Reviews from AWS customer

8 AWS reviews

External reviews

46 reviews
from

External reviews are not included in the AWS star rating for the product.


4-star reviews ( Show all reviews )

    SohanMulik

Centralized logins have simplified unix access and improved security and compliance

  • May 22, 2026
  • Review provided by PeerSpot

What is our primary use case?

In day-to-day work, I use One Identity Safeguard to manage centralized login for Linux and UNIX servers, troubleshoot login access issues, enforce security policies, manage AD-based permissions, monitor authentication logs, and ensure secure and compliant access across the systems.

Additionally, I use One Identity Safeguard for operational tasks like on-boarding and off-boarding users, reducing dependency on local accounts, improving audit and visibility, and simplifying administration through centralized access control and policy management.

What is most valuable?

The best features of One Identity Safeguard are centralized authentication, seamless Active Directory integration, single sign-on on Linux and UNIX systems, role-based access control, policy enforcement, and auditing capability, which improve security and simplify administration and enhance compliance across the enterprise environment.

The most valuable feature is seamless integration with Active Directory, allowing Linux and UNIX systems to use centralized AD authentication, enabling single sign-on, centralized user management, consistent security policy, and easier access control without maintaining separate local accounts.

Additionally, the auditing, policy enforcement, and centralized access management features of One Identity Safeguard are very valuable as they improve security, visibility, simplify compliance management, and reduce administrative effort across Linux and UNIX environments.

One Identity Safeguard has positively impacted my organization by reducing manual user management efforts, improving security through centralized authentication, eliminating most local account-related issues, simplifying access management, and improving audit and compliance visibility across Linux and UNIX systems.

What needs improvement?

One Identity Safeguard can be improved with a more modern and intuitive interface, better troubleshooting and diagnostic tools, enhanced real-time monitoring and reporting, and stronger integration with cloud and hybrid identity platforms to simplify administration and improve operational visibility.

Additionally, One Identity Safeguard could improve policy synchronization speed, provide clearer error messages during authentication failures, simplify complex configurations, and enhance automation and self-service capabilities to reduce administrative overhead in large enterprise environments.

For how long have I used the solution?

I have been using One Identity Safeguard for the last two years.

What do I think about the stability of the solution?

One Identity Safeguard is generally stable and reliable in an enterprise environment with consistent authentication performance and minimal downtime when properly configured and maintained.

What do I think about the scalability of the solution?

One Identity Safeguard scales well in enterprise environments, as it can efficiently handle a large number of Linux and UNIX systems and users through centralized authentication and policy management without significant performance impact.

How are customer service and support?

Customer support for One Identity has been generally good, with knowledgeable technical teams and effective guidance for most deployment and troubleshooting issues; although response times for complex cases can sometimes be slow.

Customer support for One Identity Safeguard is around a seven out of ten for strong technical expertise and helpful guidance, with some room for improvement in response and escalation times.

Which solution did I use previously and why did I switch?

Previously, I used local authentication and manual account management for Linux and UNIX systems, but I switched to One Identity Safeguard to achieve centralized authentication, better security, simplified administration, and improved compliance.

How was the initial setup?

The deployment of One Identity Safeguard took approximately two to four weeks, including planning, Active Directory integration testing, policy configuration, and phased rollout across Linux and UNIX systems.

What about the implementation team?

One Identity Safeguard required moderate training, especially for administrators managing Active Directory integration, authentication policies, and troubleshooting; typically, a few days of hands-on training and documentation review is enough for experienced system administrators to manage daily operations effectively.

What was our ROI?

I achieved a good ROI with One Identity Safeguard through approximately thirty to forty percent reduction in manual user management effort, fewer password and local account issues, faster access management, and improved audit and compliance efficiency, which saved administrative time and improved security operations.

What's my experience with pricing, setup cost, and licensing?

Pricing and licensing for One Identity Safeguard are generally enterprise-based and depend on the number of users and systems; while setup costs are moderate due to deployment, integration, and training requirements, overall the solution provides good value through centralized authentication, improved security, and reduced administrative overhead.

Which other solutions did I evaluate?

I evaluated solutions including CyberArk Privilege Access Management, BeyondTrust Remote Access, and Microsoft Entra ID before selecting One Identity Safeguard due to strong Active Directory integration and simplified Linux and UNIX authentication management.

What other advice do I have?

The feedback for One Identity Safeguard has generally been positive, especially regarding simplified login, single sign-on experience, and reduced password-related issues; while administrators appreciate the centralized authentication and improved security, some users mentioned that troubleshooting and advanced configuration could be more user-friendly.

One Identity Safeguard is integrated with tools and platforms including DevOps environments, Linux, UNIX applications, SSH-based systems, and Active Directory services, helping provide centralized authentication, role-based access control, and security management across infrastructure.

The integration of One Identity Safeguard with Active Directory was moderately easy; the core AD integration is straightforward, but advanced configuration, policy mapping, and troubleshooting in a complex hybrid environment require careful planning and some expertise.

I recommend One Identity Safeguard for organizations seeking centralized authentication, strong Active Directory integration, improved security, and simplified Linux and UNIX access management in enterprise environments. I would rate this product an eight out of ten overall.


    Mahesh dattatray malve

Centralized controls have strengthened privileged access and improved audit-ready accountability

  • May 19, 2026
  • Review provided by PeerSpot

What is our primary use case?

I primarily use One Identity Safeguard for Privileged Access Management, mainly to control, monitor, and secure administrative access to critical systems. I also used it for session monitoring and audit visibility for sensitive administrative activities. Having centralized logging and session tracking was important from both a security and compliance perspective. The practical use case involved temporary privilege access. Instead of giving permanent elevated permissions, teams could get controlled access for specific tasks or durations, which supported least privilege practices better.

One practical example was during a production support activity where a vendor team needed temporary administrative access to troubleshoot an application issue on a critical server. Instead of sharing privileged credentials directly, access was provided through One Identity Safeguard with time-based control. The session was monitored, and the access automatically expired after the approved maintenance window.

One additional area where One Identity Safeguard was useful was improving accountability around privileged operations. In many environments, multiple teams need elevated access for infrastructure, database, or application support, and without proper PAM controls, it becomes difficult to track who actually performed what action.

What is most valuable?

The strongest features of One Identity Safeguard are definitely privileged session monitoring, password vaulting, and controlled temporary access workflows. Those are the areas that stood out most in my day-to-day operations.

A feature area that I think is sometimes underrated is the centralized visibility One Identity Safeguard provides across privileged activities in a large environment.

One Identity Safeguard had a positive impact mainly in improving privilege access control, operational accountability, and audit readiness. Before implementing PAM properly, privileged access management was more dependent on manual controls and shared administrative practices, which increases both security and operational risk. One major improvement was better control over privileged credentials.

There were definitely some measurable operational improvements after implementing One Identity Safeguard. One noticeable improvement was audit readiness and reduction in access-related observations. Earlier, collecting evidence for privileged access reviews or administrative activity tracking required more manual efforts. With centralized session logging and monitoring, audit preparation becomes much faster and structured.

They mainly helped by improving accountability and reducing unnecessary permanent privilege access. For example, during production troubleshooting, external vendor or internal support teams sometimes needed elevated access urgently. Earlier, in many environments, teams would share privileged credentials directly to save time, but that created security and audit risk because multiple people could use the same account without proper visibility. With One Identity Safeguard, access could be approved for a limited duration and the session was monitored and logged.

What needs improvement?

One Identity Safeguard is a strong PAM solution, but there are definitely areas where it could be improved. I feel reporting and dashboard visibility could become more business-friendly. The technical teams can work with detailed logs and session data, but leadership teams often want quicker risk-focused insights instead of deep technical information.

For integration, One Identity Safeguard works well in core PAM scenarios, but in more complex environments, especially where there are multiple tools for IAM, SIEM, and DevOps, integration can sometimes require extra effort and planning. On user experience, one challenge is that different user groups experience the system differently. For security teams, the depth of control is good, but for operational teams like system admins or support engineers, the workflow sometimes feels a bit layered, especially under time pressure.

The reason it is not a perfect ten is mainly because of usability and operational friction in some scenarios. In real production environments, especially during urgent troubleshooting, the workflow can feel a bit heavy, and integrations with newer cloud-native ecosystems can require extra effort.

For how long have I used the solution?

I have been working in my current field for more than ten years.

I have been using One Identity Safeguard for two years.

What do I think about the stability of the solution?

One Identity Safeguard is generally considered stable. In our experience, we did not face major downtime issues in production. The platform handled privileged sessions and access workflows consistently, and most of the time it runs smoothly.

What do I think about the scalability of the solution?

The scalability was one of the areas where One Identity Safeguard worked well for us. As the environment grew with more servers, more admin users, and more privileged access requests, the tool was able to handle the increased load without major performance issues.

How are customer service and support?

I had direct interaction with their support mainly during configuration and integration phases, especially around Active Directory connectivity, flow setup, and some session-related troubleshooting. Overall, my experience has been positive, and they are technically strong.

Which solution did I use previously and why did I switch?

Before One Identity Safeguard, privileged access was mostly handled through a more traditional approach: direct administrative access on systems along with shared credentials in some cases and basic directory-level controls using Active Directory. In some areas, there were also a few manual scripts and ticket-based approvals, but there was not a centralized PAM platform in place to fully control, monitor, and record privileged sessions.

How was the initial setup?

The deployment of One Identity Safeguard was not a one-day or one-week activity. It was more of a phased rollout that took a few weeks to a couple of months overall.

The transition for privileged users was a bit of a mixed experience at the beginning, but it became smoother after the initial adjustment phase. At first, there was some resistance because users were used to direct administrative access. With One Identity Safeguard, they had to go through controlled workflows for requesting access and launching privileged sessions, which added a few extra steps compared to the earlier way of working. Initially, some users felt it slowed things down, especially during urgent production issues.

What about the implementation team?

Training was needed for both administrators and end users, but the level of effort was different for each group. For the admin or security team managing One Identity Safeguard, there was definitely a learning curve. They needed proper training on configuration, policy setup, session management, and integrations with Active Directory and troubleshooting. For end users, the training was much simpler. Most of it was just about how to request privileged access, how to launch sessions through the portal, and what the approval flow looks like.

What was our ROI?

In terms of savings, one of the biggest improvements was in privilege access handling. Earlier, a lot of time was spent managing password sharing, manual approvals, and coordinating between teams for admin access. After implementing One Identity Safeguard, those processes became more structured and controlled through workflows, which reduced back-and-forth communication and improved response time during support or maintenance activities. I also saw savings in audit and compliance effort. Previously, collecting evidence for privileged activity reviews required manual tracking and coordination across systems. With centralized session monitoring and logs, audit preparation becomes significantly faster and less effort-intensive.

What's my experience with pricing, setup cost, and licensing?

It was actually on the higher side compared to basic security tools, but it was expected because it is an enterprise-grade PAM solution. The setup cost was not just about licensing. A big part of the effort went into implementation, configuration, and designing proper workflows.

Which other solutions did I evaluate?

During the evaluation phase, I looked at a few other PAM options to compare capabilities, especially around session monitoring, ease of administration, and integration with my existing AD environment. Some of the commonly discussed alternatives were tools such as CyberArk, which is a very strong tool, and also a few Microsoft native approaches combined with Azure-based identity controls for privileged access management.

What other advice do I have?

I would say the biggest advice is to not treat One Identity Safeguard just as a tool installation. Treat it like an access governance project and involve both security and operations teams early. In many organizations, PAM fails not because of technology but because operational teams feel it slows them down. If their input is taken early, the workflows can be designed in a more practical way.

I think the success of PAM is not only about the tool; it depends heavily on how well the organization is disciplined with its access governance. If teams try to bypass processes or create too many exceptions, even the best PAM tool loses effectiveness. I would rate this product nine out of ten.


    Aman Khandelwal

Secure credential management has reduced password theft and supports efficient remote work

  • May 17, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for One Identity Safeguard is to store our IDs and passwords so that they can be used later for logging in. It also helps us when our employees are working from home by managing IDs, passwords, and other login credentials safely, without any worry of password theft or identity theft.

A specific example of how I use One Identity Safeguard with employees working from home is when they are using their personal Wi-Fi connection, where the chance of personal theft increases. One Identity Safeguard helps us manage the chances of theft, reducing the instances of password theft and identity theft, which has been very useful for us and has also reduced the cases we experience.

What is most valuable?

The best features are that the user interface is very good and the functionality is smooth, with a good user experience overall. Apart from this, the third-party integration that One Identity Safeguard provides is another major feature that I appreciate. It integrates well with other third-party websites and solutions, allowing the end user to log in or save their password on those websites using One Identity Safeguard.

A specific third-party integration that I found especially useful was when we integrated Salesforce Cloud, which was a smooth experience overall without any bottlenecks during the integration process, resulting in a good workflow.

One Identity Safeguard has positively impacted my organization by reducing the cases of password theft and increasing efficiency. Our employees no longer have to worry about password theft, allowing them to be more efficient in their work. It has helped us reduce the effort that our employees used to expend by entering passwords and user IDs manually before using One Identity Safeguard.

The incidents of password theft have reduced by around forty percent, which has been a very good result from using One Identity Safeguard for our organization and is a great benefit for us.

We have saved a lot of time because users no longer have to save passwords manually, as everything has been automated. This saving of time leads to increased overall efficiency of our organization.

What needs improvement?

One feature that I feel One Identity Safeguard lacks is a robust reporting interface, as the data we get from it is not very well displayed. A reporting dashboard is missing and needs to be incorporated in the coming updates. This is one of the essential features that is missing from the solution.

One Identity Safeguard needs improvement in customer support, and there are also glitches while logging in that end users face. These minor glitches cause problems for us, which need to be addressed.

In the case of the glitches, sometimes we have to try two or three times for one task. While these glitches are minor and happen occasionally, they need to be taken care of.

For how long have I used the solution?

I have been using One Identity Safeguard for the last one and a half years.

What do I think about the stability of the solution?

One Identity Safeguard is stable and quite performance-centric.

What do I think about the scalability of the solution?

One Identity Safeguard's scalability is quite good.

How are customer service and support?

The customer support for One Identity Safeguard needs improvement. I would rate the customer support as a seven out of ten.

Which solution did I use previously and why did I switch?

We were not using any other solution prior to One Identity Safeguard. This is the first solution that we have purchased, as One Identity Safeguard was the market leader and that is why we selected it.

How was the initial setup?

The deployment of One Identity Safeguard took around four to five months.

The deployment affected my privileged users by being somewhat disruptive, as they had to make changes to their day-to-day workflow. Overall, it was a very good experience with support from the One Identity Safeguard team during the deployment stage.

There was no need for any training for either end-users or for the people who manage One Identity Safeguard.

What about the implementation team?

We have not integrated One Identity Safeguard with other parts of our business.

What was our ROI?

If you are looking to increase the organization's efficiency, One Identity Safeguard is the solution that needs to be purchased, as it is an overall cost-efficient solution for business needs.

What's my experience with pricing, setup cost, and licensing?

I find that the pricing is very affordable and the setup cost is also very affordable, aligning with our budget. Licensing is per-user based.

Which other solutions did I evaluate?

While selecting One Identity Safeguard, we evaluated other options, but they were not aligning with our business needs, so we chose One Identity Safeguard instead.

What other advice do I have?

After thoughtfully considering the pros and cons of One Identity Safeguard, I give this product a rating of nine because it is overall very good software. However, factoring in the subpar customer support and the technical glitches, I believe nine is a perfect rating.


    Nishant Patil

Strong access controls have secured privileged accounts and now improve accountability

  • May 13, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for One Identity Safeguard is securing administrator access to critical infrastructure, like firewall servers, switches, databases, as well as the VMware environments. Earlier, multiple engineers used shared admin passwords for devices and servers, which made it difficult to track who performed what activity. This also increased the risk of password misuse and unauthorized access. We have used One Identity Safeguard to secure all of these resources.

A specific example of how I use One Identity Safeguard to secure access or track activities is when an engineer wanted to log in to a firewall for some configuration changes. One Identity Safeguard provides secure access without exposing the actual password. Once the task was completed, the password could be automatically changed, ensuring better security. This use case helps the organization improve privileged access security, maintain accountability, and reduce insider threats for auditing and compliance purposes.

One Identity Safeguard is deployed in my organization on physical appliances, which are dedicated hardware appliances provided by One Identity.

What is most valuable?

The best features One Identity Safeguard offers include a secure password vault for privileged accounts, Privileged Access Management (PAM), session monitoring, and session recording. Additionally, MFA support is available. There are different benefits and features, including real-time monitoring of administrator activity, audit logs, and compliance reporting.

Session monitoring is a feature where all privileged user activities are monitored in real-time whenever an administrator accesses critical systems such as servers, firewalls, switches, or databases. For example, if a network engineer logs into a secure firewall using One Identity Safeguard, the complete session can be monitored and recorded, including the commands executed, the configuration changes made, the previous configuration, the login duration, and the logout activity.

One Identity Safeguard has positively impacted my organization by tracking admin activities in real time. It records privileged sessions, improves the accountability of engineers and administrators, and detects suspicious or unauthorized actions.

What needs improvement?

I have nothing to improve. The solution is well-designed. I do not have anything at all that I wish could be easier or better, even if it is something small, whether in the user interface, reporting, or integration.

For how long have I used the solution?

I have been using One Identity Safeguard for one year.

What do I think about the stability of the solution?

One Identity Safeguard is stable.

What do I think about the scalability of the solution?

In terms of scalability, One Identity Safeguard can easily grow along with the organization's infrastructure and security requirements. It supports growing infrastructure and handles a large number of privileged accounts because it can support an increasing number of users, privileged accounts, devices, and locations as the organization expands.

How are customer service and support?

The customer support for One Identity Safeguard is good.

Which solution did I use previously and why did I switch?

I have not previously used a different solution. This is the first solution we deployed.

How was the initial setup?

The deployment of the solution took up to one month in my environment.

The deployment was a smooth process for my privileged users. All integrations were executed very well.

What about the implementation team?

Training of approximately ten to twelve days is sufficient for all users, both those new to One Identity Safeguard and those with existing knowledge. Very good training can be delivered within twelve days.

What was our ROI?

The return on investment comes from improving security while reducing operational risk and manual administration. Earlier, the organization managed privileged passwords manually, which increased the chance of password misuse and insider threats. After implementing One Identity Safeguard, privileged access becomes centralized, monitored, and automated. The ROI of One Identity Safeguard is mainly achieved through stronger security, reduced operational effort, automation of privileged access management, and lower risk of security incidents.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing is that the price is a bit too high. The price could be lower for licenses based on the number of privileged accounts and number of managed access systems. There is a common license factor involved.

Which other solutions did I evaluate?

I have not evaluated other options before choosing One Identity Safeguard.

What other advice do I have?

My advice for others looking into using One Identity Safeguard is that it is very useful in the organization for preventing password issues. I would rate this review as nine out of ten.


    Varun Mehra

Privileged sessions have been secured and daily audits gain fast, detailed visibility

  • May 01, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for One Identity Safeguard is managing and securing privileged access across the organization. On a day-to-day basis, I use it for password vaulting, session management, and controlling access to critical systems. It helps ensure that credentials are not shared directly and are accessed securely through the platform. For example, when an admin needs access to a server, they request it through One Identity Safeguard, and access is granted with proper approvals, while the session can be monitored or recorded for security and compliance.

Session monitoring and recording have really improved both security and accountability for our team. For example, when an admin accesses a critical server, the entire session is recorded. If there is ever an issue, such as a misconfiguration or an unexpected change, we can go back and review exactly what actions were taken and by whom. It also acts as a deterrent because users know their sessions are being monitored, so they follow best practices more carefully. Overall, it makes audits much easier and helps us quickly investigate and resolve any incidents.

Apart from access control and session monitoring, I also use One Identity Safeguard for automated password rotation, which reduces the risk of credential misuse. Day-to-day, I handle access requests, review audit logs, and ensure compliance policies are being followed. It also helps in managing third-party or vendor access securely, giving them controlled and time-bound access without exposing actual credentials.

What is most valuable?

In my opinion, one of the best features of One Identity Safeguard is privileged password management. It securely stores credentials and automatically rotates passwords, which reduces the risk of misuse and removes the need for manual handling. Another standout feature is session monitoring and recording. It allows full visibility into what users are doing during privileged sessions, with the ability to record, replay, and audit activities, which is very helpful for security and compliance. I also find the real-time monitoring and alerting very valuable. The system can detect suspicious behavior and even block or terminate sessions if something looks risky, which adds a strong, proactive security layer. Lastly, the automated workflow and approval systems stand out. Access requests go through proper approvals with defined policies, which ensures controlled and traceable access to critical systems. Overall, the combination of password vaulting, session control, and automation makes it a very strong PAM solution for securing privileged access.

The alerting feature has been very useful for us. For example, we once had a situation where a privileged account tried to access a system outside of normal working hours. One Identity Safeguard triggered an alert immediately and we were able to review the session in real time and stop it before any changes were made. It helped us catch a potential security risk early. Also, the session recording made it easy to verify what was attempted, which helped during an internal review. One additional benefit is the ease of auditing. All activities are logged and easy to track, which saves a lot of time during compliance checks. The centralized dashboard also gives a clear view of who has access to what, which is very helpful for day-to-day management.

What needs improvement?

One area where One Identity Safeguard can be improved is the user interface. It can feel a bit complex and not very intuitive, especially for new users, and it takes some time to get comfortable with the navigation. Another challenge is the initial setup and configuration. It requires careful planning and can be a bit complex, especially when integrating with different systems and defining policies. Also, reporting could be more flexible and customizable. While the existing reports are useful, having more advanced filtering and dashboard options would make it easier to get deeper insights. Overall, it is a strong solution, but improving usability and simplifying configuration would make it even better.

Support can be improved in terms of response times and consistency. Sometimes resolving complex issues takes longer than expected and requires multiple follow-ups. In terms of integration, while it works well with common systems, integrating with some third-party tools can require extra effort for customization. Scalability is generally good, but as the environment grows, managing policies and access rules can become a bit complex. Better visibility and simpler management for large-scale deployments would be definitely helpful.

For how long have I used the solution?

I have been using One Identity Safeguard for around one to two years now in managing privileged access and securing sensitive accounts.

What do I think about the stability of the solution?

One Identity Safeguard is generally considered a stable and reliable solution. From my experience, it performs consistently for day-to-day operations such as password management, session monitoring, and access control. Once it is properly configured, it runs smoothly without major issues. Industry feedback also supports this. Users often describe it as a robust and stable platform, with ratings around 4.2 to 4.3 out of 5, which reflects good reliability overall. That said, like any enterprise solution, there can be occasional challenges, especially around complex configurations or integrations, but overall, stability is one of its strong points and it works reliably in production environments.

What do I think about the scalability of the solution?

One Identity Safeguard scales quite well in an enterprise environment. It is designed to handle growth by using a cluster-based architecture where multiple appliances can be connected together to distribute load and maintain performance. This allows the system to scale beyond the limits of a single appliance while still being managed as one solution. For example, you can add multiple nodes for password management and session monitoring, and the workload gets distributed across them. This not only improves scalability but also ensures high availability and reliability. There are also cloud-based options such as One Identity Safeguard on Demand, which provides even more flexibility and scalability without needing to manage infrastructure. In our experience, as the number of users and systems increased, the solution handled the growth well without major performance issues. However, managing policies and access rules can become a bit complex at a larger scale, so proper planning is important. Overall, I would say scalability is strong and suitable for a growing organization.

How are customer service and support?

My experience with One Identity Safeguard support has generally been positive, but with some inconsistency. On the positive side, the support team is knowledgeable and usually helpful in resolving standard issues. Many users also mention that support engineers have strong technical expertise and can guide you properly when needed. However, for more complex issues, resolving can sometimes take longer than expected, and you may need to follow up or escalate the case. There are also cases where documentation could be more detailed, which would help to reduce dependency on support. Overall, I would say support is good and reliable for most cases, but response time and consistency can be improved, especially for complex problems.

Which solution did I use previously and why did I switch?

Earlier we were using a mix of manual processes and basic privileged access control without a dedicated PAM solution. We switched to One Identity Safeguard mainly to improve security and gain better control over privileged accounts. The lack of centralized password management and session visibility was a big gap, and One Identity Safeguard helped us address that with features such as password vaulting, session recording, and automated access workflows.

How was the initial setup?

The deployment took around four to six weeks in our environment, including initial setup, integration, policies, configuration, and testing before going live.

The deployment was mostly smooth, but there was a small learning curve for privileged users. Initially, some users found the new access process a bit different, since they had to request access through One Identity Safeguard instead of using direct credentials. But after a short adjustment period, they got comfortable with it. Overall, it was not very disruptive. With proper communication and a phased rollout, users adapted quickly and the added security and control were well accepted.

What about the implementation team?

For administrators, it required moderate training, since the setup and policy configuration can be a bit complex. Admins need a few sessions and some hands-on practice to get comfortable with managing the system. For end users, the training was minimal. A short walkthrough and basic documentation was enough for them to understand how to request access and use the system. Most users were able to adapt quickly after initial guidance.

What was our ROI?

I have seen a clear return on investment with One Identity Safeguard, both in terms of cost saving and efficiency. For example, automation of password management and access workflow has reduced manual effort by around 20 to 30 percent, which directly saves admin time. Audit preparation has also become much faster, saving several hours or days during compliance checks. From a cost perspective, we have reduced reliance on manual processes and avoided the need to expand the team, which is a big operational saving. Also, in real customer cases, organizations have reported around 12 percent ROI and noticeable cost saving after implementing One Identity Safeguard, mainly due to the automation and lower operational overhead. Overall, the combination of the time saving, reduced risk, and improved efficiency has delivered a solid ROI for us.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing and licensing for One Identity Safeguard has been generally positive, but it depends on the scale. It is an enterprise-level solution, so it is not the cheapest, but the pricing is fair for the level of security and features it provides. Many users also consider it more cost-effective compared to some competitors such as CyberArk, especially in the long term. In terms of licensing, it can be a bit complex. It is usually based on users or devices and you need to properly plan what modules you need, such as password management or session monitoring. Also, for virtual deployments, you may need additional OS licensing, which adds to the cost. For setup cost, since we deployed it on-premises, there was some initial investment in configuration and integration, but no heavy recurring infrastructure cost beyond that. Overall, I would say it offers a good balance between cost and value, but you need to clearly understand the licensing structure to avoid confusion.

Which other solutions did I evaluate?

Before choosing One Identity Safeguard, we did evaluate a few other PAM solutions. The main ones we looked at were CyberArk and BeyondTrust, as they are among the most well-known enterprise PAM platforms. We also briefly considered solutions such as Delinea for comparison. These tools offer similar core features such as credential vaulting, session monitoring, and privileged access control, but each has its own strengths. For example, CyberArk is known for its maturity and deep PAM capabilities, while BeyondTrust is strong in combining privileged access with remote access features. In the end, we chose One Identity Safeguard because it provides a good balance between functionality, ease of deployment, and cost for our environment, with strong session monitoring and analytic features.

What other advice do I have?

My advice would be to start with a clear strategy and not rush the implementation. First, identify your critical systems and privileged accounts and prioritize securing those. One Identity Safeguard works best when you follow the least privilege approaches and role-based access control from the beginning. I would also strongly recommend starting with a pilot deployment. Test your workflows, approvals, and session policies with a small group before rolling it out organization-wide. This helps avoid user friction later. Another key point is to focus on automation early. Things such as password rotation, approval workflows, and session monitoring are where you get the most value and efficiency gains. Also, invest time in proper policy design and training. Many challenges people face come from misconfiguration rather than the tool itself. Following security best practices such as strong authentication, encryption, and controlled access policies is very important. Finally, make sure you integrate it with your existing ecosystem such as Active Directory and SIEM tools, to get full visibility and maximize its benefits. If you plan it properly and use its automation and security features effectively, One Identity Safeguard can deliver a lot of value.

Overall, One Identity Safeguard is a strong and reliable PAM solution that does a great job in securing privileged access and improving visibility. It really stands out in areas such as password vaulting, session monitoring, and audit readiness. While there are some improvements needed in UI, reporting, and ease of configuration, the core functionality is solid and delivers real value. If implemented properly, it can significantly enhance security posture and reduce operational efforts, making it a good choice for organizations looking to strengthen their privileged access management.

We have seen some measurable improvement after implementing One Identity Safeguard. For example, audit preparation time has reduced by around 40 to 50 percent because all privileged activities are already logged and easy to access. Earlier, it used to take days to gather data, but now it can be done in a few hours. We have also seen a noticeable drop in security incidents related to privileged access, mainly because passwords are rotated automatically and direct access to credentials is eliminated. In terms of operation, automation has saved us roughly around 20 to 30 percent of the time spent on manual tasks such as password reset and access approvals. Overall, it has helped us save time, improve security, and reduce manual effort across the team. I would rate this product an 8 out of 10.


    Kartik Swami

Privileged access has become more secure and password management saves significant time

  • April 30, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for One Identity Safeguard is to manage and control privileged accounts and store passwords. For example, if an IT admin needs access to a server, I use One Identity Safeguard to manage and control privileged accounts. One Identity Safeguard helps companies avoid data breaches regarding my main use case, influencing other teams and types of users who interact with it.

What is most valuable?

One best feature One Identity Safeguard offers is multi-factor authentication, which adds extra security by requiring more than one verification step. When I mention requiring more than one verification step, I am referring to multi-factor authentication, and it helps to secure systems because it will protect the data. One Identity Safeguard has positively impacted my organization by helping to increase security because of password vaulting.

Password management has improved as it is easier now; for example, I experienced improved efficiency when my IT team needs to access a production server. I have noticed measurable outcomes regarding reduced time to access servers and fewer security incidents since using One Identity Safeguard because it helps me to secure my data and it is reliable.

What needs improvement?

One Identity Safeguard could be improved, and some user tools can be enhanced. I would add more about the needed improvements related to user tools or any other area. The improvement I suggest is to add AI and smart automation; One Identity Safeguard already uses analytics to detect risks, but there is room for enhancement. I believe One Identity Safeguard can be improved by enhancing the user experience.

For how long have I used the solution?

I have been working in my current field for one and a half years.

What do I think about the stability of the solution?

One Identity Safeguard is stable, and this is actually expected by most organizations, commonly compared with CyberArk.

What do I think about the scalability of the solution?

For scalability, instead of one system handling everything, multiple systems are used.

How are customer service and support?

Customer support is good and meets my expectations. I would give a rating of 4.5; I think it is good for customer support.

Which solution did I use previously and why did I switch?

I have previously used a different solution and it was a good experience.

How was the initial setup?

The training required to use the solution is straightforward and effective. It took about one to two weeks for deployment of the solution.

What about the implementation team?

I typically integrate One Identity Safeguard with several parts of the business to make access more seamless. The integration process was balanced because of moderate challenges but manageable overall.

What was our ROI?

For ROI, I have seen a return on investment based on time saved, which is nearly a 50 to 70% reduction.

What's my experience with pricing, setup cost, and licensing?

A strong and honest answer about pricing is that it shows both cost and value.

Which other solutions did I evaluate?

I evaluated other options before choosing One Identity Safeguard.

What other advice do I have?

The feedback regarding the solution's usability and functionality is positive; from my perspective, it is easy to use. I have additional thoughts about One Identity Safeguard. I find this interview very appreciating; it is very helpful, and overall it is a good experience.

I can provide a short poem: Locked doors, silent keys, access flows, watched and secure. This poem captures my sentiments regarding the solution. My overall review rating for One Identity Safeguard is 8.5.


    Chetan Bhati

Privileged access has become controlled and auditing provides clear visibility into admin activity

  • April 30, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for One Identity Safeguard is managing and securing privileged access on a day-to-day basis. It is used for password vaulting, controlled admin access to servers, and monitoring privileged sessions to ensure security and compliance.

Recently, I used One Identity Safeguard to retrieve a privileged account password from the vault for server access during troubleshooting. The access was time-bound and automatically logged. I also checked session activity logs to verify the actions performed, ensuring everything was secure and compliant.

What is most valuable?

Some of the best features of One Identity Safeguard in my opinion are its password vaulting, session monitoring, and detailed auditing capabilities. It securely stores privileged credentials, provides real-time monitoring and recording of admin sessions, and maintains complete audit logs, which helps in improving security and meeting compliance requirements.

One Identity Safeguard has positively impacted our organization by improving our overall security through controlled and monitored privileged access. We have reduced risk related to password misuse, and auditing has become much easier. It also helps in maintaining compliance and gives better visibility into admin activities across the environment.

What needs improvement?

Overall, One Identity Safeguard works well, but it could be improved in terms of UI simplicity and ease of navigation, especially for new users. Some configuration can feel complex, so better documentation or more intuitive workflows would help. Additionally, faster performance in session monitoring and reporting would enhance the overall experience.

A better integration with other security and monitoring tools would improve the overall experience. Also, more user-friendly reporting and a customizable dashboard would make it easier to track activities and generate insights quickly.

For how long have I used the solution?

I have been using One Identity Safeguard for six months to one year.

What do I think about the stability of the solution?

One Identity Safeguard is stable in our environment.

What do I think about the scalability of the solution?

One Identity Safeguard is highly scalable in our environment. We are able to add more users, systems, and privileged accounts without impacting performance. As our infrastructure grows, the solution continues to handle the increased load smoothly, especially for password vaulting and session monitoring, without any major changes required.

How are customer service and support?

I would say the customer support for One Identity Safeguard has been generally responsive and helpful. Whenever we raise issues related to configuration or access, the support team assists with proper guidance.

Which solution did I use previously and why did I switch?

Previously, we were using a more manual process for privileged access management, which involved shared credentials and less centralized control. We switched to One Identity Safeguard to improve security, implement proper access control, and gain better auditing and monitoring of privileged activities.

How was the initial setup?

Deployment of One Identity Safeguard in our organization took approximately a few days to a couple of weeks, including installation, configuration, and integration with Active Directory and internal systems as well. Most of the time was spent on testing and ensuring proper access policies were applied.

What about the implementation team?

Only basic training was required to start using One Identity Safeguard. For administrators, a bit more training was needed to understand configuration, policies, and session management. For end users, minimal training was required since they mainly use it for requesting and accessing privileged credentials.

What was our ROI?

We have seen ROI mainly in terms of time saving and improved efficiency with One Identity Safeguard. Administrators spend less time managing privileged access and handling password requests because most processes are now automated. It has also reduced security risks by minimizing password sharing and manual access handling, which indirectly saves costs by preventing incidents and reducing audit effort. My advice would be to plan the deployment properly and ensure clear access policies are defined before implementation. It is important to invest time in understanding the configuration and integration with Active Directory. Once set up correctly, it provides strong security, better control over privileged access, and improves auditing and compliance significantly.

What's my experience with pricing, setup cost, and licensing?

I was not directly involved in the pricing, setup cost, or licensing decisions for One Identity Safeguard. However, from an operational perspective, the solution is considered a premium enterprise tool, and the licensing is managed centrally by our IT security team based on organization requirements.

Which other solutions did I evaluate?

Before selecting One Identity Safeguard, we evaluated a few other privileged access management solutions, including CyberArk and BeyondTrust. We chose One Identity Safeguard based on its features, integration capabilities, and ease of deployment within our existing infrastructure.

What other advice do I have?

Overall feedback from users regarding One Identity Safeguard's usability and functionality has been positive. However, some users feel the interface is slightly complex initially and requires some learning. Once familiar, they find it reliable for accessing privileged accounts and monitoring sessions effectively.

Since implementing One Identity Safeguard, we have seen better control over privileged access and reduced manual password handling. It has saved time during troubleshooting by providing quick, secure access, and auditing has improved, making it easier to track activities and support compliance requirements.

The integration with Active Directory was moderately easy. The initial setup required proper configuration of trust and mapping of users' roles, which took some time. However, once configured correctly, it works smoothly and provides centralized authentication and better control over privileged access.

I would rate this review an overall score of eight.


    Prithviraj

Privileged access has become controlled and auditable while password rotation runs automatically

  • April 26, 2026
  • Review from a verified AWS customer

What is our primary use case?

One Identity Safeguard's main use case in our organization is to manage and secure privileged access across our environment, primarily controlling administration access to critical systems like servers, databases, and network devices. It helps us enforce secure password management and provides session monitoring, allowing us to track what privileged users are doing in real time or review it later for auditing purposes. In day-to-day operations, we use it to grant temporary access to admins, rotate credentials automatically, and ensure that no one has standing privileged access longer than necessary. It has become an important tool for maintaining compliance and reducing the risk of unauthorized access.

Recently, we faced a situation where one of our database servers needed urgent troubleshooting from a senior admin. Instead of sharing credentials or giving permanent access, we used One Identity Safeguard to grant temporary privileged access. The admin requested access through the system, it got approved, and One Identity Safeguard automatically provided the credentials without exposing the actual password. The entire session was recorded, which gave us confidence from a security and audit perspective. What made a difference was that once the task was completed, the access was automatically revoked and the password was rotated or changed, alleviating concerns about lingering access or manual cleanup. This made the entire process much more secure and streamlined compared to previous methods.

What is most valuable?

The best features of One Identity Safeguard include several standout capabilities we rely on heavily. The biggest feature for us is privileged session monitoring and recording, which gives full visibility into what admins are doing, and the ability to replay sessions later is particularly useful for audits or troubleshooting. It enhances security since everything is tracked and traceable. Another key feature is secure password management with automatic rotation, eliminating the need for manual credential management. The system handles password changes regularly, significantly reducing risk. We also find the access request and approval workflow very valuable. Instead of informal access sharing, everything goes through a structured process that maintains control and compliance. We would also highlight real-time monitoring and alerting; if any suspicious activity occurs during a session, it can be flagged or halted immediately, adding an extra layer of protection. Overall, the combination of visibility, control, and automation makes it very useful, focusing on securing access while making the process manageable and auditable.

Beyond the main use case, One Identity Safeguard has integrated into our daily operations for access control, not just for high-risk situations. We use it routinely for managing privileged sessions, especially for admins who need temporary access to different systems. One standout aspect is how it enforces a structured workflow. Instead of informal access requests over email or chat, everything goes through an approval process, keeping things clean and auditable. It reduces dependency on individuals since credentials are not shared manually anymore, fostering better security habits across the team. People are more aware of access policies, and there is a clear accountability trail for every action. It is not just a tool we use occasionally; it is essential to our regular IT and security processes.

There are smaller features worth noting as well. One we find particularly useful is the ability to launch sessions directly through the platform without exposing credentials, allowing admins to connect through One Identity Safeguard without needing to see the password. Another beneficial feature is the session search and indexing; if an investigation is necessary, we can quickly identify specific sessions based on users, time, or activity rather than manually sifting through logs. This capability has been extremely helpful during audits or incident reviews. Furthermore, the policy-based access controls are quite flexible. Once set up properly, access governance operates automatically in the background, reducing manual effort. Integration with Active Directory services facilitates onboarding and management, avoiding the need to recreate everything from scratch. It is these smaller practical features that enhance usability on a daily basis, not just in audits or critical situations.

What needs improvement?

One Identity Safeguard works well for us overall, but there are several areas where improvements could be made. The initial setup and deployment can be quite complex, particularly if you are new to privileged access management tools, and understanding the architecture and configuration requires time. A more guided setup or simpler onboarding would be beneficial. The user interface could also be improved; while functional, it is not always intuitive, especially for new users. A more modern and user-friendly UI would facilitate daily operations. We have also found that reporting and customization of reports could be more flexible; although the data is available, it sometimes requires extra effort to obtain the desired format or detail level for audits or management reporting. Additionally, customer support response times could improve, particularly for non-critical issues; while the support team is knowledgeable, faster turnaround would make a difference. Overall, these are not deal breakers, but enhancing these areas would make the product more efficient and easier to adopt.

We would appreciate more automation and smarter workflows. While the approvals process functions effectively, adding more flexibility, such as conditional approvals or risk-based access, would enhance its strength. We also believe that better dashboarding and visibility would help; while data can be obtained, having customizable or real-time dashboards for aspects like active sessions, risk alerts, or access trends would allow for a quick overview without requiring in-depth report digging. Overall, these enhancements do not indicate major gaps, but they would improve usability and give the product a more modern and future-ready feel.

For how long have I used the solution?

I have been using One Identity Safeguard for a year.

What do I think about the stability of the solution?

One Identity Safeguard has proven to be stable and reliable within our environment. Once we managed to get past the initial setup and configuration, it operates consistently without major issues or downtime. Day-to-day tasks such as access requests, session monitoring, and password rotation function smoothly. It appears designed as a dependable enterprise-grade solution, reflecting well in its production performance. Similar to most complex security tools, we encountered minor issues during deployment and fine-tuning, but none that significantly impacted operations. Stability has not been a concern; it has been a reliable part of our environment.

What do I think about the scalability of the solution?

One Identity Safeguard has managed scalability effectively in our experience. As our environment grows—adding more servers, users, and privileged accounts—we have scaled its use without significant complications since we are using the virtual appliances model. Scaling primarily involves allocating additional resources or deploying more instances as needed. Platform-wise, it is designed to support enterprise-scale environments, capable of managing large numbers of sessions and users as long as it is correctly sized and configured. However, we have noticed that performance can vary based on how it is deployed; the type of workload and the number of active sessions influence capacity. Proper infrastructure planning is therefore crucial. Overall, it has adapted to our growth without necessitating major redesigns, requiring only resource tuning and scaling as demand escalated. We would say it is highly scalable, particularly for mid to large enterprise environments, provided the architecture is well planned.

How are customer service and support?

Overall, our experience with One Identity Safeguard support has been quite positive. The support team is generally knowledgeable and technically adept, particularly when addressing complex issues. Whenever we raise critical tickets, they guide us appropriately and provide workable solutions. From our observations, once we connect with the right support engineer, the quality of assistance is high. The primary area for improvement is response speed and escalation, which aligns with general user feedback, noting strong support but inconsistent response times. Overall, we would assess the support as reliable and knowledgeable, although there is scope for improvement regarding response consistency.

Which solution did I use previously and why did I switch?

Before transitioning to One Identity Safeguard, we mainly relied on a mixture of manual processes and basic access control tools, using native solutions such as Active Directory for access management along with internal processes for handling privileged credentials. We decided to switch due to scalability and security concerns; the existing approach was inadequate, leading to challenges with shared credentials, limited visibility of privileged sessions, and insufficient audit trails. It required substantial manual effort to manage and track access. After evaluating several dedicated PAM solutions, we selected One Identity Safeguard because it offered a more comprehensive and centralized approach, highlighting features such as session recording, automated password rotation, and structured access workflows. The move stemmed from our need for improved security, compliance, and operational efficiency as our environment expanded.

How was the initial setup?

The initial deployment took us around three weeks. Setting up the virtual appliances was relatively fast, but a significant amount of time went into configuration, integrating it with existing systems such as Active Directory, and defining access policies. We also allocated time to test different use cases and ensure everything operated as expected before broader rollout. While the technical setup was quick, the overall time was largely influenced by planning, integration, and fine-tuning.

Overall, the deployment was fairly smooth, though there was a slight adjustment period for our privileged users. Initially, some admins found it somewhat disruptive as they were accustomed to direct access, and now had to use an approval workflow in One Identity Safeguard to initiate sessions. There was a small learning curve and some resistance initially; however, once they became familiar with the process, things settled down quickly. Many users even began appreciating the simplified access requests and the removal of the need to manage or remember privileged credentials. We facilitated the transition by implementing a phased rollout and providing basic training, which helped minimize disruptions. While there was initial friction, it was temporary, and overall adoption progressed smoothly.

What about the implementation team?

The team managing One Identity Safeguard required a moderate level of training. We spent several days reviewing the architecture, configuration, and best practices, followed by a couple of weeks of hands-on learning during the implementation phase. While the tool is not overly complex, understanding how to design privileged access workflows and policies is essential for maximizing its use. For end users, particularly admins just needing to request and use access, the training requirements were minimal; a short session or demonstration sufficed to illustrate how to request access and launch sessions through the platform. Most people adapted quickly after one or two uses. Overall, more effort is needed on the admin side, while regular users find it quite straightforward.

What was our ROI?

We have seen a return on investment since implementing One Identity Safeguard. From a time-saving perspective, access provisioning has accelerated dramatically; what used to take twenty to thirty minutes per request can now be completed in just a few minutes, which accumulates significantly across multiple daily requests. Overall, we have likely reduced admin effort related to access management by forty percent, and from an operational efficiency standpoint, we no longer need to manage or rotate privileged credentials manually. This shift saves a considerable amount of ongoing effort and diminishes dependency on a few key individuals. We have also experienced indirect ROI by reducing security risk; quantifying it precisely is challenging, but eliminating shared credentials and enforcing session monitoring has materially lowered our exposure to potential incidents, which could be costly if they occurred. In terms of audit compliance, we have cut preparation time by approximately forty to fifty percent since most required data is readily available through logs and sessions. While headcount has not decreased, it has allowed our teams to focus more on strategic tasks instead of manual access management. Therefore, the ROI stems from a combination of time savings, enhanced security posture, and streamlined audit processes rather than direct cost reduction.

What's my experience with pricing, setup cost, and licensing?

Our pricing and licensing experience was fairly typical for an enterprise security solution. It is not the cheapest option available, but it aligns with the level of security and control it delivers. The initial setup cost was moderate; we did not incur major hardware expenses as we opted for virtual appliances, but there was still some investment needed for configuration and internal resources. Licensing is structured and scalable, which is beneficial as the environment grows, although it can seem complex initially to fully understand what is included and how to size it appropriately, requiring close collaboration with the vendor during that phase. From a value perspective, we see it as justified because it replaces many manual processes and mitigates security risks. However, organizations should plan their licensing thoughtfully to avoid over or under-provisioning. Overall, it represents a solid investment, although entering with a clear understanding of requirements is essential for maximizing value.

Which other solutions did I evaluate?

Before selecting One Identity Safeguard, we assessed a few PAM solutions, specifically CyberArk and BeyondTrust. Both are reputable solutions and widely recognized in the market. CyberArk is particularly feature-rich, but we found it somewhat complex and costly relative to our requirements. BeyondTrust was also a strong contender, especially regarding usability, but in our case, One Identity Safeguard presented a better balance between functionality, ease of use, and overall cost. We also took into account how well One Identity Safeguard integrated into our existing environment and the speed at which we could deploy it compared to alternatives. Overall, the decision was not due to shortcomings of the other tools, but rather finding the right fit for our specific needs.

What other advice do I have?

My main advice for those considering One Identity Safeguard is to carefully plan your implementation beforehand. This is not a plug-and-play tool; you will extract the most value by clearly defining your privileged access policies, workflows, and use cases in advance. We also highly recommend conducting a proof of concept in your environment to test real scenarios, particularly edge cases such as legacy systems or service accounts, as challenges often arise in these areas. This testing approach is strongly advocated by practitioners since real-world scenarios provide a clearer picture than demos. Additionally, invest time training your admins and establishing clear processes. The tool is powerful, but it works most effectively when your team understands how to use it properly. From a technical standpoint, ensure you size and secure your deployment accurately—planning for storage, access restrictions, and network setup, especially in cloud environments, is vital. Overall, it is a robust solution whose success hinges on effective planning, implementation, and alignment with your organization's processes. I would rate this product an eight out of ten.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    Aditi Kunte-Gummul

Centralized controls have transformed privileged access and now ensure accountable daily operations

  • April 25, 2026
  • Review provided by PeerSpot

What is our primary use case?

One Identity Safeguard is used primarily in our day-to-day operations to manage and secure privileged access across our IT environment by controlling, monitoring, and auditing all administrative sessions. Instead of sharing static credentials, users request access through One Identity Safeguard, which grants time-bound privileged sessions with proper approval workflows. It automatically records and monitors these sessions for security and compliance purposes, while also securely storing and rotating passwords for critical systems, reducing the risk of credential misuse. Overall, it helps us to enforce strong governance, maintain accountability, and ensure that all sensitive access is controlled, traceable, and aligned with our security policies on a daily basis.

A recent example of using One Identity Safeguard was when a team member needed temporary administrative access to a production server for troubleshooting. Instead of sharing credentials directly, they raised a request through One Identity Safeguard that went through an approval workflow. Once approved, they were granted a time-limited session without ever seeing the actual password. The entire session was recorded and monitored in real-time. After the task was completed, access was automatically revoked and the password was rotated. This ensures security, accountability, and compliance without any manual intervention or risk of credential misuse.

In addition to the core use case, One Identity Safeguard fits seamlessly into our workflow by acting as a central control point for all privileged activities. This means every sensitive access request, whether for servers, databases, or network devices, follows a standardized and secure process with approvals, session monitoring, and automatic credential management. It has significantly reduced the need for manual password sharing and tracking, while also improving coordination between teams because everyone follows the same access process, making our operations more structured, secure, and audit-ready without slowing down productivity.

What is most valuable?

One Identity Safeguard's best features that stand out the most are its strong combination of password vault, session monitoring, and automated access control. It securely stores and automatically rotates privileged credentials, so users never see the actual password, which greatly reduces security risk. The session recording and real-time monitoring provide complete visibility into all administrative activities, making auditing and compliance much easier. Another key feature is its approval-based workflow system that ensures every privileged access request is controlled and time-bound, along with real-time alerting for threat detection that helps quickly identify suspicious behavior. Overall, these features work together to provide a highly secure, transparent, and well-governed privileged access environment that fits seamlessly into daily operations.

Session monitoring and real-time alerting have improved our security by giving full visibility into admin activities. For example, we once detected an unusual command during a privileged session and could immediately review the live session recording and take action, which helped prevent a potential threat. Overall, it has made our approach more proactive by allowing us to monitor, detect, and respond to suspicious behavior instantly, instead of reacting after an issue occurs.

One Identity Safeguard has had a strong positive impact on our organization by significantly improving security, control, and accountability around privileged access. We no longer rely on shared or static credentials and instead use controlled, time-bound access with full session monitoring, which has reduced the risk of misuse and insider threats. It also makes audits much easier because every activity is recorded and traceable. Operationally, it has streamlined workflows by automating password management and access approvals, saving time for the IT team and creating a more structured, secure, and compliant environment overall.

What needs improvement?

One Identity Safeguard can be improved by making the user interface more intuitive and easier to navigate, especially for new users who may find the initial experience slightly complex. Simplifying the setup and configuration process, which can require technical expertise and time during deployment, would also be beneficial. There is room to enhance its reporting and dashboard customization to provide more flexible, real-time insights without relying on external tools. Improving integration capabilities with modern cloud platforms and third-party applications would make it more adaptable in hybrid environments. Overall, while it is a strong solution, these improvements would make it more user-friendly and efficient to manage.

Beyond the earlier points, better performance optimization and faster load times when dealing with large volumes of session recordings or logs would be valuable. Sometimes searching or reviewing sessions can feel slightly slow. Enhancing alert customization with more granular controls would help reduce noise and focus only on critical security events. More detailed and simplified documentation or in-product guidance would make troubleshooting and advanced configuration easier for teams, especially during initial adoption. These small enhancements would further improve usability and overall efficiency.

For how long have I used the solution?

I have been using One Identity Safeguard for the last one and a half years.

What do I think about the stability of the solution?

One Identity Safeguard is quite stable and reliable, as it consistently handles privileged access management tasks without major disruption. This aligns with user feedback where it is often rated very high for stability, sometimes around 9 out of 10, with minimal downtime and strong performance even in enterprise environments. Although like any system, there can be occasional minor issues such as small bugs or upgrade-related challenges, overall it is dependable and performs smoothly for day-to-day operations.

What do I think about the scalability of the solution?

One Identity Safeguard handles scalability quite well, as it is designed with a flexible architecture that can grow with our organization, supporting additional users, systems, and workloads without major performance issues. Features like clustering and distributed deployments help manage load effectively as the environment expands. Overall, it scales smoothly for enterprise use with only minor challenges, such as needing proper planning and resource allocation when scaling to very large environments.

How are customer service and support?

Customer support for One Identity Safeguard has been generally good in our experience, as the support team is knowledgeable and helpful in resolving standard issues, especially during setup and troubleshooting. However, there have been occasional delays in response time for more complex cases, which aligns with some user feedback where support is effective but could be improved in responsiveness and consistency for critical issues. Overall, our experience has been positive, but with slight room for improvement in faster turnaround for advanced or urgent problems.

Which solution did I use previously and why did I switch?

Before using One Identity Safeguard, we relied on manual credential management and some basic tools within Microsoft Active Directory, but we switched because those lacked proper security, auditing, and centralized control for privileged access, which One Identity Safeguard handles much more effectively.

How was the initial setup?

The deployment of One Identity Safeguard in our organization was relatively moderate in terms of timeline. The initial setup of the virtual appliances and basic configuration was completed within a few days, but the overall deployment, including integration, policy setup, access workflow, and testing, took a couple of weeks to fully stabilize. While the core installation is quick, achieving a fully optimized and production-ready setup requires proper planning and time to align with existing security and operational processes.

What about the implementation team?

We do not have any business relationship with the vendor beyond being a customer, as we use One Identity Safeguard purely for internal privileged access management and security purposes. We are not part of their partner ecosystem, such as a reseller, integrator, or service partner, although we are aware that One Identity Safeguard does offer a structured partner program that includes resellers, service providers, and implementation partners within its global partner network.

What was our ROI?

We have seen a clear return on investment with One Identity Safeguard, as it has reduced manual efforts by around 40 to 50%, improved audit readiness significantly, and saved time on access management tasks, allowing the IT team to focus on more critical work without needing additional resources.

What's my experience with pricing, setup cost, and licensing?

Our experience with pricing, setup cost, and licensing for One Identity Safeguard was generally straightforward, as the licensing model is typically based on the number of users or managed assets, which makes it scalable. The procurement and setup process was smooth with clear guidance from the vendor. Although the overall cost is on the higher side compared to similar tools and some effort was needed to fully understand licensing and the feature inclusion, considering the strong security, automation, and compliance benefits it provides, we found the investment justified with no major challenges during implementation.

Which other solutions did I evaluate?

Before selecting One Identity Safeguard, we evaluated other privileged access management solutions such as CyberArk, BeyondTrust, and Delinea, but we chose One Identity Safeguard because it offered a strong balance of security, ease of use, and integration capabilities suited to our environment.

What other advice do I have?

The training required for One Identity Safeguard was moderate. Administrators needed a more in-depth understanding of policies, session management, and configuration, which took some structured learning and hands-on practice over a few days. For our end-users, the training was fairly simple since they mainly needed to learn how to request access and use approved sessions, which was easy to pick up with basic guidance. Overall, it was not overly complex, but it did require some initial effort for admins to fully utilize the platform effectively.

The deployment of One Identity Safeguard had a manageable impact on our privileged users. There was a slight initial adjustment period where users had to adapt to the new process of requesting access and working through controlled sessions instead of using direct credentials, which caused minor disruption in the beginning. However, with proper communication and training, the transition became smooth. Over time, users actually found it more convenient and secure since they no longer needed to manage or remember privileged passwords. Overall, the deployment did not significantly disrupt operations and quickly became a normal part of the workflow.

Feedback from our team on One Identity Safeguard has generally been positive, especially regarding its strong security features, reliable session monitoring, and the convenience of not having to handle or remember privileged passwords, which has improved both confidence and compliance in daily operations. However, some users have mentioned that the interface can feel a bit complex initially and takes time to get used to. There have been occasional comments about performance being slightly slow when searching session recordings, but overall, the usability is considered good once familiar, and the functionality is highly valued for maintaining secure and controlled access across the organization.

The integration of One Identity Safeguard with systems such as Microsoft Azure and Active Directory was generally manageable but required some planning and technical understanding. The core integrations were fairly straightforward with available connectors and documentation. However, certain configurations, especially around secure credential handling, session policies, and aligning with existing workflows, took additional effort and testing. In some cases, we faced minor challenges with fine-tuning permissions and ensuring seamless automation in DevOps processes. But overall, once properly set up, the integrations have been stable and effective in supporting our security and operational needs.

I would rate this review as an 8 out of 10 overall.


    Twinkle Solanki

Centralized controls have improved privileged access security and audit visibility

  • April 20, 2026
  • Review from a verified AWS customer

What is our primary use case?

In our organization, the primary use of One Identity Safeguard is managing and securing privileged access, and we mainly use it to store and protect sensitive credentials like admin passwords, ensuring that they are not exposed or misused. It also helps in monitoring privileged sessions, allowing us to track and audit activities performed by administrators or high-level users. This adds a stronger layer of security and compliance, as all credential access is controlled, recorded, and reviewed when needed. Overall, it plays a key role in protecting sensitive systems and reducing the risk of insider or outsider threats.

A common example of how we use One Identity Safeguard to secure privileged access is when a system administrator needs access to a production server. Instead of sharing or knowing the actual admin password, they request access through One Identity Safeguard, which securely provides a temporary credential for a session without exposing the password. This system automatically records an entire session, including actions performed on the server. If anything unusual happens, such as an unauthorized change or risky commands, the session logs and recording can be viewed by a security team, ensuring that privileged access is tightly controlled, fully monitored, and auditable at all times.

One additional point about our main use case is that we use One Identity Safeguard not just for securing access but also for enforcing strict governance and accountability across teams. For example, we apply role-based access control and approval workflows, so any privileged access request must be approved before it is granted.

What is most valuable?

The best features of One Identity Safeguard mainly revolve around strong security, visibility, and control over privileged access. One of the most valuable features is its password management, where sensitive credentials are securely stored, automatically rotated, and accessed only through a controlled workflow, reducing the risk of misuse. Another standout feature is session monitoring and recording, which captures every action taken during privileged sessions.

The session monitoring and recording feature in One Identity Safeguard has been extremely valuable for our team, especially from a security and compliance perspective. We use it quite regularly whenever an administrator accesses critical systems. Every privileged session is recorded in detail, covering screen activity, commands executed, and user behavior, so we have a complete audit trail. This has helped us quickly investigate incidents, verify actions taken on sensitive systems, and ensure that all activities follow internal policies.

One Identity Safeguard has had a very positive impact on our organization, especially in terms of security, efficiency, and visibility. It has helped us centralize and control privileged access and provided a structured secure approach. As a result, we now have much better visibility into accessing credentialed systems and the actions performed, which has improved accountability and compliance.

One Identity Safeguard has significantly improved accountability and compliance by giving us complete visibility of all privileged activities. Every access requires approval, and a session is logged and recorded, which means we always have a great audit trail of who accessed what and when. This has made internal and external audits much smoother, as we can quickly provide evidence without manually tracking.

What needs improvement?

One Identity Safeguard is a strong PAM solution, but there are definitely a few areas where it could be improved based on practical experience and known limitations. One key area is performance and resource usage, especially when advanced features like session recording or OCR are enabled. These features consume significant CPU and storage, and in some cases, may slow down connections or processing time if not optimized properly. Improving efficiency here would make the platform smoother and more scalable.

One additional improvement that would be helpful in One Identity Safeguard is better integration flexibility with modern cloud and DevOps tools. While it supports many systems, connecting with newer platforms for automation workflows in dynamic environments can sometimes require extra effort or customization.

For how long have I used the solution?

I have been using One Identity Safeguard for two years.

What do I think about the stability of the solution?

One Identity Safeguard is stable.

What do I think about the scalability of the solution?

One Identity Safeguard is highly scalable, and that is a core strength in enterprise environments. It is designed for scale through clustering and a distributed architecture, allowing multiple appliances to work together as a single system. For example, organizations can add multiple One Identity Safeguard appliances to handle an increasing number of users, privileged accounts, and session traffic without impacting performance.

How are customer service and support?

Customer support for One Identity Safeguard has been generally reliable based on our experience. On the positive side, the customer team is knowledgeable and technically strong, especially when dealing with configuration issues, session monitoring, or password-related queries. For standard or well-defined issues, responses are usually helpful and resolve problems efficiently.

Which solution did I use previously and why did I switch?

We evaluated a few other privileged access management (PAM) solutions before implementing One Identity Safeguard, including CyberArk and other enterprise PAM tools in the same space.

How was the initial setup?

The deployment of One Identity Safeguard was relatively quick compared to many other IAM and PAM solutions because it is delivered as a pre-configured appliance, either physical or virtual. The initial setup can be done quite fast, which helps to reduce the time to value.

What about the implementation team?

The deployment of One Identity Safeguard was fairly smooth overall with minimal disruption for privileged users. During the initial rollout, there was a short adjustment period where users had to request access through the system instead of directly using credentials, which slightly changed their workflow. However, once they became familiar with the process, it actually improved their experience by simplifying access and removing the need to remember or manage sensitive passwords.

The training required for One Identity Safeguard was quite manageable and varied by role. For end-users and privileged users, training was minimal, and basic guidance was enough for them to understand how to request access and start sessions since the interface is fairly straightforward for daily use.

What was our ROI?

We have seen a clear return on investment with One Identity Safeguard, mainly driven by time savings, reduced manual effort, and fewer security-related incidents. One of the biggest measurable improvements has been in IT workload reduction. After implementing One Identity Safeguard, we saw a significant drop in manual tasks including password handling, privileged access approvals, and incident troubleshooting.

What other advice do I have?

My advice to others looking into using One Identity Safeguard is that we have seen a clear return on investment, mainly derived from saved operational efficiency and reduced security overhead. A simple way to explain it is time saved, faster administration, fewer security incidents, and efficiency gained.

Overall, One Identity Safeguard stands out as a strong and well-built privileged access management solution, especially for organizations that want tighter control over admin activity without slowing down operations. I would rate this product a nine out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?