Reviews from AWS customer

8 AWS reviews

External reviews

46 reviews
from

External reviews are not included in the AWS star rating for the product.


    SohanMulik

Centralized logins have simplified unix access and improved security and compliance

  • May 22, 2026
  • Review provided by PeerSpot

What is our primary use case?

In day-to-day work, I use One Identity Safeguard to manage centralized login for Linux and UNIX servers, troubleshoot login access issues, enforce security policies, manage AD-based permissions, monitor authentication logs, and ensure secure and compliant access across the systems.

Additionally, I use One Identity Safeguard for operational tasks like on-boarding and off-boarding users, reducing dependency on local accounts, improving audit and visibility, and simplifying administration through centralized access control and policy management.

What is most valuable?

The best features of One Identity Safeguard are centralized authentication, seamless Active Directory integration, single sign-on on Linux and UNIX systems, role-based access control, policy enforcement, and auditing capability, which improve security and simplify administration and enhance compliance across the enterprise environment.

The most valuable feature is seamless integration with Active Directory, allowing Linux and UNIX systems to use centralized AD authentication, enabling single sign-on, centralized user management, consistent security policy, and easier access control without maintaining separate local accounts.

Additionally, the auditing, policy enforcement, and centralized access management features of One Identity Safeguard are very valuable as they improve security, visibility, simplify compliance management, and reduce administrative effort across Linux and UNIX environments.

One Identity Safeguard has positively impacted my organization by reducing manual user management efforts, improving security through centralized authentication, eliminating most local account-related issues, simplifying access management, and improving audit and compliance visibility across Linux and UNIX systems.

What needs improvement?

One Identity Safeguard can be improved with a more modern and intuitive interface, better troubleshooting and diagnostic tools, enhanced real-time monitoring and reporting, and stronger integration with cloud and hybrid identity platforms to simplify administration and improve operational visibility.

Additionally, One Identity Safeguard could improve policy synchronization speed, provide clearer error messages during authentication failures, simplify complex configurations, and enhance automation and self-service capabilities to reduce administrative overhead in large enterprise environments.

For how long have I used the solution?

I have been using One Identity Safeguard for the last two years.

What do I think about the stability of the solution?

One Identity Safeguard is generally stable and reliable in an enterprise environment with consistent authentication performance and minimal downtime when properly configured and maintained.

What do I think about the scalability of the solution?

One Identity Safeguard scales well in enterprise environments, as it can efficiently handle a large number of Linux and UNIX systems and users through centralized authentication and policy management without significant performance impact.

How are customer service and support?

Customer support for One Identity has been generally good, with knowledgeable technical teams and effective guidance for most deployment and troubleshooting issues; although response times for complex cases can sometimes be slow.

Customer support for One Identity Safeguard is around a seven out of ten for strong technical expertise and helpful guidance, with some room for improvement in response and escalation times.

Which solution did I use previously and why did I switch?

Previously, I used local authentication and manual account management for Linux and UNIX systems, but I switched to One Identity Safeguard to achieve centralized authentication, better security, simplified administration, and improved compliance.

How was the initial setup?

The deployment of One Identity Safeguard took approximately two to four weeks, including planning, Active Directory integration testing, policy configuration, and phased rollout across Linux and UNIX systems.

What about the implementation team?

One Identity Safeguard required moderate training, especially for administrators managing Active Directory integration, authentication policies, and troubleshooting; typically, a few days of hands-on training and documentation review is enough for experienced system administrators to manage daily operations effectively.

What was our ROI?

I achieved a good ROI with One Identity Safeguard through approximately thirty to forty percent reduction in manual user management effort, fewer password and local account issues, faster access management, and improved audit and compliance efficiency, which saved administrative time and improved security operations.

What's my experience with pricing, setup cost, and licensing?

Pricing and licensing for One Identity Safeguard are generally enterprise-based and depend on the number of users and systems; while setup costs are moderate due to deployment, integration, and training requirements, overall the solution provides good value through centralized authentication, improved security, and reduced administrative overhead.

Which other solutions did I evaluate?

I evaluated solutions including CyberArk Privilege Access Management, BeyondTrust Remote Access, and Microsoft Entra ID before selecting One Identity Safeguard due to strong Active Directory integration and simplified Linux and UNIX authentication management.

What other advice do I have?

The feedback for One Identity Safeguard has generally been positive, especially regarding simplified login, single sign-on experience, and reduced password-related issues; while administrators appreciate the centralized authentication and improved security, some users mentioned that troubleshooting and advanced configuration could be more user-friendly.

One Identity Safeguard is integrated with tools and platforms including DevOps environments, Linux, UNIX applications, SSH-based systems, and Active Directory services, helping provide centralized authentication, role-based access control, and security management across infrastructure.

The integration of One Identity Safeguard with Active Directory was moderately easy; the core AD integration is straightforward, but advanced configuration, policy mapping, and troubleshooting in a complex hybrid environment require careful planning and some expertise.

I recommend One Identity Safeguard for organizations seeking centralized authentication, strong Active Directory integration, improved security, and simplified Linux and UNIX access management in enterprise environments. I would rate this product an eight out of ten overall.


    Mahesh dattatray malve

Centralized controls have strengthened privileged access and improved audit-ready accountability

  • May 19, 2026
  • Review provided by PeerSpot

What is our primary use case?

I primarily use One Identity Safeguard for Privileged Access Management, mainly to control, monitor, and secure administrative access to critical systems. I also used it for session monitoring and audit visibility for sensitive administrative activities. Having centralized logging and session tracking was important from both a security and compliance perspective. The practical use case involved temporary privilege access. Instead of giving permanent elevated permissions, teams could get controlled access for specific tasks or durations, which supported least privilege practices better.

One practical example was during a production support activity where a vendor team needed temporary administrative access to troubleshoot an application issue on a critical server. Instead of sharing privileged credentials directly, access was provided through One Identity Safeguard with time-based control. The session was monitored, and the access automatically expired after the approved maintenance window.

One additional area where One Identity Safeguard was useful was improving accountability around privileged operations. In many environments, multiple teams need elevated access for infrastructure, database, or application support, and without proper PAM controls, it becomes difficult to track who actually performed what action.

What is most valuable?

The strongest features of One Identity Safeguard are definitely privileged session monitoring, password vaulting, and controlled temporary access workflows. Those are the areas that stood out most in my day-to-day operations.

A feature area that I think is sometimes underrated is the centralized visibility One Identity Safeguard provides across privileged activities in a large environment.

One Identity Safeguard had a positive impact mainly in improving privilege access control, operational accountability, and audit readiness. Before implementing PAM properly, privileged access management was more dependent on manual controls and shared administrative practices, which increases both security and operational risk. One major improvement was better control over privileged credentials.

There were definitely some measurable operational improvements after implementing One Identity Safeguard. One noticeable improvement was audit readiness and reduction in access-related observations. Earlier, collecting evidence for privileged access reviews or administrative activity tracking required more manual efforts. With centralized session logging and monitoring, audit preparation becomes much faster and structured.

They mainly helped by improving accountability and reducing unnecessary permanent privilege access. For example, during production troubleshooting, external vendor or internal support teams sometimes needed elevated access urgently. Earlier, in many environments, teams would share privileged credentials directly to save time, but that created security and audit risk because multiple people could use the same account without proper visibility. With One Identity Safeguard, access could be approved for a limited duration and the session was monitored and logged.

What needs improvement?

One Identity Safeguard is a strong PAM solution, but there are definitely areas where it could be improved. I feel reporting and dashboard visibility could become more business-friendly. The technical teams can work with detailed logs and session data, but leadership teams often want quicker risk-focused insights instead of deep technical information.

For integration, One Identity Safeguard works well in core PAM scenarios, but in more complex environments, especially where there are multiple tools for IAM, SIEM, and DevOps, integration can sometimes require extra effort and planning. On user experience, one challenge is that different user groups experience the system differently. For security teams, the depth of control is good, but for operational teams like system admins or support engineers, the workflow sometimes feels a bit layered, especially under time pressure.

The reason it is not a perfect ten is mainly because of usability and operational friction in some scenarios. In real production environments, especially during urgent troubleshooting, the workflow can feel a bit heavy, and integrations with newer cloud-native ecosystems can require extra effort.

For how long have I used the solution?

I have been working in my current field for more than ten years.

I have been using One Identity Safeguard for two years.

What do I think about the stability of the solution?

One Identity Safeguard is generally considered stable. In our experience, we did not face major downtime issues in production. The platform handled privileged sessions and access workflows consistently, and most of the time it runs smoothly.

What do I think about the scalability of the solution?

The scalability was one of the areas where One Identity Safeguard worked well for us. As the environment grew with more servers, more admin users, and more privileged access requests, the tool was able to handle the increased load without major performance issues.

How are customer service and support?

I had direct interaction with their support mainly during configuration and integration phases, especially around Active Directory connectivity, flow setup, and some session-related troubleshooting. Overall, my experience has been positive, and they are technically strong.

Which solution did I use previously and why did I switch?

Before One Identity Safeguard, privileged access was mostly handled through a more traditional approach: direct administrative access on systems along with shared credentials in some cases and basic directory-level controls using Active Directory. In some areas, there were also a few manual scripts and ticket-based approvals, but there was not a centralized PAM platform in place to fully control, monitor, and record privileged sessions.

How was the initial setup?

The deployment of One Identity Safeguard was not a one-day or one-week activity. It was more of a phased rollout that took a few weeks to a couple of months overall.

The transition for privileged users was a bit of a mixed experience at the beginning, but it became smoother after the initial adjustment phase. At first, there was some resistance because users were used to direct administrative access. With One Identity Safeguard, they had to go through controlled workflows for requesting access and launching privileged sessions, which added a few extra steps compared to the earlier way of working. Initially, some users felt it slowed things down, especially during urgent production issues.

What about the implementation team?

Training was needed for both administrators and end users, but the level of effort was different for each group. For the admin or security team managing One Identity Safeguard, there was definitely a learning curve. They needed proper training on configuration, policy setup, session management, and integrations with Active Directory and troubleshooting. For end users, the training was much simpler. Most of it was just about how to request privileged access, how to launch sessions through the portal, and what the approval flow looks like.

What was our ROI?

In terms of savings, one of the biggest improvements was in privilege access handling. Earlier, a lot of time was spent managing password sharing, manual approvals, and coordinating between teams for admin access. After implementing One Identity Safeguard, those processes became more structured and controlled through workflows, which reduced back-and-forth communication and improved response time during support or maintenance activities. I also saw savings in audit and compliance effort. Previously, collecting evidence for privileged activity reviews required manual tracking and coordination across systems. With centralized session monitoring and logs, audit preparation becomes significantly faster and less effort-intensive.

What's my experience with pricing, setup cost, and licensing?

It was actually on the higher side compared to basic security tools, but it was expected because it is an enterprise-grade PAM solution. The setup cost was not just about licensing. A big part of the effort went into implementation, configuration, and designing proper workflows.

Which other solutions did I evaluate?

During the evaluation phase, I looked at a few other PAM options to compare capabilities, especially around session monitoring, ease of administration, and integration with my existing AD environment. Some of the commonly discussed alternatives were tools such as CyberArk, which is a very strong tool, and also a few Microsoft native approaches combined with Azure-based identity controls for privileged access management.

What other advice do I have?

I would say the biggest advice is to not treat One Identity Safeguard just as a tool installation. Treat it like an access governance project and involve both security and operations teams early. In many organizations, PAM fails not because of technology but because operational teams feel it slows them down. If their input is taken early, the workflows can be designed in a more practical way.

I think the success of PAM is not only about the tool; it depends heavily on how well the organization is disciplined with its access governance. If teams try to bypass processes or create too many exceptions, even the best PAM tool loses effectiveness. I would rate this product nine out of ten.


    Aman Khandelwal

Secure credential management has reduced password theft and supports efficient remote work

  • May 17, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for One Identity Safeguard is to store our IDs and passwords so that they can be used later for logging in. It also helps us when our employees are working from home by managing IDs, passwords, and other login credentials safely, without any worry of password theft or identity theft.

A specific example of how I use One Identity Safeguard with employees working from home is when they are using their personal Wi-Fi connection, where the chance of personal theft increases. One Identity Safeguard helps us manage the chances of theft, reducing the instances of password theft and identity theft, which has been very useful for us and has also reduced the cases we experience.

What is most valuable?

The best features are that the user interface is very good and the functionality is smooth, with a good user experience overall. Apart from this, the third-party integration that One Identity Safeguard provides is another major feature that I appreciate. It integrates well with other third-party websites and solutions, allowing the end user to log in or save their password on those websites using One Identity Safeguard.

A specific third-party integration that I found especially useful was when we integrated Salesforce Cloud, which was a smooth experience overall without any bottlenecks during the integration process, resulting in a good workflow.

One Identity Safeguard has positively impacted my organization by reducing the cases of password theft and increasing efficiency. Our employees no longer have to worry about password theft, allowing them to be more efficient in their work. It has helped us reduce the effort that our employees used to expend by entering passwords and user IDs manually before using One Identity Safeguard.

The incidents of password theft have reduced by around forty percent, which has been a very good result from using One Identity Safeguard for our organization and is a great benefit for us.

We have saved a lot of time because users no longer have to save passwords manually, as everything has been automated. This saving of time leads to increased overall efficiency of our organization.

What needs improvement?

One feature that I feel One Identity Safeguard lacks is a robust reporting interface, as the data we get from it is not very well displayed. A reporting dashboard is missing and needs to be incorporated in the coming updates. This is one of the essential features that is missing from the solution.

One Identity Safeguard needs improvement in customer support, and there are also glitches while logging in that end users face. These minor glitches cause problems for us, which need to be addressed.

In the case of the glitches, sometimes we have to try two or three times for one task. While these glitches are minor and happen occasionally, they need to be taken care of.

For how long have I used the solution?

I have been using One Identity Safeguard for the last one and a half years.

What do I think about the stability of the solution?

One Identity Safeguard is stable and quite performance-centric.

What do I think about the scalability of the solution?

One Identity Safeguard's scalability is quite good.

How are customer service and support?

The customer support for One Identity Safeguard needs improvement. I would rate the customer support as a seven out of ten.

Which solution did I use previously and why did I switch?

We were not using any other solution prior to One Identity Safeguard. This is the first solution that we have purchased, as One Identity Safeguard was the market leader and that is why we selected it.

How was the initial setup?

The deployment of One Identity Safeguard took around four to five months.

The deployment affected my privileged users by being somewhat disruptive, as they had to make changes to their day-to-day workflow. Overall, it was a very good experience with support from the One Identity Safeguard team during the deployment stage.

There was no need for any training for either end-users or for the people who manage One Identity Safeguard.

What about the implementation team?

We have not integrated One Identity Safeguard with other parts of our business.

What was our ROI?

If you are looking to increase the organization's efficiency, One Identity Safeguard is the solution that needs to be purchased, as it is an overall cost-efficient solution for business needs.

What's my experience with pricing, setup cost, and licensing?

I find that the pricing is very affordable and the setup cost is also very affordable, aligning with our budget. Licensing is per-user based.

Which other solutions did I evaluate?

While selecting One Identity Safeguard, we evaluated other options, but they were not aligning with our business needs, so we chose One Identity Safeguard instead.

What other advice do I have?

After thoughtfully considering the pros and cons of One Identity Safeguard, I give this product a rating of nine because it is overall very good software. However, factoring in the subpar customer support and the technical glitches, I believe nine is a perfect rating.


    Nishant Patil

Strong access controls have secured privileged accounts and now improve accountability

  • May 13, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for One Identity Safeguard is securing administrator access to critical infrastructure, like firewall servers, switches, databases, as well as the VMware environments. Earlier, multiple engineers used shared admin passwords for devices and servers, which made it difficult to track who performed what activity. This also increased the risk of password misuse and unauthorized access. We have used One Identity Safeguard to secure all of these resources.

A specific example of how I use One Identity Safeguard to secure access or track activities is when an engineer wanted to log in to a firewall for some configuration changes. One Identity Safeguard provides secure access without exposing the actual password. Once the task was completed, the password could be automatically changed, ensuring better security. This use case helps the organization improve privileged access security, maintain accountability, and reduce insider threats for auditing and compliance purposes.

One Identity Safeguard is deployed in my organization on physical appliances, which are dedicated hardware appliances provided by One Identity.

What is most valuable?

The best features One Identity Safeguard offers include a secure password vault for privileged accounts, Privileged Access Management (PAM), session monitoring, and session recording. Additionally, MFA support is available. There are different benefits and features, including real-time monitoring of administrator activity, audit logs, and compliance reporting.

Session monitoring is a feature where all privileged user activities are monitored in real-time whenever an administrator accesses critical systems such as servers, firewalls, switches, or databases. For example, if a network engineer logs into a secure firewall using One Identity Safeguard, the complete session can be monitored and recorded, including the commands executed, the configuration changes made, the previous configuration, the login duration, and the logout activity.

One Identity Safeguard has positively impacted my organization by tracking admin activities in real time. It records privileged sessions, improves the accountability of engineers and administrators, and detects suspicious or unauthorized actions.

What needs improvement?

I have nothing to improve. The solution is well-designed. I do not have anything at all that I wish could be easier or better, even if it is something small, whether in the user interface, reporting, or integration.

For how long have I used the solution?

I have been using One Identity Safeguard for one year.

What do I think about the stability of the solution?

One Identity Safeguard is stable.

What do I think about the scalability of the solution?

In terms of scalability, One Identity Safeguard can easily grow along with the organization's infrastructure and security requirements. It supports growing infrastructure and handles a large number of privileged accounts because it can support an increasing number of users, privileged accounts, devices, and locations as the organization expands.

How are customer service and support?

The customer support for One Identity Safeguard is good.

Which solution did I use previously and why did I switch?

I have not previously used a different solution. This is the first solution we deployed.

How was the initial setup?

The deployment of the solution took up to one month in my environment.

The deployment was a smooth process for my privileged users. All integrations were executed very well.

What about the implementation team?

Training of approximately ten to twelve days is sufficient for all users, both those new to One Identity Safeguard and those with existing knowledge. Very good training can be delivered within twelve days.

What was our ROI?

The return on investment comes from improving security while reducing operational risk and manual administration. Earlier, the organization managed privileged passwords manually, which increased the chance of password misuse and insider threats. After implementing One Identity Safeguard, privileged access becomes centralized, monitored, and automated. The ROI of One Identity Safeguard is mainly achieved through stronger security, reduced operational effort, automation of privileged access management, and lower risk of security incidents.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing is that the price is a bit too high. The price could be lower for licenses based on the number of privileged accounts and number of managed access systems. There is a common license factor involved.

Which other solutions did I evaluate?

I have not evaluated other options before choosing One Identity Safeguard.

What other advice do I have?

My advice for others looking into using One Identity Safeguard is that it is very useful in the organization for preventing password issues. I would rate this review as nine out of ten.


    Helena Helena

Strong data protection has improved compliance and centralized monitoring for sensitive access

  • May 13, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for One Identity Safeguard is for strong security, and it also helps me to store my information, to protect my data, and focus on data protection compliance.

One specific example of how I use it for security is to protect my data from external access. Regarding security compliance, I am able to set the metrics and also set the guidelines and the regulations about how my software should be stored and kept.

What is most valuable?

One Identity Safeguard provides multiple features, including data protection services. These tools are able to assess the security demands and compliance requirements. After assessing, I am able to know how data can be saved, and when data is properly saved, everything becomes easier because my data is stored securely and no one can access it.

One of the reasons why I need this is because it has the ability to centralize security monitoring across the entire data infrastructure, and it helps to automate and connect devices in a single platform whereby I can safeguard my data through multiple authentications.

Among the features, there is the AI assistant which helps to verify the quality of data and also verifies the security setups. I appreciate that this tool eliminates the manual process and time-consuming tasks for gathering evidence for compliance by auditing automatically, and it also pulls information from all integrated tools. This helps to ensure that the security of the integrated ecosystem is functioning and protected.

One Identity Safeguard works with One Login, and when they work together, they provide the best outcome which increases the security factors. Cloud integration is another valuable feature that enhances the overall security capabilities.

What needs improvement?

I find it challenging mostly when managing complex work, especially when trying to implement it on a larger scale; sometimes it becomes slow, and the automation process also slows down. I believe it should be improved upon when implementing it on an enterprise scale or with complexity; it should be faster than it currently is.

For how long have I used the solution?

I have been using One Identity Safeguard for two years.

What do I think about the stability of the solution?

One Identity Safeguard is very stable.

What do I think about the scalability of the solution?

The scalability is good; it runs without issues.

How are customer service and support?

The excellent customer support provided during the integration made sure it did not disrupt my users, thanks to the support from both customer service and technicians from the vendor.

Which solution did I use previously and why did I switch?

I previously used a solution called Microsoft Entra ID; it was expensive and not easy to operate, which is why I decided to switch.

How was the initial setup?

The deployment of the solution took around one to two weeks.

After using One Identity Safeguard, I can say it operates effectively with One Login; when these two tools work together, I find that as a user, I save a lot of funds because they provide extremely high privacy. In this way, they ensure security is maintained, saving time and the costs of employing more workers to oversee increased compliance regulations over personal information. The system is reliable and performs effectively, reducing the need for extensive monitoring and therefore costs.

The integration with the cloud targets was somewhat complex initially, but it became easier after understanding the entire process of integration. After acquiring an integration specialist, everything became very easy and user-friendly.

The initial deployment was somewhat disruptive, but the excellent customer support provided during the integration made sure it did not disrupt my users, thanks to the support from both customer service and technicians from the vendor.

What about the implementation team?

Since we were using One Login along with One Identity Safeguard, it took us around one week for full training and a few days for practice implementing what we were trained on. Overall, it took around two weeks to fully understand how the tool operates.

We use virtual appliances because they are easier to operate and use compared to physical appliances. Additionally, for those of us who are located remotely, purchasing this tool is easier with the virtual appliance compared to physical appliances.

What was our ROI?

After deploying this tool, it saves time; under policy governance, policy monitoring, and more integrations and configurations, it requires very few users to run and operate, which ultimately saves costs as well.

What's my experience with pricing, setup cost, and licensing?

The pricing and setup cost were negotiable depending on requirements and usage, which made it relatively friendly and accommodating compared to other tools.

Which other solutions did I evaluate?

I evaluated Microsoft Entra ID as well as the CyberArk tool before choosing One Identity Safeguard.

What other advice do I have?

One Identity Safeguard is powerful because it provides beneficial features that support clean integration with different tools, significantly improving security and automation processes. The navigation process is easy, and the platform has been extremely valuable for managing customer relationships as well as tracking and providing a centralized system for managing privacy and protecting accounts, as well as safeguarding data.

The reporting capacity is beneficial because it allows me to deal with customer reports about security purposes and understand what is occurring. Users say it is faster; for example, I can input the name of the information or the device I want to control, and this allows me to access it and do what is needed. The platform is intuitive, operates as demonstrated, and easily integrates with the existing platform.

Regarding integration, I primarily integrate One Identity Safeguard with cloud targets. I give One Identity Safeguard a rating of ten out of ten.


    Ujjwal Pal

Privileged access has become tightly controlled and audit trails now improve investigations

  • May 11, 2026
  • Review from a verified AWS customer

What is our primary use case?

One Identity Safeguard's main use case for us is securing and controlling privileged access to critical systems.

A common scenario with One Identity Safeguard is when a system administrator needs to access a production server for troubleshooting. Instead of logging in directly with a shared admin credential, the request is first routed through One Identity Safeguard for approval, which helps us with fine-grained control and accountability for high-risk administrative tasks.

What is most valuable?

The best features of One Identity Safeguard in my experience are its session recording and live monitoring capabilities, which give us visibility into what administrators are doing during privileged access.

Session recording in One Identity Safeguard has been especially useful for troubleshooting and audit purposes, adding a strong layer of accountability and making investigation much faster and more accurate.

The implementation of One Identity Safeguard has had a noticeably positive impact on our security posture and daily IT operations, helping us tighten security and gain operational visibility.

The positive outcomes from One Identity Safeguard have been quite clear for our team. From a security perspective, it has significantly reduced the risk of uncontrolled privileged access by enforcing approvals and session tracking, improving security visibility and operational efficiency at the same time.

For how long have I used the solution?

I have been using One Identity Safeguard for around two years now, and my experience with it so far has been exceptional and reliable.

What do I think about the stability of the solution?

One Identity Safeguard is very much stable in my experience.

What do I think about the scalability of the solution?

One Identity Safeguard's scalability is nice and it handles growth or increased users well.

How are customer service and support?

The customer support for One Identity Safeguard was good, and the process was smooth.

Which solution did I use previously and why did I switch?

We did not use any other solution before choosing One Identity Safeguard.

How was the initial setup?

The deployment of One Identity Safeguard in our environment took roughly a day's involvement.

The deployment of One Identity Safeguard had an initial adjustment phase for privileged users, but overall the transition was fairly smooth.

The training required to start using One Identity Safeguard was straightforward for both those who manage it and for end users.

Feedback from users regarding the usability and functionality of One Identity Safeguard was positive.

What was our ROI?

I have seen a return on investment by using One Identity Safeguard, which has reduced the time spent on managing privileged access and impacted the budget by reducing costs by an estimated 20 to 25 percent.

What's my experience with pricing, setup cost, and licensing?

The overall experience with pricing, setup cost, and licenses for One Identity Safeguard was positive.

Which other solutions did I evaluate?

We did not evaluate any other option before choosing One Identity Safeguard.

What other advice do I have?

For anyone considering One Identity Safeguard, I would suggest starting with a clear plan for what you want to achieve from a security and user access perspective before deployment, as a structured rollout approach makes the adoption much smoother and more effective. I have provided a review rating of 10 for One Identity Safeguard.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    Sohan Mulik

Centralized privileged access has improved security, audits, and daily administration

  • May 06, 2026
  • Review from a verified AWS customer

What is our primary use case?

My main use case for One Identity Safeguard is that it serves as a secure, strong PAM solution, and we are using it for PAM authentication.

In daily work, we use One Identity Safeguard for privilege access management, including secure PAM authentication, password vaulting, access request approval, session monitoring, and automatic password rotation for privileged accounts and service servers.

Apart from PAM authentication, we also use One Identity Safeguard for secure privileged session management, auditing, compliance, tracking, and centralized control for critical administrative accounts. It helps to improve security, accountability, and operational efficiency in daily infrastructure management.

How has it helped my organization?

One Identity Safeguard has improved our organization's security posture by providing centralized privileged access management, secure password vaulting, and session monitoring. It has helped to reduce manual password handling, improve compliance and audit tracking, and increase accountability for privileged access activities. Overall, it enhances operational security, streamlines access management, and reduces risks related to privileged accounts.

We have seen improvements in multiple areas. It helped reduce risks related to privileged account misuse by enforcing secure password management and session monitoring. We also saved operational time through automated password rotation and centralized access control. From a compliance perspective, auditing and session recording made it easier during security reviews and audit processes, improving overall accountability and traceability.

What is most valuable?

One Identity Safeguard offers several strong features for PAM. The best ones are password vaulting, automatic password rotation, privileged session monitoring and recording, role-based access control, and approval workflows. I also appreciate the centralized log management, auditing and compliance reporting, and integration with Active Directory and enterprise environments. Features such as session playback, real-time monitoring, and REST API support are very useful for daily administration and security operations.

The feature that has had the biggest impact on my daily operations is the password vaulting and automatic password rotation. It has significantly improved security by eliminating manual password sharing and reducing the risk of unauthorized access. It also saves operational time because administrators can securely request access through One Identity Safeguard without knowing the actual password. Session monitoring and auditing also help a great deal during troubleshooting and compliance reviews.

One additional advantage is that it provides centralized control and complete audit visibility for privileged access activities.

What needs improvement?

One Identity Safeguard is a strong PAM solution, but there are some areas for improvement. The initial deployment and integration process can be complex in large enterprise environments. The user interface and reporting can be improved to make administration and troubleshooting easier. More simplified integration with cloud platforms and third-party tools would also help.

For how long have I used the solution?

I have been using One Identity Safeguard for the last three years.

What do I think about the stability of the solution?

One Identity Safeguard is a stable and reliable PAM solution in our experience. We have seen good performance with minimal downtime, especially for password vaulting, session monitoring, and privileged access workflows. It handles enterprise environments well when properly configured and maintained.

What do I think about the scalability of the solution?

One Identity Safeguard is highly scalable and works well for enterprise environments. It supports scaling through clustering, distributed architecture, and high availability options, which helps handle growing numbers of privileged accounts, sessions, and users efficiently. In our experience, it has managed increasing workloads and integration without major performance issues.

How are customer service and support?

Customer support has generally been good in our experience. The support team is knowledgeable and helpful, especially for One Identity Safeguard's standard deployment, configuration, and troubleshooting issues. Response times are usually reasonable, although complex enterprise-level issues can sometimes take longer to resolve and require escalation.

Which solution did I use previously and why did I switch?

Earlier, we were using a more manual approach along with basic privileged account management processes. We moved to One Identity Safeguard to improve centralized privileged access control, password vaulting, session monitoring, compliance, and overall security management in a more scalable and enterprise-ready way.

How was the initial setup?

The initial deployment of One Identity Safeguard took a few weeks, including setup, integration with Active Directory, policy configuration, onboarding asset accounting, testing, and user access validation. The timeline mainly depended on the environment size and security requirements.

What about the implementation team?

One Identity Safeguard has been integrated with Active Directory, cloud platforms such as AWS and Azure, and various Windows and Linux servers for privileged access management. It also supports integration with enterprise applications, SIEM, log monitoring tools, and automation workflows to improve security and centralize access control.

The integrations were manageable overall, especially with Active Directory and standard Windows and Linux environments. Cloud integration with AWS and Azure required additional planning and configuration, but the documentation and available connectors helped. Some advanced integration and custom workflows were more complex and required careful testing and coordination with security and infrastructure teams.

A moderate level of training was required initially, mainly for administrators handling deployment, policy management, integration, and troubleshooting. For end-users, only basic guidance was needed for the access request and password retrieval workflows. Overall, the team adapted quickly after hands-on usage.

What was our ROI?

We have seen a positive return on investment. One Identity Safeguard helped reduce the manual effort for password management and privileged access handling, which saves operational time for administrators. It also improved compliance and audit readiness, reducing time spent during security reviews. While it did not directly reduce headcount, it improved efficiency and centralized control and reduced security risks related to privileged accounts.

What's my experience with pricing, setup cost, and licensing?

One Identity Safeguard is positioned as an enterprise-grade PAM solution, so the cost is on the higher side.

Which other solutions did I evaluate?

During the evaluation phase, we also looked at other PAM solutions such as CyberArk, BeyondTrust, and Delinea. We compared them on security features, integration, deployment complexity, session monitoring, password vaulting, scalability, and overall operational requirements before selecting One Identity Safeguard.

What other advice do I have?

The deployment was relatively smooth with minimal disruption for privileged users. Initially, users needed some adaptation to the access request and approval workflow. After onboarding and training, the process became streamlined and improved overall security.

The integration improved operational efficiency and security by centralizing privileged access management, reducing manual password handling, and improving visibility through auditing and session monitoring. It also helps streamline access workflows across multiple platforms and environments.

The advice would be to properly plan the PAM implementation before deployment, especially around privileged account discovery, access policies, integration, and user onboarding. Start with the critical systems first and then gradually expand across the environment. Also, involve security, infrastructure, and compliance teams early in the process. I have given this review an overall rating of ten.


    Varun Mehra

Privileged sessions have been secured and daily audits gain fast, detailed visibility

  • May 01, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for One Identity Safeguard is managing and securing privileged access across the organization. On a day-to-day basis, I use it for password vaulting, session management, and controlling access to critical systems. It helps ensure that credentials are not shared directly and are accessed securely through the platform. For example, when an admin needs access to a server, they request it through One Identity Safeguard, and access is granted with proper approvals, while the session can be monitored or recorded for security and compliance.

Session monitoring and recording have really improved both security and accountability for our team. For example, when an admin accesses a critical server, the entire session is recorded. If there is ever an issue, such as a misconfiguration or an unexpected change, we can go back and review exactly what actions were taken and by whom. It also acts as a deterrent because users know their sessions are being monitored, so they follow best practices more carefully. Overall, it makes audits much easier and helps us quickly investigate and resolve any incidents.

Apart from access control and session monitoring, I also use One Identity Safeguard for automated password rotation, which reduces the risk of credential misuse. Day-to-day, I handle access requests, review audit logs, and ensure compliance policies are being followed. It also helps in managing third-party or vendor access securely, giving them controlled and time-bound access without exposing actual credentials.

What is most valuable?

In my opinion, one of the best features of One Identity Safeguard is privileged password management. It securely stores credentials and automatically rotates passwords, which reduces the risk of misuse and removes the need for manual handling. Another standout feature is session monitoring and recording. It allows full visibility into what users are doing during privileged sessions, with the ability to record, replay, and audit activities, which is very helpful for security and compliance. I also find the real-time monitoring and alerting very valuable. The system can detect suspicious behavior and even block or terminate sessions if something looks risky, which adds a strong, proactive security layer. Lastly, the automated workflow and approval systems stand out. Access requests go through proper approvals with defined policies, which ensures controlled and traceable access to critical systems. Overall, the combination of password vaulting, session control, and automation makes it a very strong PAM solution for securing privileged access.

The alerting feature has been very useful for us. For example, we once had a situation where a privileged account tried to access a system outside of normal working hours. One Identity Safeguard triggered an alert immediately and we were able to review the session in real time and stop it before any changes were made. It helped us catch a potential security risk early. Also, the session recording made it easy to verify what was attempted, which helped during an internal review. One additional benefit is the ease of auditing. All activities are logged and easy to track, which saves a lot of time during compliance checks. The centralized dashboard also gives a clear view of who has access to what, which is very helpful for day-to-day management.

What needs improvement?

One area where One Identity Safeguard can be improved is the user interface. It can feel a bit complex and not very intuitive, especially for new users, and it takes some time to get comfortable with the navigation. Another challenge is the initial setup and configuration. It requires careful planning and can be a bit complex, especially when integrating with different systems and defining policies. Also, reporting could be more flexible and customizable. While the existing reports are useful, having more advanced filtering and dashboard options would make it easier to get deeper insights. Overall, it is a strong solution, but improving usability and simplifying configuration would make it even better.

Support can be improved in terms of response times and consistency. Sometimes resolving complex issues takes longer than expected and requires multiple follow-ups. In terms of integration, while it works well with common systems, integrating with some third-party tools can require extra effort for customization. Scalability is generally good, but as the environment grows, managing policies and access rules can become a bit complex. Better visibility and simpler management for large-scale deployments would be definitely helpful.

For how long have I used the solution?

I have been using One Identity Safeguard for around one to two years now in managing privileged access and securing sensitive accounts.

What do I think about the stability of the solution?

One Identity Safeguard is generally considered a stable and reliable solution. From my experience, it performs consistently for day-to-day operations such as password management, session monitoring, and access control. Once it is properly configured, it runs smoothly without major issues. Industry feedback also supports this. Users often describe it as a robust and stable platform, with ratings around 4.2 to 4.3 out of 5, which reflects good reliability overall. That said, like any enterprise solution, there can be occasional challenges, especially around complex configurations or integrations, but overall, stability is one of its strong points and it works reliably in production environments.

What do I think about the scalability of the solution?

One Identity Safeguard scales quite well in an enterprise environment. It is designed to handle growth by using a cluster-based architecture where multiple appliances can be connected together to distribute load and maintain performance. This allows the system to scale beyond the limits of a single appliance while still being managed as one solution. For example, you can add multiple nodes for password management and session monitoring, and the workload gets distributed across them. This not only improves scalability but also ensures high availability and reliability. There are also cloud-based options such as One Identity Safeguard on Demand, which provides even more flexibility and scalability without needing to manage infrastructure. In our experience, as the number of users and systems increased, the solution handled the growth well without major performance issues. However, managing policies and access rules can become a bit complex at a larger scale, so proper planning is important. Overall, I would say scalability is strong and suitable for a growing organization.

How are customer service and support?

My experience with One Identity Safeguard support has generally been positive, but with some inconsistency. On the positive side, the support team is knowledgeable and usually helpful in resolving standard issues. Many users also mention that support engineers have strong technical expertise and can guide you properly when needed. However, for more complex issues, resolving can sometimes take longer than expected, and you may need to follow up or escalate the case. There are also cases where documentation could be more detailed, which would help to reduce dependency on support. Overall, I would say support is good and reliable for most cases, but response time and consistency can be improved, especially for complex problems.

Which solution did I use previously and why did I switch?

Earlier we were using a mix of manual processes and basic privileged access control without a dedicated PAM solution. We switched to One Identity Safeguard mainly to improve security and gain better control over privileged accounts. The lack of centralized password management and session visibility was a big gap, and One Identity Safeguard helped us address that with features such as password vaulting, session recording, and automated access workflows.

How was the initial setup?

The deployment took around four to six weeks in our environment, including initial setup, integration, policies, configuration, and testing before going live.

The deployment was mostly smooth, but there was a small learning curve for privileged users. Initially, some users found the new access process a bit different, since they had to request access through One Identity Safeguard instead of using direct credentials. But after a short adjustment period, they got comfortable with it. Overall, it was not very disruptive. With proper communication and a phased rollout, users adapted quickly and the added security and control were well accepted.

What about the implementation team?

For administrators, it required moderate training, since the setup and policy configuration can be a bit complex. Admins need a few sessions and some hands-on practice to get comfortable with managing the system. For end users, the training was minimal. A short walkthrough and basic documentation was enough for them to understand how to request access and use the system. Most users were able to adapt quickly after initial guidance.

What was our ROI?

I have seen a clear return on investment with One Identity Safeguard, both in terms of cost saving and efficiency. For example, automation of password management and access workflow has reduced manual effort by around 20 to 30 percent, which directly saves admin time. Audit preparation has also become much faster, saving several hours or days during compliance checks. From a cost perspective, we have reduced reliance on manual processes and avoided the need to expand the team, which is a big operational saving. Also, in real customer cases, organizations have reported around 12 percent ROI and noticeable cost saving after implementing One Identity Safeguard, mainly due to the automation and lower operational overhead. Overall, the combination of the time saving, reduced risk, and improved efficiency has delivered a solid ROI for us.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing and licensing for One Identity Safeguard has been generally positive, but it depends on the scale. It is an enterprise-level solution, so it is not the cheapest, but the pricing is fair for the level of security and features it provides. Many users also consider it more cost-effective compared to some competitors such as CyberArk, especially in the long term. In terms of licensing, it can be a bit complex. It is usually based on users or devices and you need to properly plan what modules you need, such as password management or session monitoring. Also, for virtual deployments, you may need additional OS licensing, which adds to the cost. For setup cost, since we deployed it on-premises, there was some initial investment in configuration and integration, but no heavy recurring infrastructure cost beyond that. Overall, I would say it offers a good balance between cost and value, but you need to clearly understand the licensing structure to avoid confusion.

Which other solutions did I evaluate?

Before choosing One Identity Safeguard, we did evaluate a few other PAM solutions. The main ones we looked at were CyberArk and BeyondTrust, as they are among the most well-known enterprise PAM platforms. We also briefly considered solutions such as Delinea for comparison. These tools offer similar core features such as credential vaulting, session monitoring, and privileged access control, but each has its own strengths. For example, CyberArk is known for its maturity and deep PAM capabilities, while BeyondTrust is strong in combining privileged access with remote access features. In the end, we chose One Identity Safeguard because it provides a good balance between functionality, ease of deployment, and cost for our environment, with strong session monitoring and analytic features.

What other advice do I have?

My advice would be to start with a clear strategy and not rush the implementation. First, identify your critical systems and privileged accounts and prioritize securing those. One Identity Safeguard works best when you follow the least privilege approaches and role-based access control from the beginning. I would also strongly recommend starting with a pilot deployment. Test your workflows, approvals, and session policies with a small group before rolling it out organization-wide. This helps avoid user friction later. Another key point is to focus on automation early. Things such as password rotation, approval workflows, and session monitoring are where you get the most value and efficiency gains. Also, invest time in proper policy design and training. Many challenges people face come from misconfiguration rather than the tool itself. Following security best practices such as strong authentication, encryption, and controlled access policies is very important. Finally, make sure you integrate it with your existing ecosystem such as Active Directory and SIEM tools, to get full visibility and maximize its benefits. If you plan it properly and use its automation and security features effectively, One Identity Safeguard can deliver a lot of value.

Overall, One Identity Safeguard is a strong and reliable PAM solution that does a great job in securing privileged access and improving visibility. It really stands out in areas such as password vaulting, session monitoring, and audit readiness. While there are some improvements needed in UI, reporting, and ease of configuration, the core functionality is solid and delivers real value. If implemented properly, it can significantly enhance security posture and reduce operational efforts, making it a good choice for organizations looking to strengthen their privileged access management.

We have seen some measurable improvement after implementing One Identity Safeguard. For example, audit preparation time has reduced by around 40 to 50 percent because all privileged activities are already logged and easy to access. Earlier, it used to take days to gather data, but now it can be done in a few hours. We have also seen a noticeable drop in security incidents related to privileged access, mainly because passwords are rotated automatically and direct access to credentials is eliminated. In terms of operation, automation has saved us roughly around 20 to 30 percent of the time spent on manual tasks such as password reset and access approvals. Overall, it has helped us save time, improve security, and reduce manual effort across the team. I would rate this product an 8 out of 10.


    Kartik Swami

Privileged access has become more secure and password management saves significant time

  • April 30, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for One Identity Safeguard is to manage and control privileged accounts and store passwords. For example, if an IT admin needs access to a server, I use One Identity Safeguard to manage and control privileged accounts. One Identity Safeguard helps companies avoid data breaches regarding my main use case, influencing other teams and types of users who interact with it.

What is most valuable?

One best feature One Identity Safeguard offers is multi-factor authentication, which adds extra security by requiring more than one verification step. When I mention requiring more than one verification step, I am referring to multi-factor authentication, and it helps to secure systems because it will protect the data. One Identity Safeguard has positively impacted my organization by helping to increase security because of password vaulting.

Password management has improved as it is easier now; for example, I experienced improved efficiency when my IT team needs to access a production server. I have noticed measurable outcomes regarding reduced time to access servers and fewer security incidents since using One Identity Safeguard because it helps me to secure my data and it is reliable.

What needs improvement?

One Identity Safeguard could be improved, and some user tools can be enhanced. I would add more about the needed improvements related to user tools or any other area. The improvement I suggest is to add AI and smart automation; One Identity Safeguard already uses analytics to detect risks, but there is room for enhancement. I believe One Identity Safeguard can be improved by enhancing the user experience.

For how long have I used the solution?

I have been working in my current field for one and a half years.

What do I think about the stability of the solution?

One Identity Safeguard is stable, and this is actually expected by most organizations, commonly compared with CyberArk.

What do I think about the scalability of the solution?

For scalability, instead of one system handling everything, multiple systems are used.

How are customer service and support?

Customer support is good and meets my expectations. I would give a rating of 4.5; I think it is good for customer support.

Which solution did I use previously and why did I switch?

I have previously used a different solution and it was a good experience.

How was the initial setup?

The training required to use the solution is straightforward and effective. It took about one to two weeks for deployment of the solution.

What about the implementation team?

I typically integrate One Identity Safeguard with several parts of the business to make access more seamless. The integration process was balanced because of moderate challenges but manageable overall.

What was our ROI?

For ROI, I have seen a return on investment based on time saved, which is nearly a 50 to 70% reduction.

What's my experience with pricing, setup cost, and licensing?

A strong and honest answer about pricing is that it shows both cost and value.

Which other solutions did I evaluate?

I evaluated other options before choosing One Identity Safeguard.

What other advice do I have?

The feedback regarding the solution's usability and functionality is positive; from my perspective, it is easy to use. I have additional thoughts about One Identity Safeguard. I find this interview very appreciating; it is very helpful, and overall it is a good experience.

I can provide a short poem: Locked doors, silent keys, access flows, watched and secure. This poem captures my sentiments regarding the solution. My overall review rating for One Identity Safeguard is 8.5.


    Chetan Bhati

Privileged access has become controlled and auditing provides clear visibility into admin activity

  • April 30, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for One Identity Safeguard is managing and securing privileged access on a day-to-day basis. It is used for password vaulting, controlled admin access to servers, and monitoring privileged sessions to ensure security and compliance.

Recently, I used One Identity Safeguard to retrieve a privileged account password from the vault for server access during troubleshooting. The access was time-bound and automatically logged. I also checked session activity logs to verify the actions performed, ensuring everything was secure and compliant.

What is most valuable?

Some of the best features of One Identity Safeguard in my opinion are its password vaulting, session monitoring, and detailed auditing capabilities. It securely stores privileged credentials, provides real-time monitoring and recording of admin sessions, and maintains complete audit logs, which helps in improving security and meeting compliance requirements.

One Identity Safeguard has positively impacted our organization by improving our overall security through controlled and monitored privileged access. We have reduced risk related to password misuse, and auditing has become much easier. It also helps in maintaining compliance and gives better visibility into admin activities across the environment.

What needs improvement?

Overall, One Identity Safeguard works well, but it could be improved in terms of UI simplicity and ease of navigation, especially for new users. Some configuration can feel complex, so better documentation or more intuitive workflows would help. Additionally, faster performance in session monitoring and reporting would enhance the overall experience.

A better integration with other security and monitoring tools would improve the overall experience. Also, more user-friendly reporting and a customizable dashboard would make it easier to track activities and generate insights quickly.

For how long have I used the solution?

I have been using One Identity Safeguard for six months to one year.

What do I think about the stability of the solution?

One Identity Safeguard is stable in our environment.

What do I think about the scalability of the solution?

One Identity Safeguard is highly scalable in our environment. We are able to add more users, systems, and privileged accounts without impacting performance. As our infrastructure grows, the solution continues to handle the increased load smoothly, especially for password vaulting and session monitoring, without any major changes required.

How are customer service and support?

I would say the customer support for One Identity Safeguard has been generally responsive and helpful. Whenever we raise issues related to configuration or access, the support team assists with proper guidance.

Which solution did I use previously and why did I switch?

Previously, we were using a more manual process for privileged access management, which involved shared credentials and less centralized control. We switched to One Identity Safeguard to improve security, implement proper access control, and gain better auditing and monitoring of privileged activities.

How was the initial setup?

Deployment of One Identity Safeguard in our organization took approximately a few days to a couple of weeks, including installation, configuration, and integration with Active Directory and internal systems as well. Most of the time was spent on testing and ensuring proper access policies were applied.

What about the implementation team?

Only basic training was required to start using One Identity Safeguard. For administrators, a bit more training was needed to understand configuration, policies, and session management. For end users, minimal training was required since they mainly use it for requesting and accessing privileged credentials.

What was our ROI?

We have seen ROI mainly in terms of time saving and improved efficiency with One Identity Safeguard. Administrators spend less time managing privileged access and handling password requests because most processes are now automated. It has also reduced security risks by minimizing password sharing and manual access handling, which indirectly saves costs by preventing incidents and reducing audit effort. My advice would be to plan the deployment properly and ensure clear access policies are defined before implementation. It is important to invest time in understanding the configuration and integration with Active Directory. Once set up correctly, it provides strong security, better control over privileged access, and improves auditing and compliance significantly.

What's my experience with pricing, setup cost, and licensing?

I was not directly involved in the pricing, setup cost, or licensing decisions for One Identity Safeguard. However, from an operational perspective, the solution is considered a premium enterprise tool, and the licensing is managed centrally by our IT security team based on organization requirements.

Which other solutions did I evaluate?

Before selecting One Identity Safeguard, we evaluated a few other privileged access management solutions, including CyberArk and BeyondTrust. We chose One Identity Safeguard based on its features, integration capabilities, and ease of deployment within our existing infrastructure.

What other advice do I have?

Overall feedback from users regarding One Identity Safeguard's usability and functionality has been positive. However, some users feel the interface is slightly complex initially and requires some learning. Once familiar, they find it reliable for accessing privileged accounts and monitoring sessions effectively.

Since implementing One Identity Safeguard, we have seen better control over privileged access and reduced manual password handling. It has saved time during troubleshooting by providing quick, secure access, and auditing has improved, making it easier to track activities and support compliance requirements.

The integration with Active Directory was moderately easy. The initial setup required proper configuration of trust and mapping of users' roles, which took some time. However, once configured correctly, it works smoothly and provides centralized authentication and better control over privileged access.

I would rate this review an overall score of eight.