow and core cloud applications. I did face minor challenges around setup and policy configuration, but once implemented, it worked reliably and integrated well with my environment.

What was our ROI?

I have seen a clear return on investment with One Identity Safeguard. I have reduced manual effort for access management by around thirty to forty percent, which has saved significant staff hours. Audit preparation time has decreased by nearly fifty percent, and improved security controls have helped lower the risks of costly incidents. Overall, the efficiency gains and risk reduction have justified the investment.

What's my experience with pricing, setup cost, and licensing?

In terms of pricing and licensing, my experience with One Identity Safeguard has been fairly reasonable. It is based on the number of users and privileged accounts, with options for a subscription or perpetual licensing. The initial setup cost was moderate, especially considering the security benefits, although some investment was required for deployment and configuration. Overall, I found the pricing was justified with the environment.

Which other solutions did I evaluate?

Before choosing One Identity Safeguard, I evaluated a few other privileged access management solutions, such as CyberArk Privileged Access Manager, Delinea Secret Server, and BeyondTrust Privileged Access Management. These are well-known options in the market and commonly compared during the evaluation.

What other advice do I have?

My advice for others looking into using One Identity Safeguard would be to plan the implementation carefully and invest time in understanding your access policies and workflow before deployment. One Identity Safeguard is a powerful tool, but it is not plug and play. It requires proper configuration and tuning to get the best results. Start with a phased rollout, focus on high-risk privileged accounts first, and ensure your team is trained properly. Once properly implemented, it can significantly improve security, visibility, and compliance across the organization. I would rate this product nine out of ten.


    Prathamesh Pawar

Centralized control has eliminated shared credentials and provides secure audited admin access

  • April 18, 2026
  • Review provided by PeerSpot

What is our primary use case?

In my daily operations, I rely on One Identity Safeguard for administrator requests for access through One Identity Safeguard, which are approved via workflows. Once approved, sessions are launched, ensuring security without revealing passwords, and all activities are recorded for auditing purposes.

In our environment, there were multiple administrators using shared privilege accounts, which created accountability and security risks. With One Identity Safeguard, we implemented password vaulting where passwords are automatically rotated and never exposed to users, ensuring secure access and eliminating shared credential risks.

In our daily operations, One Identity Safeguard is primarily used to manage and control privilege access to critical systems such as servers, network devices, and databases. Administrators and users request access through One Identity Safeguard, which follows an approval-based workflow. Once access is approved, users can securely connect to the target system without directly viewing or knowing the privilege credentials. All sessions are proxied through One Identity Safeguard, ensuring that passwords are never exposed. Additionally, every session is monitored and recorded, allowing security teams to review activities when required. We also use One Identity Safeguard for automated password rotation, ensuring that privileged account passwords are regularly updated without manual intervention. Overall, it acts as a centralized platform for security, secure access management, auditing, and compliance in our environment.

How has it helped my organization?

The implementation of One Identity Safeguard has had a significant positive impact on our organization's security and operational efficiency, reducing the risk of credential misuse by eliminating shared privilege accounts and enforcing secure password vaulting with automated rotation. One Identity Safeguard improves security by eliminating shared credentials, enhancing visibility through session monitoring, simplifying compliance, and streamlining privilege access management.

After implementing One Identity Safeguard, we achieved several measurable improvements in our environment. We eliminated the use of shared privilege accounts, significantly improving accountability and reducing security risks. Privileged password exposure was reduced to zero, as all credentials are securely stored and managed through the vault with automatic rotation. Audit and compliance processes became faster and more efficient, as we could provide complete session logs and recordings whenever required. We implemented shared account management, achieved zero password exposure, improved audit readiness, reduced access management time, and gained full visibility into privileged activities.

What is most valuable?

The most valuable features of One Identity Safeguard are its strong privilege access control and session security capabilities. One key feature is password vaulting with automated rotation, which ensures that privileged credentials are never exposed to users and are regularly updated. Key features include password vaulting with rotation, session monitoring and recording, secure remote access without exposing credentials, approval-based workflows, and seamless integration with Active Directory.

One Identity Safeguard integrates seamlessly with Microsoft Active Directory, simplifying user authentication and access management. The integration provides centralized authentication, group-based access control, and automated management of privileged domain accounts, reducing manual efforts and improving security.

Additional features include session proxy access, granular policy control, threat detection, detailed audit logs, multifactor authentication, and high availability support.

What needs improvement?

While One Identity Safeguard is a strong privilege access management solution, there are some areas where improvements can be made. The initial deployment and configuration can be complex, especially in a large enterprise environment with multiple integrations. The user interface can be improved to make navigation more intuitive, particularly for new users and administrators. Reporting and customization options could be more flexible, as generating tailored reports sometimes requires additional effort. Integration with third-party tools, although supported, can be time-consuming and may require deeper technical expertise. Additionally, performance tuning may be required in high-load environments to ensure optimal session handling response times. Areas for improvement include complex initial setup, UI enhancement, more flexible reporting, and easier third-party integration.

Improvements can be made in areas such as simplifying the deployment and initial configuration process, especially for large complex environments. The user interface could be made more intuitive and user-friendly, making it easier for new users and administrators to navigate. Reporting capabilities can be enhanced with more customization options and easier report generation. Streamlining integration with third-party tools and platforms could reduce implementation efforts and time. Additionally, improved performance optimization for high-load environments would help ensure smoother session handling and a better user experience.

For how long have I used the solution?

I have been using One Identity Safeguard for the last one year.

What do I think about the stability of the solution?

One Identity Safeguard is stable in my environment and has been reliable in our production environment. We have not experienced any major downtime or critical issues after the initial deployment and configuration phase. The solution performs reliably for daily privilege access operations, including session management and password vaulting. With proper sizing and high availability configuration, the system handles multiple concurrent sessions efficiently, making it a dependable and stable platform suitable for enterprise environments.

What do I think about the scalability of the solution?

One Identity Safeguard is highly scalable and well-suited for enterprise environments. The solution can handle a growing number of privileged accounts and target systems without significant performance impact when properly sized, supporting horizontal scaling by adding additional appliances, allowing organizations to expand capacity as needed.

How are customer service and support?

One Identity's customer support is knowledgeable and provides helpful guidance for troubleshooting and configuration-related issues. For standard issues, the response time is responsive and the resolutions are effective. For more complex or critical issues, response time can sometimes vary, but overall, my support experience has been satisfactory. Documentation and knowledge base resources are also useful for resolving common issues and understanding product features, making customer support reliable and meeting enterprise expectations.

Which solution did I use previously and why did I switch?

Before implementing One Identity Safeguard, we relied on manual methods and basic access control mechanisms to manage privileged accounts. In some cases, privileged credentials were shared among administrators, and password management was handled manually, increasing security risks and reducing accountability. We moved to One Identity Safeguard for better security, centralized control, and session visibility.

How was the initial setup?

The deployment of One Identity Safeguard in our environment took approximately four to six weeks. The initial setup of the physical appliance was straightforward, but the overall implementation required careful planning, especially for integration with Active Directory and onboarding the target systems. One of the main challenges was defining and configuring access policies and approval workflows according to the organization's requirements, but the solution is stable after implementation.

What about the implementation team?

The training required for One Identity Safeguard was moderate. For administrators, detailed training is needed to understand policy configuration, password vaulting, session management, and integration. It typically took a few days of hands-on sessions along with initial setup implementation support. For end-users, minimal training is required as the access request and approval workflow is straightforward and user-friendly. Overall, with proper initial training and documentation, the team quickly adapts to the solution in daily operations.

What was our ROI?

I believe One Identity Safeguard delivers a strong return on investment by significantly reducing security risks and improving operational efficiency. ROI is achieved through reduced security risks, lower manual efforts, faster audits, and improved operational efficiency.

What's my experience with pricing, setup cost, and licensing?

One Identity Safeguard is priced at a premium level, typical for enterprise-grade privilege access management solutions. The licensing is generally based on the number of privileged accounts, users, or appliances, depending on the deployment model and components used. The initial setup cost includes the appliance cost, implementation efforts, and integration with existing systems, such as Active Directory and other infrastructure components.

Which other solutions did I evaluate?

Before finalizing on One Identity Safeguard, we evaluated other privilege access management solutions, such as CyberArk and BeyondTrust. CyberArk is a strong market leader with advanced features, but it can be complex to implement and manage. BeyondTrust also offers good capabilities, especially for endpoint privilege management and remote access, but we found One Identity Safeguard to be more aligned with our requirements in terms of ease of use and deployment flexibility. We chose One Identity Safeguard because it provides a good balance between security, usability, and integration capabilities, particularly with Active Directory.

What other advice do I have?

Overall, my experience with One Identity Safeguard has been very positive. It is a reliable and secure privilege access management solution that effectively protects sensitive accounts and provides full visibility into administrator activity, with minor improvements needed in terms of UI and reporting enhancements.

Before implementing One Identity Safeguard, I advise clearly defining your privilege access management strategy and identifying all critical systems and accounts. Plan integrations in advance, especially with Active Directory and other security tools, to ensure a smooth deployment. Focus on designing proper access policies and approval workflows, as these play a key role in effective implementation. Provide adequate training to administrators so they can fully utilize features like session monitoring, password vaulting, and reporting. Starting with a phased deployment approach, onboarding critical systems first and then gradually expanding across the environment is beneficial. Overall, proper planning and user training are key to maximizing the benefits of the solution.

One Identity Safeguard is a mature and enterprise-ready privilege access management solution that provides a strong balance between security and usability. The key value of the solution lies in its ability to centralize privilege access control while maintaining full visibility and auditability for user activities, making it a mature and reliable PAM solution that balances security and usability with strong long-term value for enterprise environments. I would rate this solution a nine out of ten.


    Swapnil Karkala

Privileged access has become streamlined and compliance improves through automated monitoring

  • April 18, 2026
  • Review from a verified AWS customer

What is our primary use case?

Our primary use case for One Identity Safeguard includes privileged password management, where it includes vaulting, rotating, and checking in and checking out privileged credentials. Secure remote access helps to grant access to Windows/Linux servers based on group membership. We also use it for session monitoring and recording, where it helps to monitor, record, and audit privileged sessions for compliance. Access request simplification plus threat detection helps to streamline requests and quickly detect threats seamlessly.

In my day-to-day work, One Identity Safeguard helps to identify anomalous behavior, a deal breaker feature for some customers. It also helps to detect threats and streamline requests and quickly detect threats.

What is most valuable?

The best features One Identity Safeguard offers are out-of-box templates, which simplify password rotation workflows and have a nice interface. It is also pretty stable.

The out-of-box templates from One Identity Safeguard make onboarding much easier for my team in day-to-day work.

One Identity Safeguard's automation of password management and incident investigations has cut manual efforts significantly.

One Identity Safeguard has positively impacted my organization by improving compliance, posture, and audit capabilities. It has cut manual efforts by 30 to 40% via automation and also decreased privileged account incidents by up to 40%.

What needs improvement?

I think One Identity Safeguard can be improved as it can be slow sometimes.

Regarding needed improvements, I want to mention that there is a lack of documentation and many plug-in problems.

I think One Identity Safeguard needs improvements because sometimes the support team doesn't have answers for bugs.

What do I think about the stability of the solution?

One Identity Safeguard is very stable.

One Identity Safeguard is deployed in my organization as a hybrid model.

One Identity Safeguard is deployed in a hybrid cloud setup.

What do I think about the scalability of the solution?

One Identity Safeguard's scalability is very efficient; it handles my organization's growth effectively.

How are customer service and support?

The customer support for One Identity Safeguard is very responsive and proactive.

Which solution did I use previously and why did I switch?

I did not use another option before choosing One Identity Safeguard.

How was the initial setup?

The deployment of One Identity Safeguard took two to three weeks.

The deployment of One Identity Safeguard did not affect my privileged users; it was not disruptive to them.

Not much training was required to start using One Identity Safeguard, both for those who manage it and for end users. It is self-service, and it is very easy to learn how to use it. The learning curve is smooth.

What about the implementation team?

I use the virtual appliances version of One Identity Safeguard because it suits my organization well with load balancing.

What was our ROI?

I have seen a return on investment with One Identity Safeguard, leading to efficient management and lower upfront cost. It has reduced inside and external threats, which is essential for preventing privileged user damage, and decreased privileged account incidents by 40%.

What's my experience with pricing, setup cost, and licensing?

One Identity Safeguard has a competitive setup cost, and the pricing is competitive.

My experience with pricing, setup cost, and licensing for One Identity Safeguard is that the pricing is very competitive.

Which other solutions did I evaluate?

Before choosing One Identity Safeguard, I did not really evaluate other options.

What other advice do I have?

I chose eight out of 10 for One Identity Safeguard because the pricing is very competitive. It is a nice tool that helps to identify anomalous behavior, a deal breaker feature for some customers. It also helps with access request simplification plus threat detection, where it streamlines requests and quickly detects threats.

My advice for others looking into using One Identity Safeguard is that it is a serious, enterprise-grade identity safeguard. It excels at security, monitoring, and compliance, but trades off simplicity and ease of use.

One Identity Safeguard has been a cost-effective tool that has prevented major security breaches, avoided insider threats and misuse of admin privileges, and reduced audit and compliance costs. However, the initial cost plus setup effort is a bit high.

I gave this review a rating of 8 out of 10.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    Nikita Bhojwani

Centralized controls have strengthened privileged access security and simplified compliance audits

  • April 17, 2026
  • Review provided by PeerSpot

What is our primary use case?

Our primary use case for One Identity Safeguard is to secure, control, and monitor privileged access across critical systems in the organization. We mainly use it for privileged session management, password vaulting, and enforcing least-privilege access policy. It helps us manage administrative access to servers, databases, and network devices by centralizing credential storage and rotating passwords automatically. Additionally, we use it for session recording and real-time monitoring, which strengthens our audit and compliance capability. Overall, it plays a key role in reducing insider threats, improving security visibility, and ensuring regulatory compliance.

A common example of how we use One Identity Safeguard for privileged session management is when a system administrator needs access to a production server. Instead of sharing static credentials, they request access through One Identity Safeguard. For password vaulting, the admin never sees the actual passwords. One Identity Safeguard automatically injects the credential during login, and the password is rotated after the session ends. This ensures that credentials are never exposed or reused. For privileged session management, once the admin connects to the server through One Identity Safeguard, the entire session is monitored and recorded. If any suspicious activity occurs, we have the ability to terminate the session in real-time. These session recordings are also used later for auditing and compliance checks. This approach significantly improves security while still allowing admins to do their work efficiently without manual credential handling.

One additional point to add about our main use case is how well One Identity Safeguard integrated into our overall security workflow. It is not just a standalone tool; it works as a central control point for all privileged access. In our day-to-day operation, it reduces manual effort for the IT team by automating password management and access approval. It also standardizes how privileged access is handled across different teams, which improves consistency and reduces human error. Another important aspect is its role in compliance. Since all privileged activities are logged and recorded, it makes audits much smoother and faster. Instead of collecting logs from multiple systems, everything is available in one place. Overall, it fits seamlessly into our workflow by enhancing security without slowing down operations, which is critical for maintaining both productivity and control.

What is most valuable?

One Identity Safeguard offers several powerful features, but a few stand out in day-to-day use. The most important feature is privileged password vaulting. It securely stores credentials in a centralized vault and automatically rotates passwords, which significantly reduces the risk of credential misuse or leakage. Another key feature is privileged session management. It allows us to monitor, record, and even replay user sessions in real-time. This is extremely useful for both security monitoring and audit purposes, as every action can be traced back if needed. A standout capability is real-time monitoring and threat detection. The platform can generate alerts or even block suspicious activity during live sessions, which adds a strong layer of proactive security. I also find the session recording with search and indexing very valuable. Since sessions are indexed, it becomes easy to quickly investigate specific actions without reviewing entire recordings. Additionally, the analytics and behavior monitoring feature helps identify unusual user activity using behavioral patterns, which is useful for detecting insider threats or compromised accounts. Finally, automation and workflow-based access control is a significant advantage. Access requests, approvals, and provisioning are handled through automated workflows, reducing manual effort while ensuring consistent policy enforcement.

What needs improvement?

While One Identity Safeguard is a strong PAM solution, there are a few areas where it could be improved. One area is the user interface and reporting customization. Although the platform is functional, creating highly customized reports or dashboards can sometimes be less intuitive and may require additional effort. Another improvement area is integration flexibility, especially with some third-party or legacy systems. While it integrates well with standard environments like Active Directory, expanding smoother integration across a wider range of tools would make it even more versatile.

For how long have I used the solution?

I have been using One Identity Safeguard for two years.

What do I think about the stability of the solution?

One Identity Safeguard has been highly reliable and stable in our experience. Once deployed and properly configured, the platform runs consistently with minimal downtime. We have not faced any major performance issues, even while handling multiple concurrent privileged sessions and the integration across our hybrid environment. There have been occasionally minor issues, mostly related to integration or configuration, but nothing critical, and they were quickly resolved.

What do I think about the scalability of the solution?

One Identity Safeguard has shown good scalability in our experience and has effectively handled growth in our organization. As our environment expands, whether adding more users, servers, or cloud resources, it is relatively straightforward to scale by extending the deployment, especially since we are using virtual appliances. We can add capacity without major architecture changes or downtime. It also handles an increasing number of privileged sessions and access requests without noticeable performance degradation.

How are customer service and support?

Our experience with customer support has been quite positive. The support team is generally responsive and knowledgeable, especially for standard use configurations, and we have mainly expressed satisfaction in this area because we have solved almost all problems using One Identity Safeguard.

Which solution did I use previously and why did I switch?

Prior to implementing One Identity Safeguard, we were using a mix of native tools and manual processes, along with limited capability from tools like CyberArk Privileged Access Manager in some parts of the environment. We decided to switch to One Identity Safeguard mainly for its unified approach to privileged access management. It offered better centralized control, easier integration with our hybrid environment, and more streamlined workflows for both administrators and end-users. Another key reason was the ease of deployment and usability, which made it more practical for our team than maintaining multiple tools or a more complex setup.

How was the initial setup?

The deployment took approximately four to six weeks in our environment. The initial setup, including deploying the virtual appliance and basic configuration, was completed within the first one to two weeks. After that, most of the time went into integration with systems like Microsoft Active Directory and Microsoft Azure, policy configuration, and testing. We also spent time on fine-tuning access control, onboarding users, and validating workflows, which is critical to ensure everything runs smoothly in production.

What about the implementation team?

There is a formal vendor-partner ecosystem in place beyond a direct customer relationship with One Identity. One Identity operates through a structured partner program that includes system integrators, resellers, and managed service providers who help with implementation, deployment, and ongoing support for One Identity Safeguard. However, in our specific case, our relationship is primarily as a customer, and we do not have any strategic alliance, reseller, or co-development relationship with the vendor.

What was our ROI?

We have definitely seen a clear return on investment after implementing One Identity Safeguard, both in terms of cost savings and operational efficiency. From a time-saving perspective, audit preparation time has reduced by around 40 to 50 percent since all privileged activity logs and session recordings are centralized and available. What earlier took a day can be done in an hour now. In terms of operational efficiency, automation of password management and access workflows has reduced manual effort by approximately 30 to 40 percent, allowing our IT team to focus more on strategic tasks instead of routine access management. While it is harder to quantify exactly, the platform has helped us prevent potential security incidents by enforcing strict access control and real-time monitoring. Avoiding even a single major breach can result in significant financial savings.

What's my experience with pricing, setup cost, and licensing?

Our experience with pricing, setup cost, and licensing was reasonable for an enterprise-grade PAM solution, though it does require a notable initial investment. The licensing model is fairly structured, typically based on the number of users, assets, or sessions being managed. It is flexible enough to scale as the organization grows, but it is important to plan properly to optimize cost. In terms of setup cost, the main investment was around implementation, integration, and initial configuration. Since we deployed in a hybrid environment, there was some additional effort involved, but nothing unexpected for a solution of this scale.

What other advice do I have?

My advice to others considering One Identity Safeguard would be to start with a clear understanding of privileged access requirements and define strong governance policies upfront. One Identity Safeguard is a powerful tool, but its effectiveness depends on how well it aligns with your organization's PAM strategy. Another key point is to invest time in proper policy configuration, such as session recording rules, approval workflows, and access controls to avoid unnecessary friction for end-users while still maintaining strong security. Training and onboarding are equally important; administrators and the security team should be comfortable with reviewing session logs and responding to alerts. Otherwise, the value of monitoring and auditing can be diminished. Finally, continuous review is essential. Regularly analyze reports, refine policies, and ensure integration with your broader security stack to get maximum value from the platform.

One Identity Safeguard, in my experience, has had a significant positive impact on our organization, especially in terms of security, efficiency, and compliance. From a security standpoint, it has greatly reduced the risks associated with privileged accounts. By eliminating shared credentials and enforcing password rotation, we have minimized the chances of unauthorized access and insider threats. Operationally, it has improved efficiency by automating tasks such as password management and access approval. This has reduced the manual workload on the team and streamlined how privileged access is granted and monitored. It has also strengthened our compliance posture. Since all privileged activities are logged and recorded, audits have become much smoother and faster, with all the required data readily available in one place. Additionally, the real-time monitoring and session control capability have given us better visibility and faster response to potential risks, which has improved our overall incident management process. I would rate this review as a nine out of ten.


    Nitin Yadav

Secure access has improved privileged workflows and real-time monitoring streamlines daily tasks

  • April 17, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for One Identity Safeguard includes privilege access, session recording, and real-time monitoring.

In daily work, I use session recording and real-time monitoring as part of my workflow.

My main use case is privilege access.

What is most valuable?

The best features One Identity Safeguard offers include secure and controlled access along with real-time session controlling.

The real-time session control feature helps me in my daily tasks by providing session controlling and monitoring in user sessions that occur, allowing proactive management across web and platform access instead of reacting after something goes wrong.

Session monitoring and recording are also crucial parts of the features.

One Identity Safeguard has a noticeable positive impact around security and operational efficiency, providing secure, strong security, real-time monitoring, and full visibility.

Operational efficiency has improved as it requires less manual effort for the IT team and makes troubleshooting easier.

What needs improvement?

One Identity Safeguard needs improvement in deployment and integrating with other products.

Many team members feel that the biggest friction with One Identity Safeguard relates to access requests, session approvals, and policy changes, which require more clicks than expected.

I think One Identity Safeguard is a good product, but it just needs improvement in tech support.

For how long have I used the solution?

I have been using One Identity Safeguard for the last two years.

What do I think about the stability of the solution?

One Identity Safeguard is stable in my network.

What do I think about the scalability of the solution?

Scalability is very good as it can easily scale with organizational growth by adding more virtual appliances, and it handles increasing users, servers, and privilege accounts without any major performance issues.

How are customer service and support?

Customer support is really good.

Which solution did I use previously and why did I switch?

I previously used a different tool for managing, but it lacked centralized control, proper auditing, and security features.

How was the initial setup?

The deployment of the solution took around two to four weeks due to initial setups, integrations, and policy configurations.

End users need a minimum of two to three weeks to understand the solutions.

What was our ROI?

I have seen a return on investment in both money saved and time saved.

I have experienced noticeable time savings and some indirect cost benefits, specifically in that access provision has reduced from hours to minutes, requiring less manual effort, and the cost impact has been mitigated due to fewer security incidents and audit issues.

What's my experience with pricing, setup cost, and licensing?

The pricing, setup cost, and licensing are not the cheapest, but they offer strong security features that justify the cost.

The license is usually based on the number of user accounts, which is straightforward to understand, and the setup cost is good and reasonable.

Which other solutions did I evaluate?

Before choosing One Identity Safeguard, I evaluated BeyondTrust.

What other advice do I have?

My advice for others considering One Identity Safeguard would be to plan and execute the deployment properly during the implementation phase.

I have given this review a rating of 8.