Sign in Agent Mode
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

5 AWS reviews

External reviews

26 reviews
from

External reviews are not included in the AWS star rating for the product.


    Mohit Shah

Privileged access has become controlled and monitored while password risks are reduced

  • March 31, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for One Identity Safeguard is controlling low-level admin access to systems without directly sharing traditional credentials. Day to day, we allow access through One Identity Safeguard, which automatically handles authentication in the backend instead of giving passwords.

In our setup, we use One Identity Safeguard to control admin access by not sharing admin credentials directly with users anymore. Everything goes through One Identity Safeguard, where if an admin needs access to production servers, they log in to One Identity Safeguard and request access to that particular system instead of receiving the username and password.

Regarding my main use case with One Identity Safeguard, during the session, everything is monitored and recorded, such as what commands we run and what changes we have made. If anything looks suspicious, we can terminate the session or review it later, which is very helpful.

What is most valuable?

From my experience using One Identity Safeguard, several features really stand out from a practical day-to-day security perspective, particularly the session monitoring and recording, as well as the strong feature of password vaulting and auto-rotation.

With session monitoring from One Identity Safeguard, earlier we only had logs that were not very useful during investigations. Now we can replay full sessions and see exactly what the admin did. The password auto-rotation has removed a lot of manual effort and risk, as previously passwords were shared among multiple admins and rarely changed on time. Now, after every session or based on policy, passwords get rotated automatically.

Overall, One Identity Safeguard has had a pretty positive impact on our environment, mainly around security control, visibility, and accountability. The biggest change has been that privileged access is no longer uncontrolled.

The impact on privileged access after implementing One Identity Safeguard has been quite noticeable, as earlier access was more static. Now everything is controlled and time-bound, significantly reducing unnecessary privileged access.

What needs improvement?

While One Identity Safeguard is a solid PAM solution, there are definitely a few areas for improvement, particularly the UI and overall user experience, which is fine but not very intuitive sometimes. This causes new users to take time to understand navigation and workflows.

A more modern and simplified UI for One Identity Safeguard would really be helpful.

For how long have I used the solution?

I have been using One Identity Safeguard for more than one year.

What do I think about the stability of the solution?

One Identity Safeguard is a very stable and reliable solution in my experience.

What do I think about the scalability of the solution?

The scalability of One Identity Safeguard is quite good and works well for growing environments from my experience.

How are customer service and support?

Customer support for One Identity Safeguard is very nice and quick, with the support team being very experienced.

How was the initial setup?

The deployment of One Identity Safeguard took roughly two to three weeks in our case, end-to-end.

During the initial deployment of One Identity Safeguard, there was a slight impact on privileged users, but it was manageable. Admins had to adjust to a new way of working, having to request access through One Identity Safeguard and follow the approval workflow instead of directly using credentials.

What about the implementation team?

The amount of training required for One Identity Safeguard really depends on the role, as the learning curve is higher for administrators or security teams managing the solution. These roles needed a few sessions to properly understand policy configuration, access workflow, and password vaulting and integration.

What was our ROI?

We definitely see a positive return on investment after implementing One Identity Safeguard in terms of risk reduction and time saving rather than direct cost savings.

Which other solutions did I evaluate?

We have not evaluated any other options before choosing One Identity Safeguard, as it was referred to us by a friend.

What other advice do I have?

If you are planning to use One Identity Safeguard, my main advice would be to focus on proper planning before implementation. Take time to understand your environment and identify critical assets while defining clear access policies and approval workflows from the beginning rather than just deploying it and onboarding systems randomly.

Overall, my experience with One Identity Safeguard has been quite positive, as it really shows its value over time. Initially, it may seem an extra layer of IT for users, but once implemented, the importance of that control and visibility becomes clear.

I have no changes to suggest for the future as everything is good. I would rate this review a 10.


    SurajVarma

Session monitoring has strengthened audits and now provides secure controlled vendor access

  • March 30, 2026
  • Review provided by PeerSpot

What is our primary use case?

Our main use case for One Identity Safeguard is to manage and secure privileged accounts, session monitoring, and recording for audit purposes while also providing controlled access to vendors or our internal team, and enforcing least privilege access.

What is most valuable?

The best feature of One Identity Safeguard, in my opinion, is its session monitoring, which includes full visibility with session recording, user-friendly access control, and helps in a compliance-ready environment.

The session monitoring feature of One Identity Safeguard stands out because it provides full visibility on which user is accessing which servers at what time, collecting all these logs and also providing data that can be used for audit purposes.

One Identity Safeguard has positively impacted our organization by providing strong security, compliance, and the data required for audits, making it really helpful.

What needs improvement?

One Identity Safeguard is working perfectly for our organization. The initial setup could be simplified, and more documentation would be needed for faster implementation.

For how long have I used the solution?

I have been using One Identity Safeguard for more than two years.

What do I think about the stability of the solution?

One Identity Safeguard is stable.

What do I think about the scalability of the solution?

One Identity Safeguard is excellent regarding scalability.

How are customer service and support?

Customer support is good; they are technical experts and efficiently resolve issues.

How was the initial setup?

The deployment of One Identity Safeguard took less than two weeks to fully implement and use.

What about the implementation team?

We have integrated One Identity Safeguard with Active Directory.

The integration with Active Directory was straightforward.

The integration with Active Directory has simplified our work for managing user data.

What was our ROI?

There is a very good return on investment from One Identity Safeguard, as we are saving time along with money.

What other advice do I have?

I advise anyone looking for a solution for security audits, session monitoring, or access control to consider One Identity Safeguard as one of the best solutions available in the market, so it is highly recommended.


    Vivek-Jaiswal

Identity controls have strengthened protection and simplify revoking access across user accounts

  • March 28, 2026
  • Review from a verified AWS customer

What is our primary use case?

My main use case for One Identity Safeguard in day-to-day work is to provide identity across all user accounts and domains, and it improves security across the enterprise by providing enhanced features with respect to this identity solution.

I primarily use One Identity Safeguard for protecting security across all user accounts, enterprise data accounts, assets, as well as privileged access, domain user, and admin accounts, giving SSO features and providing security across all user accounts.

What is most valuable?

One Identity Safeguard offers the ability to identify and revoke access easily for terminated accounts, which reduces risk and simplifies control of access in case of detected threats.

It reduces a lot of risk and saves time; every account is synced, and it can grant access with role-based permissions across all users quickly, alerting us if any threat is detected.

I find that the deployment of One Identity Safeguard is very easy, with good integration and scalability of user accounts, enhancing feature capabilities and providing strong product support.

What needs improvement?

The user interface can be improved for better searching of user accounts, and if One Identity enhances its support in that area, it would be very helpful.

If One Identity improves integration during migration from other platforms, it will definitely enhance the overall experience.

If the integration and connectivity can be improved during deployment, it would greatly aid the overall experience.

For how long have I used the solution?

I have been using One Identity Safeguard for more than two years.

What do I think about the stability of the solution?

As of now, I have not experienced any downtime or reliability issues with One Identity Safeguard.

What do I think about the scalability of the solution?

One Identity Safeguard's scalability features are good, allowing me to improve the scale in terms of resources and user accounts.

How are customer service and support?

For small issues, I have raised support cases with One Identity, and the team has been very cooperative and responsive in providing support and documentation.

Which solution did I use previously and why did I switch?

I previously used SailPoint, but One Identity Safeguard is better in terms of product features.

How was the initial setup?

The deployment took three phases: first, I got support from the vendor for integration, second, I deployed across all users, and finally, I identified any associated risks.

I performed the deployment in different stages for not all users, ensuring that privileged user accounts transitioned smoothly onto One Identity Safeguard.

What about the implementation team?

I had some formal sessions from the vendor that provided visibility into improved features, capability, enhanced security control, user accessibility, and granting access, and the team is very comfortable now.

What was our ROI?

I saved both money and time as a result of using One Identity Safeguard.

What's my experience with pricing, setup cost, and licensing?

I did not face any challenges with pricing, setup costs, and licensing, but for improved features, I need to address licensing.

Which other solutions did I evaluate?

Before choosing One Identity Safeguard, I evaluated Saviynt, Delinea, and Octa, finding One Identity Safeguard to be the most suitable.

What other advice do I have?

In the context of increasing cyber threats across organizations, I would advise others that using One Identity Safeguard is crucial for protection. I would rate this review a 9 out of 10.


    reviewer2803014

Secure access has reduced password risks and now needs better support and fairer pricing

  • March 20, 2026
  • Review from a verified AWS customer

What is our primary use case?

My main use case for One Identity Safeguard is to safeguard my password as well as my login IDs when I'm working from home, as it provides better safety for my passwords and for my login IDs.

When we log in, we get two-factor authentication, which I use for safeguarding my passwords or login IDs while working from home, and that makes it safer compared to other software.

One Identity Safeguard helps in keeping my login IDs and passwords safe, and that is very important to me.

What is most valuable?

The best feature that One Identity Safeguard provides is its flexibility, as well as the fact that it integrates well with other software like Salesforce, which I really appreciate.

The integration part of One Identity Safeguard has been quite beneficial for my workflow, especially with tools like Salesforce.

One Identity Safeguard is flexible and provides out-of-the-box integrations that have been very helpful for me, and the installation process was quite easy and smooth, which I would also rate as a feature.

One Identity Safeguard has positively impacted us because the fear of theft of passwords or IDs has been reduced to almost zero, significantly enhancing our security.

The reduction in password or ID theft risk with One Identity Safeguard has led to measurable changes as security incidents have been reduced, positively impacting us and increasing our efficiency.

What needs improvement?

In terms of improvement for One Identity Safeguard, I would like to say that the customer support needs to be improved and the pricing needs to be a bit more reasonable, as these are the two factors that require attention.

Regarding customer support for One Identity Safeguard specifically, there has been lag and they are not very responsive, which needs to be improved immediately.

For how long have I used the solution?

I have been using One Identity Safeguard for the past eight months.

What do I think about the stability of the solution?

One Identity Safeguard is stable.

What do I think about the scalability of the solution?

One Identity Safeguard's scalability is quite good, as it is scalable according to the needs of the enterprise.

How are customer service and support?

The customer support for One Identity Safeguard was not very good and definitely needs to be improved.

How was the initial setup?

The deployment of One Identity Safeguard took around three months.

The deployment of One Identity Safeguard affected our privileged users seamlessly, without disruption.

What about the implementation team?

We use the on-demand version of One Identity Safeguard because it provides us flexibility, which was the main reason for choosing that version.

What was our ROI?

I can say we have seen a return on investment with One Identity Safeguard as we have saved a lot of time and manpower, although I cannot give a specific number for that.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing for One Identity Safeguard indicated that the pricing was a bit high, while the setup cost was manageable and the licensing was acceptable; overall, the cost aspect was on the higher side.

What other advice do I have?

The feedback I have received from users regarding One Identity Safeguard's usability and functionality has been positive, as the usability aspect has been quite good and it is easy to learn and user-friendly.

The training required to start using One Identity Safeguard was not very extensive, but a bit of training was needed, and it was a smooth process.

If you are looking into using One Identity Safeguard, I would advise that if you are looking for user-friendly software that integrates well with other software, and if you do not mind spending a bit of extra money for that, then One Identity Safeguard is the go-to solution for you. I would rate this product a 7 out of 10.


    Sindre Toft

Centralized privileged access has improved control and now supports secure vendor billing oversight

  • March 12, 2026
  • Review provided by PeerSpot

What is our primary use case?

My use case mainly involves privileged access and access to privileged accounts and privileged systems.

What is most valuable?

One Identity Safeguard's best features are that it provides easy control over your items and what you manage, and it is generally user-friendly, though we are still working on some issues.

The UI for the privileged passwords in One Identity Safeguard is really good. The support for it has also been excellent, but for the privileged sessions, the UI is not that great. We have it currently locked off, so only the administrators work in there, but it is not optimal. We are also missing a lot of documentation in my opinion for some of the features. Overall, it is acceptable. I would not say it is perfect, but it works.

The cloud assistant feature enables me to add an extra layer of security for critical passwords without needing time-consuming approval. We primarily use it for vendors, not for internal users, but we are moving towards having to use it more for internal use as well.

Since using One Identity Safeguard, we have more control over who accesses what, especially regarding vendors. We have seen billing actually go down because we now know how long vendors have been on the server and how long they have worked on it. Overall, we have a more centralized place to store items and have control over them.

What needs improvement?

The transparent mode is a seamless approach when using it. We have some issues with it, but we are working on it to make it work for us.

Managing remote access for privileged users with the secure remote access feature is both easy and hard depending on the scenario we face. We have some systems that are easy and take not even a minute to set up, while others take a bit longer.

We are in the middle of integrating One Identity Safeguard with the IGA solution, Identity Manager. We have some A2A setups, but it is not optimal. We are using RPA for developers, not actually RPA accounts, but that is something we are working on. We are also using the service account password rotation on the asset to some degree, and we are exploring options there.

For integrating One Identity Safeguard, figuring out how password rotation works is a bit difficult because we have to make custom integrations. After that, it was no problem really. For the A2A use, it is not as easy as using something like HashiCorp's password management tools.

It is mostly for certain features in One Identity Safeguard that I would like some improvements. Some of the things you can do in entitlements, there is a lot you can do there, but not everything is optimal. You have to have duplicates of a lot of things to make it work the way you want.

For how long have I used the solution?

I have been using One Identity Safeguard for four years.

What do I think about the stability of the solution?

For the SPPs, I would rate stability at ten. We have never had any issues other than on the upgrades, but those are planned. For the SPS, making a simple config change puts the downtime at about five minutes, so you cannot use any or create new sessions. That is a bit annoying because we have to plan every little change we do. Other than that, I do not think there is really that much.

What do I think about the scalability of the solution?

I would rate the scalability of One Identity Safeguard at maybe seven.

The general use for One Identity Safeguard is why I rate it seven. For the SPPs, we need to have a separate cluster for highly privileged items to access. For the SPSs as well, we need multiple clusters to reach multiple different items. It is a lot to set up instead of just having central management.

How are customer service and support?

We had the premier support for some time, but we are now currently on normal support.

I did not see any value in the premier support, which was the biggest issue and the reason we moved away from it.

I would rate the technical support for One Identity Safeguard at five from my experience, though some may have had other or better experiences.

We had some issues before that took an extremely long time to get fixed. However, I have also had some issues where I sent them a support ticket and they gave me the solution instantly. When we had a tier one ticket, it took about a month before we got it back up and running again.

Which solution did I use previously and why did I switch?

One Identity Safeguard was purchased through a partner purchase, and my experience with our partner was that it went pretty well. I am not directly part of the acquisition team, so I do not know how that works.

How was the initial setup?

Deploying One Identity Safeguard with just the bare minimum was no problem, but knowing everything you need to get in there takes time because we did not really have control over what existed. That was the main issue for us.

One Identity Safeguard was quite easy for the initial setup. The overall configuration with all the items, all the assets, and all the accounts is what takes time.

It took about a week to set up the appliance itself and configure it, but we are talking about maybe a year to get everything configured the way we wanted it for the initial phase.

Which other solutions did I evaluate?

One reason we decided to have HashiCorp still and try to use SPP to push passwords to the HashiCorp setup is the password vault feature. We mainly use HashiCorp for retrieval of passwords because it is a much more built-out environment with APIs and other tools to connect to it. For that, we prefer HashiCorp. However, for overall user experience for less DevOps tasks, One Identity Safeguard or PAM is better in that regard.

What other advice do I have?

It is not really that important to me that the secure remote access feature does not use a VPN because we only have it available internally. The goal is to make it easier for us to start a session, but we have some internal regulations making it not viable for us to make it available externally.

At the start, people thought One Identity Safeguard was hard to use. However, over time when they got used to it, they saw the benefit and the ease of use improved. We still have some people that are a bit harder to get to use it.

For the end user, there is really no issue in using One Identity Safeguard. They are told how to use it and usually figure it out for themselves. For the administrators, it takes a bit longer because there are quite a lot of options and things you can do. We currently have two in training, and they have been working with us for quite some time and still are not fully comfortable working with this PAM solution.

We have physical SPPs and virtual SPSs in One Identity Safeguard. I have no problem with the form factor of One Identity Safeguard's physical appliances, as they seem quite good for the use case.

One Identity Safeguard is deployed on-premises. The only maintenance we have is the upgrades, which happen every half a year I believe. Other than that, we just perform normal day-to-day tasks.

I would recommend One Identity Safeguard, but I would also recommend that they know everything they have before they actually start and prepare the users to be ready for a bit of change.


    Mohamed Fouad

Privileged sessions have become controlled and recorded, and access requests now follow approvals

  • March 02, 2026
  • Review provided by PeerSpot

What is our primary use case?

One Identity Safeguard serves as our Privileged Access Management solution to enforce session management for administrators and allow them to access our systems in recorded sessions, which secures our environment.

In our daily operations, One Identity Safeguard acts as a centralized privileged credentials manager for our systems including Windows, Linux, network devices, and our database, allowing administrators to access our database systems in critical environments while recorded sessions ensure security and accountability.

We have just-in-time access with approvals, allowing administrative access to our users based on request and approvals, which helps us monitor requests for access to critical systems.

What is most valuable?

One of the best features One Identity Safeguard offers is its capability to integrate with many systems, which is valuable for us since we have multiple database systems with many vendors in our organization.

One Identity Safeguard positively impacts our organization by reducing the likelihood of breaches from privileged sprawl by removing shared admin passwords and enforcing control checkouts while also improving our investigation times and providing strong forensics from a centralized location.

What needs improvement?

The most common improvement needed is for upgrades. One Identity Safeguard's desktop client should have a faster and easier upgrade process that ensures compatibility.

For how long have I used the solution?

I have been using One Identity Safeguard for one year.

What do I think about the stability of the solution?

One Identity Safeguard is quite stable in my experience.

Which solution did I use previously and why did I switch?

I previously used One Identity before switching from CyberArk to One Identity Safeguard.

How was the initial setup?

The integration process for One Identity Safeguard was not straightforward. Initially, we faced a complex implementation that took about two months, but after that, we achieved a stable configuration and environment for user access to critical systems.

What about the implementation team?

The deployment was seamless for our privileged users, thanks to the professional third-party team we hired for the implementation service that helped us properly implement One Identity Safeguard.

What was our ROI?

The time saved with One Identity Safeguard is significant, and I can affirm that we have seen a return on investment.

What's my experience with pricing, setup cost, and licensing?

We have a separate department that studies setup costs for each product, but as far as my information goes, the pricing and setup costs are very good.

Which other solutions did I evaluate?

I did not evaluate other options before choosing One Identity Safeguard.

What other advice do I have?

The feedback from users regarding One Identity Safeguard's usability and functionality has been very good. All users have provided positive feedback, and we encourage them to reach out with any issues, but so far, we have had no problems reported.

My advice for those looking into using One Identity Safeguard is to study the integrations between the client and One Identity Safeguard, ensuring the compatibility matrix is visible to all administrators before upgrading the product. I rated this product a ten out of ten.


    Rohan Paul

Privileged access has become more controlled and auditable but the interface still needs simplification

  • January 02, 2026
  • Review from a verified AWS customer

What is our primary use case?

My main use case for One Identity Safeguard is for privileged access management to control, monitor, and secure access to critical systems, servers, and applications used by administrators and IT teams.

A quick specific example of how I use it for privileged access management in my environment is that when an administrator needs access to a critical server, they request access through One Identity Safeguard instead of using shared credentials. The system grants time-bound, approved access, rotates the password automatically after the session, and records the entire activity.

What is most valuable?

The best features One Identity Safeguard offers include Privileged Password Vaulting as the first one. The strongest features are Session Recording and Password Vaulting with rotation and Just-in-Time Access, which together give strong control and visibility and audit readiness.

The Session Recording feature specifically helps my team and makes things easier for audits or investigations by giving a clear, time-stamped playback of privileged activities. It removes guesswork, speeds up audits, and ensures full accountability for admin actions.

One Identity Safeguard has positively impacted my organization by improving our security posture, eliminating shared privileged credentials, increasing visibility into admin activity, and making compliance audits faster and more reliable.

What needs improvement?

One Identity Safeguard could be improved by simplifying the user interface and initial configuration process, especially for first-time users. More customizable reporting and clear in-app guidance would also help teams onboard faster and get deeper insights without additional effort.

For how long have I used the solution?

I have been using One Identity Safeguard for about one year.

What do I think about the stability of the solution?

One Identity Safeguard is very stable and can handle the workload easily; I have not seen any downtime.

What do I think about the scalability of the solution?

One Identity Safeguard scales well as the environment grows. It handles increasing numbers of privileged accounts, sessions, and cloud targets without performance issues, making it suitable for expanding and hybrid infrastructure.

How are customer service and support?

Customer support has been responsive and knowledgeable, being effective at resolving technical issues.

How would you rate customer service and support?

Negative

How was the initial setup?

The integration with my cloud environment and infrastructure systems was moderately easy. Core cloud and infrastructure integrations were straightforward with proper documentation, while fine-tuning policies and access workflows required some initial effort. Once configured, the integrations have been stable and reliable.

Administrators required moderate training to understand configuration, policies, and workflows, while end users needed minimal training since access requests and approvals are straightforward. Overall, onboarding was manageable with some initial guidance.

What was our ROI?

I have seen a return on investment through reduced audit effort and fewer security incidents related to privileged access, along with significant time savings for IT and security teams by automating access control and password management.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing is that pricing is on the higher side, but aligns with the security and compliance value it provides. Setup costs were mainly related to initial configuration and training, and licensing was straightforward.

Which other solutions did I evaluate?

I evaluated other options such as CyberArk and BeyondTrust before choosing One Identity Safeguard.

What other advice do I have?

User feedback has been generally positive around the solution's security and session recording and access control capabilities. However, some users have mentioned that the interface and initial learning curve could be more intuitive, especially for new or non-specialist users.

My advice for others looking into using One Identity Safeguard is to clearly define your privileged access use cases and policies before implementation. It gives stronger security and audit capabilities, but investing time in proper planning, setup, and training will help you get the most value from the solution. I would rate this review a 7.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)


    Jonas Piliponis

Centralized privileged sessions have improved risk control and strengthened contractor oversight

  • December 22, 2025
  • Review provided by PeerSpot

What is our primary use case?

My main use case for One Identity Safeguard is using only one module for privileged session, which we use for admins and contractors.

A quick specific example of how my team uses One Identity Safeguard day-to-day is that we use only the second part for our contractors, not for admins in our company, but for companies that help us perform admin work and support our system.

What is most valuable?

The best features One Identity Safeguard offers include video recordings to help us control our support risks.

Accessing and reviewing those recordings when needed is easy, and there are no problems with recording or reviewing.

One Identity Safeguard has positively impacted my organization by helping us manage risk. We have this product as Balabit, which is a good product that is very light and helps us check or assist with our needs.

What needs improvement?

One Identity Safeguard could be improved with a password manager and an identity manager as one big access management system.

I believe improvements could be made around integrating with other tools.

For how long have I used the solution?

I have been using One Identity Safeguard for eight years.

What do I think about the stability of the solution?

I rated One Identity Safeguard nine out of 10 because the stability and control could be better, as there are some problems with stability and errors when we use it.

What do I think about the scalability of the solution?

As my organization grows or my needs increase, it is easy to add more users or expand the use of One Identity Safeguard, and that experience has been good.

How are customer service and support?

I would rate the customer support for One Identity Safeguard as eight on a scale of one to ten.

Which solution did I use previously and why did I switch?

I did not previously use a different solution before One Identity Safeguard.

How was the initial setup?

The deployment of One Identity Safeguard solution took one or two days.

The deployment affected my privileged users in a way that was pretty smooth.

Which other solutions did I evaluate?

Before choosing One Identity Safeguard, I evaluated other options based on simplicity, price, and functionality.

What other advice do I have?

Feedback from users regarding One Identity Safeguard's usability and functionality is that it is a good product and very simple to use.

My advice for others looking into using One Identity Safeguard is that it is a great solution for simple tasks, with a good price and good functionality.

My company does not have a business relationship with One Identity Safeguard vendor other than being a customer.

I rated this review nine out of ten.


    reviewer2789601

Modern privileged access workflows have improved user onboarding and secure password management

  • December 19, 2025
  • Review provided by PeerSpot

What is our primary use case?

Our main use case for One Identity Safeguard is to integrate it to clients that need the SPP functionality, which stands for Safeguard for Privileged Passwords. They do say that we could utilize One Identity Safeguard to its full extent for now, but we're getting there.

A quick specific example of how we use One Identity Safeguard with a client is that our latest client needed a password vault, so at first, we integrated One Identity Safeguard for Privileged Passwords, and then they asked for a personal vault so they could store their passwords and secrets, much like KeePass, so we integrated One Identity Safeguard Personal Vault as well. Lastly, they figured at some point down the line that they needed SPS as well, but only the primitive version of it, so we just decided to integrate SPS as well and form it into a cluster with SPP, but they don't use any third-party plugins as of now.

What is most valuable?

The best feature One Identity Safeguard offers is that it is a pretty new, modern tool that makes extensive use of its API. In general, it's easier than other tools to just perform maintenance work or perform work using the API of One Identity Safeguard. Also, the way that the access requests are structured—with entitlements and access request policies—makes it easier to govern data and identities. CyberArk, which is essentially the industry standard right now, is doing a very primitive job of helping the administrator with the task, and One Identity Safeguard is a lot better at this.

These features help my team day-to-day by making onboarding new users easier, and they also make it easier to create existing teams that are complete with their own password management, their own password profiles and rotations, password requirements, and who gets access to what, so it all makes it easier and faster.

One Identity Safeguard has positively impacted my organization by being another tool that we have in our arsenal to be able to get other clients as well, because we also sell One Identity IAM, and we can just bundle One Identity Safeguard with it. It also has a nice feature called remote access, which a lot of people want to use for externals in their organization, coupled with its just-in-time requisition, so it makes selling it much easier because One Identity is a company that's been in the field for ages.

What needs improvement?

One Identity Safeguard can be improved by fixing the documentation, which is very convoluted as of now, and addressing versioning, as some major bugs and issues are not documented well enough in the documentation, along with some patches and fixes. Custom plugins need to be introduced as soon as possible.

I give it an eight because it's a nice tool and it's a modern tool, but there are still some issues, not necessarily pertaining to the tool itself, but to the whole philosophy of One Identity and how they have structured their workflows and their knowledge base, which essentially has no knowledge base, just like CyberArk. There are some issues that need to be fixed, plus it does not have a custom option, and a lot of clients are using in-house made applications that also need to be onboarded to One Identity Safeguard to be able to launch a browser session to that application, which One Identity Safeguard has not had any capabilities that could assist with that.

For how long have I used the solution?

I have been using One Identity Safeguard for two and a half years, ever since we pivoted from CyberArk, as we wanted to be more tool-agnostic, and we decided that One Identity Safeguard was our best option because we had a past with One Identity, with us being in an IAM team.

What do I think about the stability of the solution?

One Identity Safeguard is stable.

What do I think about the scalability of the solution?

So far, we haven't had any issues with One Identity Safeguard's scalability; it's been fine, but we generally target smaller to mid-sized implementations.

How are customer service and support?

The customer support for One Identity Safeguard is fine for what it is, even though everything needs to be run through them and there are no knowledge bases, so we have to wait for a response from the One Identity Safeguard company, and they also keep a lot of information, requiring us to make a request and then they would need to reply, but it's acceptable overall. It's not the worst I've seen.

Which solution did I use previously and why did I switch?

I previously used CyberArk before switching to One Identity Safeguard.

How was the initial setup?

The deployment of the solution takes about two to four weeks, give or take, but that's not counting waiting for the client to respond and all that.

About a month of training is required for end-users, and for us, it was four months to understand One Identity Safeguard, but that was because we already had experience in other PAM tools like CyberArk.

What about the implementation team?

We are partners, executive partners, and resellers with this vendor.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing has been a good experience overall, as the back and forth with One Identity is something that is acceptable; other tools have options to do this automatically, and they have it, but pricing, presales, and sales is acceptable overall.

Which other solutions did I evaluate?

Before choosing One Identity Safeguard, I evaluated Zero Trust and Delinea, but they were for smaller organizations, so we decided to adopt One Identity Safeguard.

What other advice do I have?

My advice to others looking into using One Identity Safeguard is to get familiar with the concepts of entitlements and access request policies, the keywords One Identity Safeguard uses, and also get familiar with the way that it handles session management and recording because it's a tool that needs a lot of time to get accustomed to. I give One Identity Safeguard an overall rating of eight out of ten.


    SachinShelar

Privileged access has become centralized and streamlines multi-client audits and compliance

  • December 15, 2025
  • Review from a verified AWS customer

What is our primary use case?

Our main use case for One Identity Safeguard is as a privileged access management solution across multi-client environments. We use it to secure, control, and audit privileged accounts, enforce session monitoring and password vaulting, and provide just-in-time privileged access for admins, helping us reduce risk while meeting client security and compliance requirements.

A common example is admin access to client production servers. We use One Identity Safeguard to vault privileged credentials and grant just-in-time access only for approved change windows. All sessions are recorded and audited, which has significantly reduced credential exposure and helped us meet clients' audit and compliance requirements. As a service provider managing various customers, we prioritize this consideration.

One additional use case is centralized PAM management across multiple customer environments. We use One Identity Safeguard to standardize privileged access policies, rotate passwords automatically, and enforce session auditing in different client environments. This helps us solve the challenge of shared admin access and inconsistent access controls, improving security and compliance without increasing operational overhead and reducing our time to response.

What is most valuable?

The best features we can highlight are privileged password vaulting and automatic password rotation, just-in-time privileged access, and session monitoring and recording. These features together stand out because they significantly reduce credential exposure, enforce least privilege access, and provide full auditing visibility across multiple client environments, as we are a service delivery and IT service delivery company with multiple customer environments and access.

We rely most on just-in-time privileged access with credential vaulting. It is easy for the team to use day-to-day because access requests and approvals are streamlined and automated. Credentials are never exposed and sessions are automatically logged. After initial setup, adoption was smooth and it fit well into our existing operational workflows without adding stress to our operational team to adapt to the new technology.

One Identity Safeguard has strengthened privileged access security across our multiple client environments. We have seen a reduction in shared credentials and unauthorized access. We have also seen faster approval for admin tasks and improved audit readiness. It has streamlined compliance reporting and reduced the operational risk of managing multiple client environments manually.

Implementing this solution, we have reduced privileged account-related incidents by thirty percent. We have also cut manual password management time by nearly fifty to sixty percent. Just-in-time access has sped up admin task completion and improved our overall compliance reporting, allowing audits to be completed nearly half the time compared to earlier.

What needs improvement?

Reporting and dashboards can be made more customized, especially for client-specific views. We use session monitoring less often on low-risk systems, but it is very useful during audits or investigations.

One Identity Safeguard could be improved with flexible and customizable reporting, especially for client-specific dashboards, and simpler integration with cloud and SaaS platforms.

Additional improvements would include easier onboarding and setup for multiple client environments. One Identity Safeguard should provide pre-built templates for common PAM policies.

For how long have I used the solution?

We have been using One Identity Safeguard for the last three years.

What do I think about the stability of the solution?

One Identity Safeguard is stable.

What do I think about the scalability of the solution?

One Identity Safeguard is scalable.

How are customer service and support?

The customer support is great. They have knowledgeable staff and the documentation is also good.

How would you rate customer service and support?

Which solution did I use previously and why did I switch?

Before that, we relied on manual privileged account management and native system tools, which was time-consuming and error-prone, and lacked centralized auditing. We switched to One Identity Safeguard to get automated privileged access and stronger compliance control over multiple client environments.

What was our ROI?

Privileged access and privileged account incidents have dropped by forty percent. Our manual access management time was cut by fifty percent. The time is reduced by nearly fifty percent for our audit preparation and compliance reporting compared to earlier.

Which other solutions did I evaluate?

Before that, we evaluated CyberArk. We selected One Identity Safeguard because it offered better integration with our existing infrastructure and streamlined automation for our multi-client infrastructure, which suited our operational and compliance needs.

What other advice do I have?

Plan your deployment carefully and ensure you have skilled resources and partner support for initial setup.

We have integrated One Identity Safeguard with our RPA workflows. It allows secure, automated privileged access for script bots and deployment processes, while ensuring session logging, password vaulting, and audit compliance across cloud-based operations.

The integration was relatively straightforward but required more planning, mapping RPA bots to just-in-time privileged access, and configuring credential vaulting took initial time. Once the setup was complete, it was fully automated and secure.

Our team has given positive feedback. They appreciate the user interface and the streamlined access request and automated credential management has reduced manual work and error. I would rate this review nine out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?