Reviews from AWS customer

8 AWS reviews

External reviews

46 reviews
from

External reviews are not included in the AWS star rating for the product.


4-star reviews ( Show all reviews )

    Ahitesh Anumala

Privileged access has become tightly controlled and audit preparation now runs faster

  • April 20, 2026
  • Review provided by PeerSpot

What is our primary use case?

I mainly use One Identity Safeguard to secure and control privileged access by managing admin credentials, granting time-based access, and monitoring sessions to ensure security and compliance.

For example, when an admin needs access to a production server, they request it through One Identity Safeguard, which grants time-limited access after approval. The system automatically injects the credentials, so the password is never exposed, and the entire session is monitored and recorded. This helps my team maintain security and quickly review activity during an audit.

What is most valuable?

One key benefit of my main use case with One Identity Safeguard is that it helped me eliminate shared admin credentials, which was a major security risk earlier. Now, every access request is tracked and tied to an individual user, improving accountability. It also simplified audits by providing clear session records, which solved a big challenge I previously faced with compliance visibility.

The best features One Identity Safeguard offers include credential injection, session monitoring, and role-based access control. Credential injection ensures passwords are never exposed to users, improving security, while session monitoring and recording provide full visibility and an audit trail of activity. Role-based access helps enforce a least privilege policy, and additional features such as real-time alerts, reporting, and integration with other systems make it a comprehensive solution for managing and securing privilege.

What needs improvement?

I would appreciate more flexibility in reporting and easier customization of dashboards in One Identity Safeguard. While the core features are strong, some advanced configuration can be somewhat complex. Features such as integration are useful but are used less frequently in daily operations compared to credential management and session monitoring. Adding a more intuitive control and simplifying advanced settings would enhance the usability.

One Identity Safeguard could be improved with a more user-friendly interface and simpler initial setup, as the learning curve can be somewhat steep. Enhancing reporting customization and expanding integration with more third-party tools would also add value. Additionally, faster support response times and smoother scalability for large environments would further improve the overall experience.

A specific challenge I faced during the use of One Identity Safeguard was during initial setup and policy configuration, which was time-consuming and required careful tuning to match my environment. At times, navigating advanced settings and generating custom reports also felt less intuitive, which slowed things down. Improving documentation and simplifying these configurations would make the experience much smoother for my team.

For how long have I used the solution?

I have been using One Identity Safeguard for two years.

What do I think about the stability of the solution?

Overall, One Identity Safeguard's authentication service is stable and reliable.

What do I think about the scalability of the solution?

One Identity Safeguard is highly scalable and can support growing environments effectively. It allows me to add more systems and users without major performance issues, and its clustering and load distribution capabilities help maintain performance as demand increases. Overall, it scales well for both mid-sized and large enterprise environments.

How are customer service and support?

Customer support for One Identity Safeguard was generally good, with a knowledgeable and helpful team assisting during the setup and troubleshooting. In most cases, issues were resolved efficiently, but response times can sometimes be slower for more complex problems.

Which solution did I use previously and why did I switch?

I was previously using a basic in-house solution for managing privileged credentials, but it lacked advanced features such as session monitoring and automated password management. I switched to One Identity Safeguard for better security, centralized control, and improved compliance capability.

How was the initial setup?

The integration of One Identity Safeguard with my DevOps environment and cloud applications was generally smooth, especially with standard systems, but it required some initial configuration and fine-tuning to align with my DevOps workflow and core cloud applications. I did face minor challenges around setup and policy configuration, but once implemented, it worked reliably and integrated well with my environment.

What was our ROI?

I have seen a clear return on investment with One Identity Safeguard. I have reduced manual effort for access management by around thirty to forty percent, which has saved significant staff hours. Audit preparation time has decreased by nearly fifty percent, and improved security controls have helped lower the risks of costly incidents. Overall, the efficiency gains and risk reduction have justified the investment.

What's my experience with pricing, setup cost, and licensing?

In terms of pricing and licensing, my experience with One Identity Safeguard has been fairly reasonable. It is based on the number of users and privileged accounts, with options for a subscription or perpetual licensing. The initial setup cost was moderate, especially considering the security benefits, although some investment was required for deployment and configuration. Overall, I found the pricing was justified with the environment.

Which other solutions did I evaluate?

Before choosing One Identity Safeguard, I evaluated a few other privileged access management solutions, such as CyberArk Privileged Access Manager, Delinea Secret Server, and BeyondTrust Privileged Access Management. These are well-known options in the market and commonly compared during the evaluation.

What other advice do I have?

My advice for others looking into using One Identity Safeguard would be to plan the implementation carefully and invest time in understanding your access policies and workflow before deployment. One Identity Safeguard is a powerful tool, but it is not plug and play. It requires proper configuration and tuning to get the best results. Start with a phased rollout, focus on high-risk privileged accounts first, and ensure your team is trained properly. Once properly implemented, it can significantly improve security, visibility, and compliance across the organization. I would rate this product nine out of ten.


    Prathamesh Pawar

Centralized control has eliminated shared credentials and provides secure audited admin access

  • April 18, 2026
  • Review provided by PeerSpot

What is our primary use case?

In my daily operations, I rely on One Identity Safeguard for administrator requests for access through One Identity Safeguard, which are approved via workflows. Once approved, sessions are launched, ensuring security without revealing passwords, and all activities are recorded for auditing purposes.

In our environment, there were multiple administrators using shared privilege accounts, which created accountability and security risks. With One Identity Safeguard, we implemented password vaulting where passwords are automatically rotated and never exposed to users, ensuring secure access and eliminating shared credential risks.

In our daily operations, One Identity Safeguard is primarily used to manage and control privilege access to critical systems such as servers, network devices, and databases. Administrators and users request access through One Identity Safeguard, which follows an approval-based workflow. Once access is approved, users can securely connect to the target system without directly viewing or knowing the privilege credentials. All sessions are proxied through One Identity Safeguard, ensuring that passwords are never exposed. Additionally, every session is monitored and recorded, allowing security teams to review activities when required. We also use One Identity Safeguard for automated password rotation, ensuring that privileged account passwords are regularly updated without manual intervention. Overall, it acts as a centralized platform for security, secure access management, auditing, and compliance in our environment.

How has it helped my organization?

The implementation of One Identity Safeguard has had a significant positive impact on our organization's security and operational efficiency, reducing the risk of credential misuse by eliminating shared privilege accounts and enforcing secure password vaulting with automated rotation. One Identity Safeguard improves security by eliminating shared credentials, enhancing visibility through session monitoring, simplifying compliance, and streamlining privilege access management.

After implementing One Identity Safeguard, we achieved several measurable improvements in our environment. We eliminated the use of shared privilege accounts, significantly improving accountability and reducing security risks. Privileged password exposure was reduced to zero, as all credentials are securely stored and managed through the vault with automatic rotation. Audit and compliance processes became faster and more efficient, as we could provide complete session logs and recordings whenever required. We implemented shared account management, achieved zero password exposure, improved audit readiness, reduced access management time, and gained full visibility into privileged activities.

What is most valuable?

The most valuable features of One Identity Safeguard are its strong privilege access control and session security capabilities. One key feature is password vaulting with automated rotation, which ensures that privileged credentials are never exposed to users and are regularly updated. Key features include password vaulting with rotation, session monitoring and recording, secure remote access without exposing credentials, approval-based workflows, and seamless integration with Active Directory.

One Identity Safeguard integrates seamlessly with Microsoft Active Directory, simplifying user authentication and access management. The integration provides centralized authentication, group-based access control, and automated management of privileged domain accounts, reducing manual efforts and improving security.

Additional features include session proxy access, granular policy control, threat detection, detailed audit logs, multifactor authentication, and high availability support.

What needs improvement?

While One Identity Safeguard is a strong privilege access management solution, there are some areas where improvements can be made. The initial deployment and configuration can be complex, especially in a large enterprise environment with multiple integrations. The user interface can be improved to make navigation more intuitive, particularly for new users and administrators. Reporting and customization options could be more flexible, as generating tailored reports sometimes requires additional effort. Integration with third-party tools, although supported, can be time-consuming and may require deeper technical expertise. Additionally, performance tuning may be required in high-load environments to ensure optimal session handling response times. Areas for improvement include complex initial setup, UI enhancement, more flexible reporting, and easier third-party integration.

Improvements can be made in areas such as simplifying the deployment and initial configuration process, especially for large complex environments. The user interface could be made more intuitive and user-friendly, making it easier for new users and administrators to navigate. Reporting capabilities can be enhanced with more customization options and easier report generation. Streamlining integration with third-party tools and platforms could reduce implementation efforts and time. Additionally, improved performance optimization for high-load environments would help ensure smoother session handling and a better user experience.

For how long have I used the solution?

I have been using One Identity Safeguard for the last one year.

What do I think about the stability of the solution?

One Identity Safeguard is stable in my environment and has been reliable in our production environment. We have not experienced any major downtime or critical issues after the initial deployment and configuration phase. The solution performs reliably for daily privilege access operations, including session management and password vaulting. With proper sizing and high availability configuration, the system handles multiple concurrent sessions efficiently, making it a dependable and stable platform suitable for enterprise environments.

What do I think about the scalability of the solution?

One Identity Safeguard is highly scalable and well-suited for enterprise environments. The solution can handle a growing number of privileged accounts and target systems without significant performance impact when properly sized, supporting horizontal scaling by adding additional appliances, allowing organizations to expand capacity as needed.

How are customer service and support?

One Identity's customer support is knowledgeable and provides helpful guidance for troubleshooting and configuration-related issues. For standard issues, the response time is responsive and the resolutions are effective. For more complex or critical issues, response time can sometimes vary, but overall, my support experience has been satisfactory. Documentation and knowledge base resources are also useful for resolving common issues and understanding product features, making customer support reliable and meeting enterprise expectations.

Which solution did I use previously and why did I switch?

Before implementing One Identity Safeguard, we relied on manual methods and basic access control mechanisms to manage privileged accounts. In some cases, privileged credentials were shared among administrators, and password management was handled manually, increasing security risks and reducing accountability. We moved to One Identity Safeguard for better security, centralized control, and session visibility.

How was the initial setup?

The deployment of One Identity Safeguard in our environment took approximately four to six weeks. The initial setup of the physical appliance was straightforward, but the overall implementation required careful planning, especially for integration with Active Directory and onboarding the target systems. One of the main challenges was defining and configuring access policies and approval workflows according to the organization's requirements, but the solution is stable after implementation.

What about the implementation team?

The training required for One Identity Safeguard was moderate. For administrators, detailed training is needed to understand policy configuration, password vaulting, session management, and integration. It typically took a few days of hands-on sessions along with initial setup implementation support. For end-users, minimal training is required as the access request and approval workflow is straightforward and user-friendly. Overall, with proper initial training and documentation, the team quickly adapts to the solution in daily operations.

What was our ROI?

I believe One Identity Safeguard delivers a strong return on investment by significantly reducing security risks and improving operational efficiency. ROI is achieved through reduced security risks, lower manual efforts, faster audits, and improved operational efficiency.

What's my experience with pricing, setup cost, and licensing?

One Identity Safeguard is priced at a premium level, typical for enterprise-grade privilege access management solutions. The licensing is generally based on the number of privileged accounts, users, or appliances, depending on the deployment model and components used. The initial setup cost includes the appliance cost, implementation efforts, and integration with existing systems, such as Active Directory and other infrastructure components.

Which other solutions did I evaluate?

Before finalizing on One Identity Safeguard, we evaluated other privilege access management solutions, such as CyberArk and BeyondTrust. CyberArk is a strong market leader with advanced features, but it can be complex to implement and manage. BeyondTrust also offers good capabilities, especially for endpoint privilege management and remote access, but we found One Identity Safeguard to be more aligned with our requirements in terms of ease of use and deployment flexibility. We chose One Identity Safeguard because it provides a good balance between security, usability, and integration capabilities, particularly with Active Directory.

What other advice do I have?

Overall, my experience with One Identity Safeguard has been very positive. It is a reliable and secure privilege access management solution that effectively protects sensitive accounts and provides full visibility into administrator activity, with minor improvements needed in terms of UI and reporting enhancements.

Before implementing One Identity Safeguard, I advise clearly defining your privilege access management strategy and identifying all critical systems and accounts. Plan integrations in advance, especially with Active Directory and other security tools, to ensure a smooth deployment. Focus on designing proper access policies and approval workflows, as these play a key role in effective implementation. Provide adequate training to administrators so they can fully utilize features like session monitoring, password vaulting, and reporting. Starting with a phased deployment approach, onboarding critical systems first and then gradually expanding across the environment is beneficial. Overall, proper planning and user training are key to maximizing the benefits of the solution.

One Identity Safeguard is a mature and enterprise-ready privilege access management solution that provides a strong balance between security and usability. The key value of the solution lies in its ability to centralize privilege access control while maintaining full visibility and auditability for user activities, making it a mature and reliable PAM solution that balances security and usability with strong long-term value for enterprise environments. I would rate this solution a nine out of ten.


    Nitin Yadav

Secure access has improved privileged workflows and real-time monitoring streamlines daily tasks

  • April 17, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for One Identity Safeguard includes privilege access, session recording, and real-time monitoring.

In daily work, I use session recording and real-time monitoring as part of my workflow.

My main use case is privilege access.

What is most valuable?

The best features One Identity Safeguard offers include secure and controlled access along with real-time session controlling.

The real-time session control feature helps me in my daily tasks by providing session controlling and monitoring in user sessions that occur, allowing proactive management across web and platform access instead of reacting after something goes wrong.

Session monitoring and recording are also crucial parts of the features.

One Identity Safeguard has a noticeable positive impact around security and operational efficiency, providing secure, strong security, real-time monitoring, and full visibility.

Operational efficiency has improved as it requires less manual effort for the IT team and makes troubleshooting easier.

What needs improvement?

One Identity Safeguard needs improvement in deployment and integrating with other products.

Many team members feel that the biggest friction with One Identity Safeguard relates to access requests, session approvals, and policy changes, which require more clicks than expected.

I think One Identity Safeguard is a good product, but it just needs improvement in tech support.

For how long have I used the solution?

I have been using One Identity Safeguard for the last two years.

What do I think about the stability of the solution?

One Identity Safeguard is stable in my network.

What do I think about the scalability of the solution?

Scalability is very good as it can easily scale with organizational growth by adding more virtual appliances, and it handles increasing users, servers, and privilege accounts without any major performance issues.

How are customer service and support?

Customer support is really good.

Which solution did I use previously and why did I switch?

I previously used a different tool for managing, but it lacked centralized control, proper auditing, and security features.

How was the initial setup?

The deployment of the solution took around two to four weeks due to initial setups, integrations, and policy configurations.

End users need a minimum of two to three weeks to understand the solutions.

What was our ROI?

I have seen a return on investment in both money saved and time saved.

I have experienced noticeable time savings and some indirect cost benefits, specifically in that access provision has reduced from hours to minutes, requiring less manual effort, and the cost impact has been mitigated due to fewer security incidents and audit issues.

What's my experience with pricing, setup cost, and licensing?

The pricing, setup cost, and licensing are not the cheapest, but they offer strong security features that justify the cost.

The license is usually based on the number of user accounts, which is straightforward to understand, and the setup cost is good and reasonable.

Which other solutions did I evaluate?

Before choosing One Identity Safeguard, I evaluated BeyondTrust.

What other advice do I have?

My advice for others considering One Identity Safeguard would be to plan and execute the deployment properly during the implementation phase.

I have given this review a rating of 8.


    reviewer2814237

Privileged access has become controlled and monitoring now supports security and compliance

  • April 17, 2026
  • Review provided by PeerSpot

What is our primary use case?

I use One Identity Safeguard mainly for managing and securing privileged access like controlling admin accounts and monitoring sensitive sessions.

For example, I use One Identity Safeguard to grant temporary admin access to users and track their sessions to make sure everything is secure.

One Identity Safeguard also helps with password vaulting and automatic rotation.

This means we don't have to share or manually manage sensitive credentials.

We are using One Identity Safeguard in a hybrid setup, partly on-premises for sensitive access control and partly integrated with cloud services.

We have integrated One Identity Safeguard with our cloud environment on Microsoft Azure and also with some internal DevOps workflows so privileged access can be controlled during the deployments and automation tasks.

It was moderately easy overall to integrate One Identity Safeguard with our DevOps workflows and Microsoft Azure environment.

Microsoft Azure integration was pretty smooth, but the DevOps workflow setup took a bit more effort to configure and test properly.

What is most valuable?

I think the best features One Identity Safeguard offers are strong password vaulting with auto-rotation, session monitoring and recording, and real-time alerts that help catch suspicious activity quickly.

The real-time alerts from One Identity Safeguard are pretty reliable.

Alerts come in quickly, and they have helped us respond faster to suspicious activity before it becomes a bigger issue.

The session recording and audit logs from One Identity Safeguard really stand out.

They make tracking and reviewing activity easy.

But it would be even better if the UI was a bit more user-friendly.

One Identity Safeguard has improved security a lot by controlling privileged access, and it also reduced risks since all sensitive activities are monitored and logged.

We have seen fewer security risks since access is controlled and monitored by One Identity Safeguard, and it definitely helped with compliance because all actions are logged and easy to audit.

What needs improvement?

I think One Identity Safeguard could be improved by making the UI more user-friendly and simplifying some configurations, as it can feel a bit complex at times.

Reporting with One Identity Safeguard could be more detailed and easier to customize, and better integration with other tools would make the overall experience smoother.

For how long have I used the solution?

I have been using One Identity Safeguard for around one and a half years.

What do I think about the stability of the solution?

One Identity Safeguard is generally stable and reliable in day-to-day use.

What do I think about the scalability of the solution?

One Identity Safeguard is generally considered highly scalable and enterprise-ready.

How are customer service and support?

Customer support for One Identity Safeguard is generally good and knowledgeable, especially when it comes to technical issues and enterprise deployments.

Which solution did I use previously and why did I switch?

Earlier we were using a mix of manual access management and some basic PAM tools, but we switched to One Identity Safeguard for better automation, strong security controls, and easier auditing.

How was the initial setup?

Admins needed a bit of training for One Identity Safeguard, maybe a few days to get comfortable with policies and setup.

But for end-users, it was pretty minimal since most of it runs in the background.

It was mostly seamless for privileged users after deploying One Identity Safeguard.

They just had to follow the new access request process, and after a short adjustment period, it didn't really disturb their daily work.

What about the implementation team?

We didn't purchase One Identity Safeguard through the Microsoft Azure Marketplace.

We went through a direct vendor licensing process.

What was our ROI?

We have seen ROI with One Identity Safeguard mainly in reduced manual efforts and faster access handling.

Roughly around 40 percent less time spent on managing privileged accounts, and also fewer security incidents that need manual intervention, which saved both time and operational costs.

What's my experience with pricing, setup cost, and licensing?

Pricing for One Identity Safeguard was on the higher side but justified by the security features.

Setup cost was manageable and licensing is typically subscription-based per appliance or capacity, which makes it easier to scale but can add up in larger environments.

Which other solutions did I evaluate?

We did evaluate a few options before finalizing One Identity Safeguard. The main ones we looked at were CyberArk, BeyondTrust, and several others.

CyberArk was very strong but felt a bit complex and costly, and BeyondTrust was solid for remote access and monitoring.

In the end, we chose One Identity Safeguard because it fit better with our hybrid setup and integration needs.

What other advice do I have?

One Identity Safeguard is a solid and reliable PAM solution in my experience.

My advice would be to start with a clear access model before you deploy One Identity Safeguard. I would rate this review an 8 out of 10.


    Prithviraj kallurkar

Centralized controls have transformed privileged access and streamlined audit workflows

  • April 16, 2026
  • Review provided by PeerSpot

What is our primary use case?

I am familiar with One Identity Safeguard and am also evaluating it for the organization.

For our primary use case for evaluating One Identity Safeguard, we aim to strengthen privileged access management across our environment. Currently, we are looking to improve how we control, monitor, and secure access to critical systems, especially for admin and high-privilege accounts. Additionally, as our infrastructure is a mix of on-premises and cloud, we need a solution that can provide centralized visibility and control across the environment. One Identity Safeguard aligns well with that need while also helping us streamline access workflows and improve audit readiness.

A good example of a scenario where One Identity Safeguard would really help my team is managing third-party vendor access. When external vendors need access to our critical servers for maintenance or troubleshooting, it often involves sharing credentials or giving standing access, which increases risk. With One Identity Safeguard, we could provide temporary, just-in-time access without exposing actual passwords. The vendor would request access, get approval, and then log in through One Identity Safeguard. Their entire session would be monitored and recorded. This helps us in multiple ways: no credential sharing, full visibility of what actions were performed, and an audit trail for compliance. Once the task is done, access is also automatically revoked. In this scenario, One Identity Safeguard directly reduces security risk while also making the process more controlled and compliant.

There is one important scenario related to internal privileged user management that I would like to add about my use case for One Identity Safeguard. For example, our system administrators currently have standing access to central servers. With One Identity Safeguard, we can shift to a just-in-time access model where admin rights are granted only when needed and for a limited time. This significantly reduces the risk of misuse or accidental changes. Another scenario would be audit and compliance. During audits, it is often challenging to provide clear evidence of who accessed what and what actions were performed. One Identity Safeguard helps by maintaining session recordings and detailed logs, making audits much smoother and faster.

What is most valuable?

In my opinion, the best features of One Identity Safeguard are the ones that directly improve both security and operational control. First, privileged session monitoring and recording stand out. One Identity Safeguard can capture and replay entire sessions with searchable logs, even down to the commands and screen activity. This is extremely useful for audits and incident investigations. Second would be secure password vaulting with automated rotation, which is a big advantage. It eliminates manual credential handling and reduces the risk of password exposure while enforcing strong security policies. Another key feature is real-time monitoring and threat detection. One Identity Safeguard can detect suspicious behavior during a session and even block unsafe actions, which adds a proactive security layer rather than just reactive logging. Finally, centralized privileged access governance is an essential feature. Bringing password management, session control, and analytics into a single platform makes it much easier to manage hybrid environments effectively.

Session monitoring and recording, even from demos and industry feedback, has the biggest impact on audits in terms of clarity and speed. Instead of relying only on logs or user statements, with One Identity Safeguard, I can actually replay a full session, see exactly what commands were run, what changes were made, and in what sequence. During an audit or investigation, instead of spending hours correlating logs, my team can directly pull the session recording as evidence. It reduces ambiguity, speeds up root cause analysis, and makes compliance reporting much stronger and more defensible. For example, if there is any suspected misconfiguration or data change, I do not have to guess; I can literally watch what happened.

For day-to-day operations, automated password rotation in One Identity Safeguard shifts us from a manual, reactive process to a fully automated, policy-driven approach. Today, IT teams often spend time resetting privileged passwords, handling access requests, and responding to potential credential exposure. With automation in place, most of the effort is eliminated. Passwords are rotated automatically after each use or on a scheduled basis, so there is no need for frequent manual resets. In fact, it does not just reduce how often we reset passwords; it removes the need for manual resets almost entirely. In terms of workload, this means fewer support tickets related to password issues, less coordination between teams for credential sharing, and reduced human error. The IT team can shift focus from routine tasks to more strategic work like security improvements and system optimization. One important operational change is that users no longer handle actual credentials. They request access, get approved, and One Identity Safeguard manages everything in the background. That is a big shift in thinking, but it slightly improves security.

What needs improvement?

The feature I think is a bit underrated in One Identity Safeguard is the approval workflow and access request system. It might sound basic, but having a structured, policy-based approval process really improves governance. It ensures that every privileged access is justified, approved, and tracked, which is especially useful in large teams where accountability can get blurred. Another underrated aspect is integration flexibility. One Identity Safeguard can integrate with directories, SIM tools, and hybrid environments, making it easier to fit into existing infrastructure rather than focusing on a complete overhaul. If I had to point out something that could be improved or is sometimes seen as missing, it would be user experience or UI. Some users feel it could be more intuitive, especially for non-technical users. Initially, deployment complexity, as with many PAM solutions, means setup and fine-tuning policies can take time. Advanced analytics depth is another area where, while good, some organizations compare it to competitors that offer more mature, AI-driven insights. Overall, One Identity Safeguard is very strong in core PAM capabilities such as session control and credential security, but there is room to improve usability and advanced analytics.

One area where the UI in One Identity Safeguard could improve is navigation and ease of use, especially for first-time or non-technical users. For example, when a user wants to request access to a resource, the process can feel a bit layered. Users may need to navigate through multiple menus to find the right asset or account. A more guided, simplified request flow, such as a single dashboard with request access front and center, would make it more intuitive. Another example is session management and monitoring views. While the data is very powerful, the interface can sometimes feel dense. There is a lot of information on screen. For someone who just wants to quickly check activity sessions, review a recording, or identify risk behavior, it could benefit from a more clean dashboard-style layout with clear visuals highlighting instead of heavy tables. Also, in policy configuration, setting up rules for access or password rotation can be a bit complex. It often requires understanding multiple parameters and dependencies. A more wizard-based setup or user-friendly policy builder would make it easier, especially for teams that are not deeply specialized in PAM.

While One Identity Safeguard is strong in core PAM capabilities, there are a few areas where it could be improved in the future. One area is deeper integration, especially with modern cloud-native and DevOps tools. While it integrates well with traditional infrastructure, tighter, more seamless integration with platforms such as CI or CD pipelines or container environments could make it even more relevant for evolving architecture. Another improvement could be in advanced analytics and AI-driven insights. The current monitoring and alerting are solid, but having behavior analytics with more predictive capabilities, such as identifying malicious behaviors before they become risks, would add a strong proactive security layer.

From a documentation perspective, it would be helpful if there were more real-world use cases and step-by-step implementation examples. Sometimes the current documentation feels a bit too feature-focused, and adding practical scenarios would make onboarding easier. Regarding training, more structured learning paths or short guided tutorials for different user levels, from beginners to advanced, would be helpful.

For how long have I used the solution?

I have been using One Identity Safeguard for a year now.

What do I think about the stability of the solution?

Overall, we have seen good stability and strong scalability with One Identity Safeguard, especially after the initial tuning phase. Once the system was properly deployed and integrated, it has been very reliable in day-to-day operations. We have not experienced any major unplanned outages in production. Most issues, when they occurred, were related to initial configuration changes or network level dependency. In terms of downtime, we only see planned downtime during upgrades or maintenance windows. Even those were manageable because we schedule them during off-peak hours. The system supports clustering or redundant configuration, so access can often continue through other nodes depending on the setup. Overall, downtime impact has been minimal.

What do I think about the scalability of the solution?

One Identity Safeguard has met our needs well as the environment has grown. As we added more privileged accounts, systems, and user groups, we were able to scale by expanding the virtual appliance footprint and clustering. The platform is designed to support horizontal scaling, so adding capacity is relatively straightforward without redesigning the entire architecture.

How are customer service and support?

I have had to reach out to One Identity customer support a few times, mainly during the initial development phase or for a couple of integration-related queries. Overall, the experience has been decent to good, but it varies depending on the type of issue. For critical or well-defined technical issues, especially around configuration or known product behavior, the support team has been quite effective. They have provided clear guidance and documentation references, and in some cases, helped us resolve issues within a reasonable timeframe. Overall, the responsiveness from the technical side has been generally good, and the knowledge of the support team has been useful. Resolution time has been good for common use issues but slow for complex or custom scenarios, and handling escalations has been manageable.

Which solution did I use previously and why did I switch?

Previously, we used a more basic PAM approach built around a legacy vaulting solution combined with manual approval workflows, ticket-based access, and shared admin controls. We switched mainly because of limited access visibility and auditing, too much manual effort, weak hybrid or cloud integration, especially as we moved more workloads to Azure, and scaling challenges that arose as the number of privileged accounts and systems increased.

How was the initial setup?

The initial deployment of One Identity Safeguard on virtual appliances took roughly six to eight weeks end-to-end, including planning, setup, integration, and user rollout. The process was done in phases. First, we set up the core One Identity Safeguard appliance in a controlled environment and integrated it with our identity sources such as Active Directory. After that, we configured privileged accounts, session policies, and audit requirements. We also ran a pilot with a small group of administrators to validate session recording, access workflows, and reporting before going wider. In terms of disruption, it was minimal for most privileged users, but not completely zero. During the pilot phase, there were some adjustments needed because users had to get used to logging in through One Identity Safeguard gateways instead of directly accessing the system. Overall, the phased rollout approach helped reduce disruption significantly, and most users adapted quickly after the initial onboarding period.

What about the implementation team?

For the administration team, we needed more structured training, roughly a few days of focused hands-on sessions, plus some internal sandboxing practice. This covered things such as configuring safe rules, policies, integration with Active Directory, and audit logs. The learning curve is a bit steep initially because One Identity Safeguard has a lot of depth, especially around policy design and access control models. For end users, the training was relatively light. Most of it was around how to access systems through One Identity Safeguard gateways, how session recording works, and what changes in other login workflows. A short one to two-hour walkthrough session plus quick reference guides were usually enough for them to get comfortable with it.

What was our ROI?

Overall, we have seen a clear ROI from One Identity Safeguard, mostly in the form of time savings, reduced manual effort, and improved audit efficiency rather than just direct headcount reduction. In terms of time saved, one of the biggest gains is the privileged access workflow, such as password rotation and session approvals. What used to require manual coordination or admin intervention is now largely automated. This has noticeably reduced day-to-day operational overhead for the infrastructure team, amounting to multiple FTE days per week after deployment. From a security and compliance standpoint, the ROI is more evident. Session recording and audit trails have reduced the time spent preparing for audits and investigating incidents. Instead of manually reconstructing activity, everything is already logged and searchable, which has improved response time during internal reviews.

What's my experience with pricing, setup cost, and licensing?

We evaluated the pricing and setup cost as part of the overall deployment, and as with most enterprise PAM solutions, it is not cheap, but it is fairly aligned with what you get in terms of capability and security coverage. From a licensing perspective, One Identity Safeguard follows a custom enterprise model, typically based on factors such as the number of privileged accounts, users, and the modules you deploy. It is negotiated based on scope and scale rather than a simple per-user licensing. In our case, the initial setup cost was higher than expected, mainly because it was not just a software license; it included infrastructure planning, virtual appliance development, integration work, and security configuration.

Which other solutions did I evaluate?

Before choosing One Identity Safeguard, we did evaluate a few other enterprise PAM solutions. The main ones were CyberArk Privileged Access Manager and BeyondTrust Privileged Access Manager. We compared them mainly on session recording and monitoring capabilities, ease of deployment in hybrid environments, and integration with Active Directory. One Identity Safeguard stood out because it offered a strong balance of deep session monitoring and solid integration with our identity stack, along with easier appliance-based development. It aligned well with our internal compliance and auditing requirements without adding too much operational complexity. Overall, the decision came down to fit with our hybrid infrastructure, ease of control, scalability, and compliance readiness rather than just feature comparison.

What other advice do I have?

Even during the evaluation phase, One Identity Safeguard has shown clear positive impacts across key areas in my organization. From a security posture perspective, the biggest improvement is the elimination of direct credential exposure. Instead of sharing admin passwords, access is brokered through One Identity Safeguard, which significantly reduces the risk of credential misuse or leakage. In terms of audit readiness, we have seen a big improvement in visibility. The ability to track sessions and maintain detailed logs means we can quickly answer questions such as who accessed what, when, and what actions were performed. Even in a pilot, this level of transparency makes audits much more straightforward. On the operational efficiency side, processes such as access requests and approvals have become more structured instead of informal or manual coordination. Everything follows a defined workflow, which reduces delays and confusion.

Since we are still in the evaluating or pilot phase of One Identity Safeguard, we do not have long-term production metrics yet, but we have observed some early indicators and rough estimates. For example, in terms of operational efficiency, we have seen a noticeable drop of roughly thirty to forty percent in password-related support requests within the pilot group, mainly because users no longer need to request or manage credentials manually. From an audit perspective, the time required to gather access logs and evidence has reduced significantly. Tasks that earlier took hours, such as correlating logs, can now be done in minutes using session recordings. We estimate around fifty to sixty percent reduction in audit preparation time for privileged access reviews. On the security side, while it is early to quantify incidents, we have effectively reduced the risk surface by eliminating shared credentials in the pilot scope. That alone is a major improvement, even if it is not directly measurable yet. Earlier estimates show thirty to forty percent fewer password-related tickets and fifty percent faster audit preparation, along with reducing risk and eliminating shared credentials.

The integration of One Identity Safeguard has had a clear positive impact on both security and operational efficiency. From a security perspective, the most noticeable improvement is tighter controls over privileged access across systems. For example, before One Identity Safeguard, some privileged accounts, especially service accounts used in automation, had unrestricted access. Just-in-time access and session recording have significantly improved visibility. Now, even when an automation job or admin session runs, we can trace exactly what was accessed and when.

My advice for others looking into using One Identity Safeguard is that it offers a positive ROI overall, but it is mostly reflected in time savings, operational efficiency, and risk reduction rather than a single direct cost metric. In practical terms, the biggest measurable benefit has been time saved for IT and security teams. Tasks such as privileged access approvals, password rotation, and session audits are now largely automated or centralized. Another key area is auditing and compliance efficiency. Before One Identity Safeguard, preparing for audits required collecting logs from multiple systems and manually correlating activity. Now, session records and searchable audit trails make this process faster, saving a significant amount of effort during compliance cycles. Overall, the ROI is very real, but it shows more in time saved, reduced risk, and smoother operation rather than a direct headcount or cost-cutting figure.

Before wrapping up, I would say that my overall experience with One Identity Safeguard has been strong and reliable for our needs, especially for privileged access control in a hybrid environment. What stands out most is the visibility and control it brings to privileged activity, having full session recording and centralized access workflows. It has also helped us move away from fragmented manual processes towards a more structured and governed access model, which becomes very important as the environment scales. Overall, it has been a solid investment from both a security and operational standpoint. I would rate my overall experience with One Identity Safeguard as a nine out of ten.


    Abhinandan Yadav

Privileged accounts have been secured and audits are now faster with automated controls

  • April 15, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case of One Identity Safeguard is to manage and secure privileged access in our IT environment. We use it for password vaulting, automatic credential rotation, and monitoring administrator sessions on servers, network devices, and critical systems.

What is most valuable?

The best features of One Identity Safeguard are password vaulting and automatic rotation, session monitoring and recording, real-time alerting and threat detection, just-in-time and least privilege access, and centralized management and reporting.

One Identity Safeguard's real-time alerting helps us quickly identify any unusual or unauthorized activity, such as failed login attempts or access outside of business hours. For example, if someone attempts to access a privileged account unexpectedly, we get an alert immediately and can take action.

One Identity Safeguard has had a very positive impact on our organization. It has significantly improved our security by protecting privileged accounts, which are a main target for attacks. With features such as password vaulting and session monitoring, we now have full control and visibility over admin activities. It also helps with compliance and auditing. All user actions are recorded and easily available for review. This makes audits much faster and more efficient.

What needs improvement?

The UI can be more user-friendly. The initial setup is slightly complex. Integration with some tools can be improved.

A few additional improvements could make One Identity Safeguard even better. Along with the UI, the reporting could be more customizable to filter for specific reporting needs. Sometimes it takes extra steps to get the exact report we want.

For how long have I used the solution?

I have been using One Identity Safeguard for the last two years.

What do I think about the stability of the solution?

One Identity Safeguard is now stable.

What do I think about the scalability of the solution?

The scalability of One Identity Safeguard is very good. The solution supports clustering and load distribution, so as demand increases, we can expand the environment without major changes.

How are customer service and support?

Customer support for One Identity Safeguard is generally good. In our experience, the support team is knowledgeable and able to resolve most issues.

Which solution did I use previously and why did I switch?

We were using a basic manual approach and some native tools for managing privileged access. However, they lacked centralized control, proper auditing, and security features. We switched to One Identity Safeguard to get a more secure and centralized solution with features such as password vaulting, session monitoring, and automated credential management.

How was the initial setup?

The initial setup was quick, but additional time was needed for configuration. There was minimal disruption because we implemented it in phases. Initially, a small group of users was onboarded for testing, and once everything was stable, we gradually rolled it out to other users.

The integration process for One Identity Safeguard was moderate. Basic integrations, such as Active Directory and standard systems, were relatively straightforward and well-documented. However, the more advanced integrations required some custom setup, additional configuration, and some troubleshooting. Overall, it is not very difficult, but it does require some technical knowledge and planning to implement smoothly.

What was our ROI?

We can see a good return on investment with One Identity Safeguard. It has saved a lot of time by automating tasks such as password management and access approvals, which were earlier done manually. It has reduced the workload on our IT team. We have also reduced security risk, which is very important. Additionally, audit preparation time has decreased from hours or days of manual log collection to just a few minutes using the built-in reports.

What's my experience with pricing, setup cost, and licensing?

Our experience with the pricing and licensing of One Identity Safeguard was moderate. The solution is not the cheapest, but it offers strong security features, so the cost is justified. Licensing is usually based on the number of users or accounts, which is straightforward to understand.

Which other solutions did I evaluate?

Before choosing One Identity Safeguard, we evaluated a few other PAM solutions, such as CyberArk Privileged Access Manager and BeyondTrust Privileged Access Management. We compared them based on features, ease of deployment, flexibility, and cost. We selected One Identity Safeguard because it provided a good balance of security features.

What other advice do I have?

My advice to others considering One Identity Safeguard would be to plan the deployment properly and start with a clear understanding of your privileged access requirements.


    Mahesh Malve

Centralized control has strengthened privileged security and simplified audit investigations

  • April 15, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for One Identity Safeguard has been managing and securing privileged access across critical systems. I primarily use it for password vaulting and automated credential rotation, which helps eliminate manual password handling and improve security. In addition, I work with access request workflows where users request privileged access and approvals are enforced before granting time-bound access. I have been involved in monitoring and reviewing privileged sessions for audit and compliance purposes. Overall, I use One Identity Safeguard to ensure secure, controlled, and traceable access to sensitive systems.

In addition to the core use cases, I also use One Identity Safeguard for day-to-day operational tasks such as onboarding new assets and accounts into the vault, maintaining access policies, and troubleshooting access-related issues. I regularly review audit logs and session recordings to ensure compliance and investigate any unusual activity. I have also worked on integrating One Identity Safeguard with directory services such as Active Directory to streamline user authentication and access control. Overall, my day-to-day usage is focused not just on securing privileged access but also on improving efficiency, enforcing security policies, and ensuring complete visibility and accountability across all privileged activities.

What is most valuable?

One Identity Safeguard offers several strong features, but the best ones are centered around securing and controlling privileged access. First, password vaulting and automated credential rotation is a key feature. It securely stores privileged credentials and automatically rotates them after use or on a schedule, reducing the risk of password misuse. Second, privileged session management is very powerful. It allows real-time monitoring, recording, and playback of sessions, which helps in auditing and investigating any suspicious activity. It also provides audit and compliance reporting. All activities are logged, indexed, and searchable, making it easier to meet compliance requirements. Finally, privileged analysis and threat detection uses behavior analysis to detect anomalies and identify potential security risks before they become incidents.

One Identity Safeguard has had a very positive impact on our organization, especially in strengthening our security posture and improving operational efficiency. One of the biggest improvements is around privileged access control. Earlier, managing shared admin credentials was a challenge, but with One Identity Safeguard, we now have centralized credential vaulting and automated password rotation, which has significantly reduced the risk of misuse or credential leakage. Another key benefit is session management and monitoring. We now have full visibility into all privileged sessions. Real-time monitoring allows us to identify and respond to suspicious activities instantly. Session recording and playback have helped us resolve incidents faster and maintain accountability across teams. From a compliance perspective, it has been a major advantage. We can easily generate audit trails, which saves a lot of time during audits. It helps us align with standards such as ISO, PCI DSS, and internal governance policies by ensuring complete traceability of privileged actions. Operationally, it has also improved efficiency. Admins no longer need to remember or share passwords. This reduces dependency on manual processes and minimizes human errors.

With One Identity Safeguard, we have seen clear, measurable improvements across security, operations, and compliance. Regarding audit and compliance efficiency, earlier, preparing for audits used to take two to three days, especially when gathering logs from multiple systems. With One Identity Safeguard's centralized reporting and session records, we have reduced that to just a few hours, achieving 60 to 70 percent time savings. Auditors now get direct session playback and detailed reports, which has significantly reduced back and forth queries. Regarding faster incident investigation, before implementation, investigating a privileged activity could take four to six hours. Now, with session playback, we can identify a root cause within 30 to 45 minutes, improving response time by nearly 70 to 80 percent. Regarding reduction in security risk, we have eliminated shared credentials, which reduced the risk of unauthorized access. Automated password rotation and vaulting have led to a noticeable drop in credential-related incidents, around 40 to 50 percent. Real-time monitoring has helped us proactively detect and stop suspicious sessions before escalations. Regarding operational productivity, the admin team saves time as they no longer manually manage or share passwords. Access provisioning is faster, improving efficiency by 30 to 40 percent in daily privileged operations.

What needs improvement?

While One Identity Safeguard is a strong and reliable PAM solution, there are a few areas where it can be further improved to enhance user experience and scalability. Regarding the user interface and experience, the UI, while functional, can be a bit complex for new users. A more intuitive and modern dashboard with simplified navigation would improve adoption, especially for non-technical stakeholders. Regarding integration flexibility, although it supports major integrations, expanding out-of-the-box connectors for more cloud-native apps, DevOps tools, and SaaS platforms would be beneficial. Faster and simpler API-based integrations could reduce deployment efforts. Regarding scalability and performance in large enterprise environments, performance tuning and scaling can require additional efforts. Enhancing seamless scalability and high availability configuration would improve enterprise readiness.

For how long have I used the solution?

I have been using One Identity Safeguard for more than two years.

What do I think about the stability of the solution?

One Identity Safeguard is generally a stable and reliable solution, especially when it is properly implemented and maintained. From our experience, the platform has been consistently stable in day-to-day operations with no major downtime.

What do I think about the scalability of the solution?

One Identity Safeguard is highly scalable and designed to support enterprise environments as they grow. From our experience, scalability is one of the strong points because it uses a cluster-based architecture. You can add multiple appliances to handle increasing workloads in components such as password management. The system can distribute tasks across nodes, improving performance as demand grows.

How are customer service and support?

Our experience with customer support for One Identity Safeguard has been generally positive with some areas for improvement. Overall, the support team is technically strong and knowledgeable, especially when dealing with complex issues or integrations. During implementation and critical incidents, we found them to be helpful and solution-oriented with ensured minimal disruption to operations.

Which solution did I use previously and why did I switch?

Before implementing One Identity Safeguard, we were using a more manual and partially tool-based approach for privileged access. We relied heavily on native controls with Active Directory along with some basic password vaulting tools. However, this setup had several limitations: no centralized visibility of privileged sessions, limited or no session recording and playback, manual password management which increases risk, and weak audit capabilities and time-consuming compliance reporting. We needed a comprehensive PAM solution with end-to-end control, and session monitoring and recording was a major requirement. Stronger audit and compliance capabilities were also required. Better support for hybrid environment (on-premises and cloud) was also required. After evaluating multiple options, One Identity Safeguard stood out because it offered a good balance of security, ease of use, and faster deployment compared to more complex solutions.

How was the initial setup?

The deployment of One Identity Safeguard in our organization took approximately four to six weeks end-to-end. The initial setup and basic configuration was completed within the first week. Integration with systems such as Active Directory and initial onboarding of privileged accounts took another one or two weeks. The remaining time was spent on policy configuration and session management setup, testing, and user onboarding.

The deployment of One Identity Safeguard was largely smooth with minimal disruption to privileged users. Initially, there was a small adjustment phase as users had to shift from direct access and shared credentials to a controlled access mode through One Identity Safeguard. This included learning how to request access, use session launchers, and follow approval workflows. However, we managed this transition effectively by conducting user training and awareness sessions, rolling out in a phased manner rather than a big-bang approach, and providing quick support during the initial days. Within a short time, users actually saw the benefits, such as no need to remember or manage passwords, faster and more secure access through centralized control, and clear accountability which improved overall discipline.

What was our ROI?

We have definitely seen a clear ROI after implementing One Identity Safeguard, both in terms of cost saving and operational efficiency. On the time-saving front, audit preparation time reduced by 60 to 70 percent, from two to three days to a few hours. Incident investigation time reduced by 70 to 80 percent using session playback. Regarding operational efficiency, there was around a 30 to 40 percent reduction in manual efforts for password management and access provisioning. There is no need for multiple teams to coordinate for privileged access. Everything is centralized. Regarding resources optimization, we did not necessarily reduce headcount, but we optimized team productivity. Tasks that earlier required multiple people can be handled by fewer resources more effectively.

What's my experience with pricing, setup cost, and licensing?

My experience with the pricing and licensing of One Identity Safeguard was reasonable considering the value it delivers. Regarding pricing, it may appear slightly on the higher side initially compared to some alternatives, but when we evaluate it against the security benefits, compliance support, and risk reduction, it proves to be cost-effective in the long run. Regarding the licensing model, it is typically based on the number of users, privileged accounts, or appliances, which is quite flexible. It allowed us to scale as per our requirement rather than making a heavy upfront commitment. Regarding setup cost, since we opted for virtual appliances, the setup cost was relatively lower. No major hardware investment was required. Most of the effort was around implementation and integration, which was manageable.

Which other solutions did I evaluate?

Before finalizing One Identity Safeguard, we evaluated a few leading PAM solutions in the market. Some of the key options we considered were CyberArk, BeyondTrust, and Delinea (formerly ThycoticCentrify). Our evaluation criteria included ease of deployment and implementation, user interface and usability, session management and monitoring capabilities, integration with our existing environment (AD, cloud, or SIEM), and cost and licensing flexibility.

What other advice do I have?

Integrating One Identity Safeguard with systems such as Active Directory, Microsoft Azure, and SIEM tools was fairly straightforward with some learning curve in the initial phase. Active Directory integration is the easiest. It was the most seamless part. One Identity Safeguard has native support for AD, so user import, authentication, and role mapping were quick to configure. We were able to set it up with minimal effort, and it works reliably from day one. Azure integration required moderate effort. Integration with Azure was smooth but required proper configuration of roles, permissions, and connectors. Once configured, it works well for managing privileged access to cloud workloads. From a SIEM perspective, sending logs to SIEM tools such as Splunk and other tools required more fine-tuning. We had to configure log forwarding, normalize data formats, and set up correlation rules on the SIEM side. The initial setup took some time, but once done, it provided strong visibility and alerting capabilities.

Integrating One Identity Safeguard with systems such as Active Directory, Microsoft Azure, and SIEM tools has had a significant positive impact on our operations. It has enabled centralized access control where all privileged users are managed through a single platform, reducing manual efforts and improving governance with Active Directory integration. User provisioning and role-based access became seamless. From a security standpoint, SIEM integration has given us real-time visibility and faster incident response, while session monitoring ensures full accountability of user actions. For cloud workloads such as Azure, it helps us maintain consistent security policies across a hybrid infrastructure, which was a big challenge earlier. Overall, it has improved operational efficiency, reduced security risks, and strengthened compliance, while also saving time in audits and incident investigations.

We have integrated One Identity Safeguard with multiple parts of our environment to ensure centralized and secure privileged access management. Regarding identity and directory services, we integrated with Active Directory for authentication and role-based access. This helps us enforce least privilege access and centralize user governance. Regarding cloud platforms, we connected with Microsoft Azure for managing privileged access to cloud-hosted VMs and workloads, ensuring consistent security policies across a hybrid environment. Regarding SIEM and security monitoring, we integrated with SIEM tools such as Splunk or similar tools to forward logs and session events. This allows real-time alerting, correlation, and advanced threat detection. Regarding DevOps and automation, we use it in controlled scenarios with scripts and automation tools to manage secure credential injection. While not deeply embedded into CI or CD pipelines yet, it supports secure secrets usage for automation tasks.

In our organization, One Identity Safeguard is deployed in a hybrid model. The core One Identity Safeguard application is hosted in our on-premises data center, which allows us to maintain strict control over privileged credentials and sensitive systems, especially for critical infrastructure. At the same time, we have extended its capability to the cloud environment, such as AWS and Azure workloads, through secure connectors and integration. The hybrid approach gives us the best of both worlds: security and control, and scalability and flexibility. It also helps in managing privileged access across both legacy systems and modern cloud workloads, ensuring consistent policies and centralized governance across environments.

For our cloud workloads, we primarily use Microsoft Azure. Since a large part of our infrastructure is integrated with Microsoft services such as Active Directory and Office 365, Azure fits naturally into our ecosystem. It allows seamless integration with One Identity Safeguard, especially for managing privileged access across cloud-hosted virtual machines and servers. Additionally, Azure's native security controls complement our PAM strategy. It helps us maintain a centralized identity and access governance. Integration with a hybrid environment (on-premises plus cloud) is a smooth and efficient way.

In our setup, we use virtual appliances for One Identity Safeguard. We chose virtual appliances mainly because of the flexibility and scalability they offer compared to physical hardware. Key reasons for this choice include the ease of deployment. Virtual appliances can be deployed quickly within our existing virtual infrastructure without waiting for hardware procurement. Regarding scalability and performance, it is much easier to scale resources (CPU, memory, storage) based on demand, especially as privileged access usage grows. Regarding cost, it avoids the upfront cost and maintenance overhead of physical appliances.

My advice for organizations looking to implement One Identity Safeguard would be to focus on planning, a phased implementation, and user adoption. Start with a clear strategy before implementing. Clearly identify critical systems and privileged accounts, compliance requirements, and access policies. This ensures the solution is aligned with business and security goals. Follow a phased approach. Do not try to onboard everything at once. Start with high-risk systems and then gradually expand. This reduces complexity and helps teams adapt smoothly.

Overall, my experience with One Identity Safeguard has been very positive. It is a well-rounded PAM solution that effectively covers all the core areas such as password vaulting, session monitoring, auditing, and compliance. What stands out is that it brings multiple capabilities into a single platform, from credential management to session analytics, rather than relying on multiple tools. This has not only improved security but also simplified operations. I would rate this product a 9.5 out of 10.


    Aryan Dwivedi

Privileged access control has strengthened security and audit reporting improves compliance

  • April 14, 2026
  • Review provided by PeerSpot

What is our primary use case?

Our main use case for One Identity Safeguard is for business development activities by understanding and communicating platform security features to clients.

We generally use One Identity Safeguard for managing privileged accounts and session monitoring because we have mass emailing, which requires privilege IDs and sensitive data management. The HR department focuses on this, along with the main manager, to utilize platform controls and limit data access for security and compliance. Session monitoring ensures that all our work in the mail marketing system is detected, and if any suspicious activity is identified, it is reported to management.

One Identity Safeguard is also used for audit logs and reporting features, helping to reduce the time and efforts needed for audits.

What is most valuable?

The best features One Identity Safeguard offers include session monitoring, secure remote access, a security-focused approach, and privileged access control, which stand out to me the most.

Session monitoring and strong security features allow real-time control where the manager can watch live sessions and review recordings, providing a strong layer of security. The interface is friendly, and there is strong protection that builds trust, knowing that the manager has confidence in the system.

One Identity Safeguard provides very clear and detailed records of privileged access and user activities, making compliance with requirements easier, and the reports are customizable as I usually work upon them.

One Identity Safeguard has saved us security time, improved security, better compliance, increased trust in employees, and reduced risk since the tools provided by the company are now in safer hands. Security incidents have decreased significantly according to my seniors, and faster detection of unauthorized privileged access has become easier due to quick responses when someone uses an account without proper authority.

What needs improvement?

There is a need for user training, as we had about a week of training for all employees on how to use One Identity Safeguard. The integration part seems a bit challenging because some tools cannot be integrated properly with it.

There should be support for non-technical users as well.

One Identity Safeguard has strong security which is great, but there is a bit of complexity for interns and others, and documentation and training are crucial. I believe there should be training, especially for non-technical users and interns. A week of training is beneficial, but even a day would be sufficient since I learned a lot about using the product in just one day. However, special guidance is necessary to avoid future difficulties.

For how long have I used the solution?

I have been using it for around eleven months.

What other advice do I have?

One Identity Safeguard is a good product, but if your organization plans to adopt it, they should conduct training for a day for the management before proceeding. I rate this product an eight out of ten.


    Dhanaji Mali

Privileged access has been secured and sessions are monitored to strengthen accountability

  • April 07, 2026
  • Review provided by PeerSpot

What is our primary use case?

One Identity Safeguard is used for managing privileged passwords and monitoring sessions, which helps track admin activities and enforce secure access policies for the accounts. This is important for protecting critical resources like systems or applications, thereby improving both security and accountability.

Whenever an admin needs server access, they must request it through One Identity Safeguard. Once approval is granted based on the request, they can access the server, and the session is recorded, keeping everything monitored and controlled.

Whenever an admin accesses a server through One Identity Safeguard, they do not need to know the actual password. The system provides temporary access through the vault, ensuring secure and controlled usage of the applications.

What is most valuable?

The session monitoring and recordings are the best features of One Identity Safeguard, allowing us to review what actions were performed during a session. This helps us in both troubleshooting and audits.

One Identity Safeguard makes compliance easier and really helps in incident investigation as well as visibility.

One Identity Safeguard has impacted our organization positively because it has helped us standardize how privileged access is managed and has also reduced dependency on manual efforts in password handling, improving operational control overall. It has reduced errors, and the manual efforts have been significantly reduced.

What needs improvement?

One Identity Safeguard does not require any improvements at this time based on our current usage.

The initial setup of One Identity Safeguard is somewhat tricky and requires proper planning, so this aspect could be simplified.

For how long have I used the solution?

One Identity Safeguard has been in use for more than three years.

What do I think about the stability of the solution?

One Identity Safeguard is stable.

What do I think about the scalability of the solution?

From a scalability perspective, One Identity Safeguard is excellent and matches our organization's growth. We have seen a good response from the customer team, who are ready to provide support at any time we require it.

How are customer service and support?

We have found and seen a good response from the end-user and usability of One Identity Safeguard, as it is seamless and works well in our organization.

Which solution did I use previously and why did I switch?

One Identity Safeguard has been used since day one.

How was the initial setup?

The deployment of One Identity Safeguard took less than one month. It was straightforward, initially taking one or two days, and from this we have seen a smooth transition to One Identity Safeguard with no issues during the deployment.

What about the implementation team?

One-week training was provided for the users and the IT team to ensure they could manage One Identity Safeguard. The end-user access management is smooth as per usability, making for a great experience.

What was our ROI?

One Identity Safeguard has provided a good return on investment, which comes from the reduced risk of security incidents. Avoiding even one breach can have a significant cost. It has also reduced the time spent on password management, saving our team time in managing privileged accounts, and is helping with automation that reduces manual efforts.

What other advice do I have?

One Identity Safeguard is highly recommended because it is a wonderful solution, providing great usability, great security, and great visibility. One thing I would advise is to ensure your team is properly trained before deployment and plan the architecture and policies carefully, as this will help you get the best result. This review has been given a rating of nine out of ten.


    Ankush Kondewar

Secure access has protected critical systems and now tracks all privileged activities

  • April 02, 2026
  • Review provided by PeerSpot

What is our primary use case?

One Identity Safeguard has been used by our organization for more than three years. The primary use case for One Identity Safeguard is to secure admin access to the servers and the network devices, which helps us to ensure only authorized users can access our critical systems and devices, and it also monitors all the privileged sessions.

What is most valuable?

One Identity Safeguard offers secure password vaulting, which ensures passwords are not shared or exposed, significantly improving security, and session monitoring and recording, allowing us to track all the admin activities easily.

These features help our team day-to-day by eliminating password sharing among the admins and ensuring secure access to critical systems, which reduces security risks, while tracking and controlling privileged access prevents misuse of admin accounts and improves overall system security.

One Identity Safeguard has positively impacted our organization by increasing visibility into privileged user activities, allowing us to track and audit all actions easily, which helps in compliance and security.

What needs improvement?

One Identity Safeguard provides great features with a smooth process and a very good amount of stability, so there is no need to improve as of now, but it might be required in the future.

For how long have I used the solution?

I have been working in my current field for more than eight years.

What do I think about the stability of the solution?

One Identity Safeguard is stable.

What do I think about the scalability of the solution?

One Identity Safeguard's scalability matches our organization's growth over time with no issues.

How are customer service and support?

Customer support has a very helpful nature and is very responsive to our technical team when they require technical support, providing 24/7 assistance based on the given timeline.

Which solution did I use previously and why did I switch?

We have not evaluated any other options, as we had confirmed from day one that we were going to procure One Identity Safeguard.

How was the initial setup?

The deployment of the solution has taken less than one month, and it was a great experience. Regarding deployment, we have not faced any disruptive issues; it was very smooth for our privileged users, and after a short initial adjustment, they were able to access the system through One Identity Safeguard without issues, thanks to training and clear communication that minimized disruptions.

What about the implementation team?

The training requirement was very minimal, taking less than one week for training the employees, and once they had a good amount of knowledge about One Identity Safeguard, they were ready to go.

What was our ROI?

We have seen a good amount of return on investment, saving our employees time and money while providing security; it has helped us reduce manual efforts by around 30 to 40 percent.

What's my experience with pricing, setup cost, and licensing?

The experience with the pricing, setup cost, and licensing was straightforward, and the sales team was very helpful during the procurement and implementation of the solution, making it a great experience.

Which other solutions did I evaluate?

One Identity Safeguard has been the only solution used since day one.

What other advice do I have?

For any organization, whether mid-size or large, looking into using One Identity Safeguard, it will be a really good solution for managing accessibility to critical devices with great security features and automation. Planning deployment carefully and understanding access requirements is essential, so start with the most critical systems first and then go for the less critical ones. This review has been rated 9 out of 10.