Sign in Agent Mode
Categories
Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

7 AWS reviews

External reviews

37 reviews
from

External reviews are not included in the AWS star rating for the product.


4-star reviews ( Show all reviews )

    Twinkle

Centralized controls have improved privileged access security and audit visibility

  • April 20, 2026
  • Review from a verified AWS customer

What is our primary use case?

In our organization, the primary use of One Identity Safeguard is managing and securing privileged access, and we mainly use it to store and protect sensitive credentials like admin passwords, ensuring that they are not exposed or misused. It also helps in monitoring privileged sessions, allowing us to track and audit activities performed by administrators or high-level users. This adds a stronger layer of security and compliance, as all credential access is controlled, recorded, and reviewed when needed. Overall, it plays a key role in protecting sensitive systems and reducing the risk of insider or outsider threats.

A common example of how we use One Identity Safeguard to secure privileged access is when a system administrator needs access to a production server. Instead of sharing or knowing the actual admin password, they request access through One Identity Safeguard, which securely provides a temporary credential for a session without exposing the password. This system automatically records an entire session, including actions performed on the server. If anything unusual happens, such as an unauthorized change or risky commands, the session logs and recording can be viewed by a security team, ensuring that privileged access is tightly controlled, fully monitored, and auditable at all times.

One additional point about our main use case is that we use One Identity Safeguard not just for securing access but also for enforcing strict governance and accountability across teams. For example, we apply role-based access control and approval workflows, so any privileged access request must be approved before it is granted.

What is most valuable?

The best features of One Identity Safeguard mainly revolve around strong security, visibility, and control over privileged access. One of the most valuable features is its password management, where sensitive credentials are securely stored, automatically rotated, and accessed only through a controlled workflow, reducing the risk of misuse. Another standout feature is session monitoring and recording, which captures every action taken during privileged sessions.

The session monitoring and recording feature in One Identity Safeguard has been extremely valuable for our team, especially from a security and compliance perspective. We use it quite regularly whenever an administrator accesses critical systems. Every privileged session is recorded in detail, covering screen activity, commands executed, and user behavior, so we have a complete audit trail. This has helped us quickly investigate incidents, verify actions taken on sensitive systems, and ensure that all activities follow internal policies.

One Identity Safeguard has had a very positive impact on our organization, especially in terms of security, efficiency, and visibility. It has helped us centralize and control privileged access and provided a structured secure approach. As a result, we now have much better visibility into accessing credentialed systems and the actions performed, which has improved accountability and compliance.

One Identity Safeguard has significantly improved accountability and compliance by giving us complete visibility of all privileged activities. Every access requires approval, and a session is logged and recorded, which means we always have a great audit trail of who accessed what and when. This has made internal and external audits much smoother, as we can quickly provide evidence without manually tracking.

What needs improvement?

One Identity Safeguard is a strong PAM solution, but there are definitely a few areas where it could be improved based on practical experience and known limitations. One key area is performance and resource usage, especially when advanced features like session recording or OCR are enabled. These features consume significant CPU and storage, and in some cases, may slow down connections or processing time if not optimized properly. Improving efficiency here would make the platform smoother and more scalable.

One additional improvement that would be helpful in One Identity Safeguard is better integration flexibility with modern cloud and DevOps tools. While it supports many systems, connecting with newer platforms for automation workflows in dynamic environments can sometimes require extra effort or customization.

For how long have I used the solution?

I have been using One Identity Safeguard for two years.

What do I think about the stability of the solution?

One Identity Safeguard is stable.

What do I think about the scalability of the solution?

One Identity Safeguard is highly scalable, and that is a core strength in enterprise environments. It is designed for scale through clustering and a distributed architecture, allowing multiple appliances to work together as a single system. For example, organizations can add multiple One Identity Safeguard appliances to handle an increasing number of users, privileged accounts, and session traffic without impacting performance.

How are customer service and support?

Customer support for One Identity Safeguard has been generally reliable based on our experience. On the positive side, the customer team is knowledgeable and technically strong, especially when dealing with configuration issues, session monitoring, or password-related queries. For standard or well-defined issues, responses are usually helpful and resolve problems efficiently.

Which solution did I use previously and why did I switch?

We evaluated a few other privileged access management (PAM) solutions before implementing One Identity Safeguard, including CyberArk and other enterprise PAM tools in the same space.

How was the initial setup?

The deployment of One Identity Safeguard was relatively quick compared to many other IAM and PAM solutions because it is delivered as a pre-configured appliance, either physical or virtual. The initial setup can be done quite fast, which helps to reduce the time to value.

What about the implementation team?

The deployment of One Identity Safeguard was fairly smooth overall with minimal disruption for privileged users. During the initial rollout, there was a short adjustment period where users had to request access through the system instead of directly using credentials, which slightly changed their workflow. However, once they became familiar with the process, it actually improved their experience by simplifying access and removing the need to remember or manage sensitive passwords.

The training required for One Identity Safeguard was quite manageable and varied by role. For end-users and privileged users, training was minimal, and basic guidance was enough for them to understand how to request access and start sessions since the interface is fairly straightforward for daily use.

What was our ROI?

We have seen a clear return on investment with One Identity Safeguard, mainly driven by time savings, reduced manual effort, and fewer security-related incidents. One of the biggest measurable improvements has been in IT workload reduction. After implementing One Identity Safeguard, we saw a significant drop in manual tasks including password handling, privileged access approvals, and incident troubleshooting.

What other advice do I have?

My advice to others looking into using One Identity Safeguard is that we have seen a clear return on investment, mainly derived from saved operational efficiency and reduced security overhead. A simple way to explain it is time saved, faster administration, fewer security incidents, and efficiency gained.

Overall, One Identity Safeguard stands out as a strong and well-built privileged access management solution, especially for organizations that want tighter control over admin activity without slowing down operations. I would rate this product a nine out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    Ahitesh Anumala

Privileged access has become tightly controlled and audit preparation now runs faster

  • April 20, 2026
  • Review provided by PeerSpot

What is our primary use case?

I mainly use One Identity Safeguard to secure and control privileged access by managing admin credentials, granting time-based access, and monitoring sessions to ensure security and compliance.

For example, when an admin needs access to a production server, they request it through One Identity Safeguard, which grants time-limited access after approval. The system automatically injects the credentials, so the password is never exposed, and the entire session is monitored and recorded. This helps my team maintain security and quickly review activity during an audit.

What is most valuable?

One key benefit of my main use case with One Identity Safeguard is that it helped me eliminate shared admin credentials, which was a major security risk earlier. Now, every access request is tracked and tied to an individual user, improving accountability. It also simplified audits by providing clear session records, which solved a big challenge I previously faced with compliance visibility.

The best features One Identity Safeguard offers include credential injection, session monitoring, and role-based access control. Credential injection ensures passwords are never exposed to users, improving security, while session monitoring and recording provide full visibility and an audit trail of activity. Role-based access helps enforce a least privilege policy, and additional features such as real-time alerts, reporting, and integration with other systems make it a comprehensive solution for managing and securing privilege.

What needs improvement?

I would appreciate more flexibility in reporting and easier customization of dashboards in One Identity Safeguard. While the core features are strong, some advanced configuration can be somewhat complex. Features such as integration are useful but are used less frequently in daily operations compared to credential management and session monitoring. Adding a more intuitive control and simplifying advanced settings would enhance the usability.

One Identity Safeguard could be improved with a more user-friendly interface and simpler initial setup, as the learning curve can be somewhat steep. Enhancing reporting customization and expanding integration with more third-party tools would also add value. Additionally, faster support response times and smoother scalability for large environments would further improve the overall experience.

A specific challenge I faced during the use of One Identity Safeguard was during initial setup and policy configuration, which was time-consuming and required careful tuning to match my environment. At times, navigating advanced settings and generating custom reports also felt less intuitive, which slowed things down. Improving documentation and simplifying these configurations would make the experience much smoother for my team.

For how long have I used the solution?

I have been using One Identity Safeguard for two years.

What do I think about the stability of the solution?

Overall, One Identity Safeguard's authentication service is stable and reliable.

What do I think about the scalability of the solution?

One Identity Safeguard is highly scalable and can support growing environments effectively. It allows me to add more systems and users without major performance issues, and its clustering and load distribution capabilities help maintain performance as demand increases. Overall, it scales well for both mid-sized and large enterprise environments.

How are customer service and support?

Customer support for One Identity Safeguard was generally good, with a knowledgeable and helpful team assisting during the setup and troubleshooting. In most cases, issues were resolved efficiently, but response times can sometimes be slower for more complex problems.

Which solution did I use previously and why did I switch?

I was previously using a basic in-house solution for managing privileged credentials, but it lacked advanced features such as session monitoring and automated password management. I switched to One Identity Safeguard for better security, centralized control, and improved compliance capability.

How was the initial setup?

The integration of One Identity Safeguard with my DevOps environment and cloud applications was generally smooth, especially with standard systems, but it required some initial configuration and fine-tuning to align with my DevOps workflow and core cloud applications. I did face minor challenges around setup and policy configuration, but once implemented, it worked reliably and integrated well with my environment.

What was our ROI?

I have seen a clear return on investment with One Identity Safeguard. I have reduced manual effort for access management by around thirty to forty percent, which has saved significant staff hours. Audit preparation time has decreased by nearly fifty percent, and improved security controls have helped lower the risks of costly incidents. Overall, the efficiency gains and risk reduction have justified the investment.

What's my experience with pricing, setup cost, and licensing?

In terms of pricing and licensing, my experience with One Identity Safeguard has been fairly reasonable. It is based on the number of users and privileged accounts, with options for a subscription or perpetual licensing. The initial setup cost was moderate, especially considering the security benefits, although some investment was required for deployment and configuration. Overall, I found the pricing was justified with the environment.

Which other solutions did I evaluate?

Before choosing One Identity Safeguard, I evaluated a few other privileged access management solutions, such as CyberArk Privileged Access Manager, Delinea Secret Server, and BeyondTrust Privileged Access Management. These are well-known options in the market and commonly compared during the evaluation.

What other advice do I have?

My advice for others looking into using One Identity Safeguard would be to plan the implementation carefully and invest time in understanding your access policies and workflow before deployment. One Identity Safeguard is a powerful tool, but it is not plug and play. It requires proper configuration and tuning to get the best results. Start with a phased rollout, focus on high-risk privileged accounts first, and ensure your team is trained properly. Once properly implemented, it can significantly improve security, visibility, and compliance across the organization. I would rate this product nine out of ten.


    Antara R Deolekar

Privileged sessions have gained full visibility and audits now complete investigations faster

  • April 19, 2026
  • Review from a verified AWS customer

What is our primary use case?

I have been using One Identity Safeguard for almost a year. The main use case of One Identity Safeguard is privileged access management, specifically controlling and monitoring administrator access. In my organization, I typically use it for privileged password management, secure admin access, session recording and monitoring, approval workflows, and privileged account discovery.

A common day-to-day example involves accessing a production server. An admin needs to troubleshoot a service issue. Instead of sharing the local administrative password, they submit an access request in One Identity Safeguard, provide a reason, and select a time duration, for example, one hour. A manager or security team approves the request. The admin launches the RDP session directly from One Identity Safeguard. One Identity Safeguard injects the credential automatically. The password is not visible. The entire session is recorded for audit purposes. When the session ends, access expires, and the password is automatically rotated. This makes a difference because there is no shared admin password, temporary least privileged access is implemented, full session recording is available for audits, and automatic password rotation occurs after use.

What is most valuable?

The best features of One Identity Safeguard revolve around password security, session control, and governance. Some of the features I can mention are privileged password vault and automatic rotation, session recording and playback, real-time monitoring and threat blocking, just-in-time privileged access, and privileged session search.

The session recording feature is straightforward in day-to-day use. When an admin launches the RDP session or SSH session through One Identity Safeguard, the system automatically records everything in the background with no extra steps needed. It captures screen activity, commands executed, keystrokes, login-logout times, and target systems accessed. After the session, I can search by username, server name, date, time, and request ID. Real-time monitoring is also useful, especially for high-risk systems. Security or privileged access administrators can watch the session live and receive alerts on suspicious activity to determine if the session should be terminated if needed. I do not use live monitoring constantly, but it is very valuable for domain controller access, production database access, and emergency admin access. Overall, these features are valuable because they provide full visibility into privileged activity without slowing down the administrator.

One Identity Safeguard has improved privileged access security and accountability. I have eliminated shared admin passwords, implemented time-bound access with approvals, and gained session recording for audits. This has led to better visibility, faster investigation, and reduced standing privilege access. Investigations are much faster and more accurate, and audits are quicker with fewer findings, thanks to full session visibility and traceability. Regarding relevant metrics for any IAM solution or monitoring solution like One Identity Safeguard, previously it took two to three days to complete investigations. Now, after recording the session, investigations can be completed in under an hour.

What needs improvement?

I gave a rating of eight because of the strong privileged password vault and automatic rotation, reliable session recording and replay, just-in-time access with approval workflows, good audit and compliance visibility, and ease of administration. I did not give a higher rating for the following reasons: initial deployment can take time, the UI feels slightly dated in some areas, and reporting customization can be limited.

For how long have I used the solution?

I have been using One Identity Safeguard for almost a year.

What do I think about the stability of the solution?

One Identity Safeguard is very stable.

What do I think about the scalability of the solution?

One Identity Safeguard definitely scales.

How are customer service and support?

I have not used customer support. If I do use it, I will definitely connect back and update my feedback on this.

Which solution did I use previously and why did I switch?

I have not used any kind of solution previously.

How was the initial setup?

The initial setup typically took four weeks and sometimes more than four weeks as well, depending on the customer's environment and production environment. The setup was fairly minimal for end-users, but for an administrator, it requires a lot of work. The process is very straightforward and negotiable as well.

What about the implementation team?

I am a reseller.

What was our ROI?

Time is definitely saved. Regarding money, money is also saved because I maintain the compliance part. However, fewer employees are not needed; I need to hire more employees to monitor these things.

Which other solutions did I evaluate?

I have not evaluated any alternate options previously.

What other advice do I have?

I am currently happy with One Identity Safeguard, so there is no point to implement changes. I gave this solution a rating of eight. There was a short learning curve, but overall adoption was smooth and users now find it very easy and more secure to use. I recommend this solution if you want proper security for your infrastructure and want to improve your budget. If you have a limited budget, then please do not go for this solution. I am asking for better security.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    Prathamesh Pawar

Centralized control has eliminated shared credentials and provides secure audited admin access

  • April 18, 2026
  • Review provided by PeerSpot

What is our primary use case?

In my daily operations, I rely on One Identity Safeguard for administrator requests for access through One Identity Safeguard, which are approved via workflows. Once approved, sessions are launched, ensuring security without revealing passwords, and all activities are recorded for auditing purposes.

In our environment, there were multiple administrators using shared privilege accounts, which created accountability and security risks. With One Identity Safeguard, we implemented password vaulting where passwords are automatically rotated and never exposed to users, ensuring secure access and eliminating shared credential risks.

In our daily operations, One Identity Safeguard is primarily used to manage and control privilege access to critical systems such as servers, network devices, and databases. Administrators and users request access through One Identity Safeguard, which follows an approval-based workflow. Once access is approved, users can securely connect to the target system without directly viewing or knowing the privilege credentials. All sessions are proxied through One Identity Safeguard, ensuring that passwords are never exposed. Additionally, every session is monitored and recorded, allowing security teams to review activities when required. We also use One Identity Safeguard for automated password rotation, ensuring that privileged account passwords are regularly updated without manual intervention. Overall, it acts as a centralized platform for security, secure access management, auditing, and compliance in our environment.

How has it helped my organization?

The implementation of One Identity Safeguard has had a significant positive impact on our organization's security and operational efficiency, reducing the risk of credential misuse by eliminating shared privilege accounts and enforcing secure password vaulting with automated rotation. One Identity Safeguard improves security by eliminating shared credentials, enhancing visibility through session monitoring, simplifying compliance, and streamlining privilege access management.

After implementing One Identity Safeguard, we achieved several measurable improvements in our environment. We eliminated the use of shared privilege accounts, significantly improving accountability and reducing security risks. Privileged password exposure was reduced to zero, as all credentials are securely stored and managed through the vault with automatic rotation. Audit and compliance processes became faster and more efficient, as we could provide complete session logs and recordings whenever required. We implemented shared account management, achieved zero password exposure, improved audit readiness, reduced access management time, and gained full visibility into privileged activities.

What is most valuable?

The most valuable features of One Identity Safeguard are its strong privilege access control and session security capabilities. One key feature is password vaulting with automated rotation, which ensures that privileged credentials are never exposed to users and are regularly updated. Key features include password vaulting with rotation, session monitoring and recording, secure remote access without exposing credentials, approval-based workflows, and seamless integration with Active Directory.

One Identity Safeguard integrates seamlessly with Microsoft Active Directory, simplifying user authentication and access management. The integration provides centralized authentication, group-based access control, and automated management of privileged domain accounts, reducing manual efforts and improving security.

Additional features include session proxy access, granular policy control, threat detection, detailed audit logs, multifactor authentication, and high availability support.

What needs improvement?

While One Identity Safeguard is a strong privilege access management solution, there are some areas where improvements can be made. The initial deployment and configuration can be complex, especially in a large enterprise environment with multiple integrations. The user interface can be improved to make navigation more intuitive, particularly for new users and administrators. Reporting and customization options could be more flexible, as generating tailored reports sometimes requires additional effort. Integration with third-party tools, although supported, can be time-consuming and may require deeper technical expertise. Additionally, performance tuning may be required in high-load environments to ensure optimal session handling response times. Areas for improvement include complex initial setup, UI enhancement, more flexible reporting, and easier third-party integration.

Improvements can be made in areas such as simplifying the deployment and initial configuration process, especially for large complex environments. The user interface could be made more intuitive and user-friendly, making it easier for new users and administrators to navigate. Reporting capabilities can be enhanced with more customization options and easier report generation. Streamlining integration with third-party tools and platforms could reduce implementation efforts and time. Additionally, improved performance optimization for high-load environments would help ensure smoother session handling and a better user experience.

For how long have I used the solution?

I have been using One Identity Safeguard for the last one year.

What do I think about the stability of the solution?

One Identity Safeguard is stable in my environment and has been reliable in our production environment. We have not experienced any major downtime or critical issues after the initial deployment and configuration phase. The solution performs reliably for daily privilege access operations, including session management and password vaulting. With proper sizing and high availability configuration, the system handles multiple concurrent sessions efficiently, making it a dependable and stable platform suitable for enterprise environments.

What do I think about the scalability of the solution?

One Identity Safeguard is highly scalable and well-suited for enterprise environments. The solution can handle a growing number of privileged accounts and target systems without significant performance impact when properly sized, supporting horizontal scaling by adding additional appliances, allowing organizations to expand capacity as needed.

How are customer service and support?

One Identity's customer support is knowledgeable and provides helpful guidance for troubleshooting and configuration-related issues. For standard issues, the response time is responsive and the resolutions are effective. For more complex or critical issues, response time can sometimes vary, but overall, my support experience has been satisfactory. Documentation and knowledge base resources are also useful for resolving common issues and understanding product features, making customer support reliable and meeting enterprise expectations.

Which solution did I use previously and why did I switch?

Before implementing One Identity Safeguard, we relied on manual methods and basic access control mechanisms to manage privileged accounts. In some cases, privileged credentials were shared among administrators, and password management was handled manually, increasing security risks and reducing accountability. We moved to One Identity Safeguard for better security, centralized control, and session visibility.

How was the initial setup?

The deployment of One Identity Safeguard in our environment took approximately four to six weeks. The initial setup of the physical appliance was straightforward, but the overall implementation required careful planning, especially for integration with Active Directory and onboarding the target systems. One of the main challenges was defining and configuring access policies and approval workflows according to the organization's requirements, but the solution is stable after implementation.

What about the implementation team?

The training required for One Identity Safeguard was moderate. For administrators, detailed training is needed to understand policy configuration, password vaulting, session management, and integration. It typically took a few days of hands-on sessions along with initial setup implementation support. For end-users, minimal training is required as the access request and approval workflow is straightforward and user-friendly. Overall, with proper initial training and documentation, the team quickly adapts to the solution in daily operations.

What was our ROI?

I believe One Identity Safeguard delivers a strong return on investment by significantly reducing security risks and improving operational efficiency. ROI is achieved through reduced security risks, lower manual efforts, faster audits, and improved operational efficiency.

What's my experience with pricing, setup cost, and licensing?

One Identity Safeguard is priced at a premium level, typical for enterprise-grade privilege access management solutions. The licensing is generally based on the number of privileged accounts, users, or appliances, depending on the deployment model and components used. The initial setup cost includes the appliance cost, implementation efforts, and integration with existing systems, such as Active Directory and other infrastructure components.

Which other solutions did I evaluate?

Before finalizing on One Identity Safeguard, we evaluated other privilege access management solutions, such as CyberArk and BeyondTrust. CyberArk is a strong market leader with advanced features, but it can be complex to implement and manage. BeyondTrust also offers good capabilities, especially for endpoint privilege management and remote access, but we found One Identity Safeguard to be more aligned with our requirements in terms of ease of use and deployment flexibility. We chose One Identity Safeguard because it provides a good balance between security, usability, and integration capabilities, particularly with Active Directory.

What other advice do I have?

Overall, my experience with One Identity Safeguard has been very positive. It is a reliable and secure privilege access management solution that effectively protects sensitive accounts and provides full visibility into administrator activity, with minor improvements needed in terms of UI and reporting enhancements.

Before implementing One Identity Safeguard, I advise clearly defining your privilege access management strategy and identifying all critical systems and accounts. Plan integrations in advance, especially with Active Directory and other security tools, to ensure a smooth deployment. Focus on designing proper access policies and approval workflows, as these play a key role in effective implementation. Provide adequate training to administrators so they can fully utilize features like session monitoring, password vaulting, and reporting. Starting with a phased deployment approach, onboarding critical systems first and then gradually expanding across the environment is beneficial. Overall, proper planning and user training are key to maximizing the benefits of the solution.

One Identity Safeguard is a mature and enterprise-ready privilege access management solution that provides a strong balance between security and usability. The key value of the solution lies in its ability to centralize privilege access control while maintaining full visibility and auditability for user activities, making it a mature and reliable PAM solution that balances security and usability with strong long-term value for enterprise environments. I would rate this solution a nine out of ten.


    Swapnil Karkala

Privileged access has become streamlined and compliance improves through automated monitoring

  • April 18, 2026
  • Review from a verified AWS customer

What is our primary use case?

Our primary use case for One Identity Safeguard includes privileged password management, where it includes vaulting, rotating, and checking in and checking out privileged credentials. Secure remote access helps to grant access to Windows/Linux servers based on group membership. We also use it for session monitoring and recording, where it helps to monitor, record, and audit privileged sessions for compliance. Access request simplification plus threat detection helps to streamline requests and quickly detect threats seamlessly.

In my day-to-day work, One Identity Safeguard helps to identify anomalous behavior, a deal breaker feature for some customers. It also helps to detect threats and streamline requests and quickly detect threats.

What is most valuable?

The best features One Identity Safeguard offers are out-of-box templates, which simplify password rotation workflows and have a nice interface. It is also pretty stable.

The out-of-box templates from One Identity Safeguard make onboarding much easier for my team in day-to-day work.

One Identity Safeguard's automation of password management and incident investigations has cut manual efforts significantly.

One Identity Safeguard has positively impacted my organization by improving compliance, posture, and audit capabilities. It has cut manual efforts by 30 to 40% via automation and also decreased privileged account incidents by up to 40%.

What needs improvement?

I think One Identity Safeguard can be improved as it can be slow sometimes.

Regarding needed improvements, I want to mention that there is a lack of documentation and many plug-in problems.

I think One Identity Safeguard needs improvements because sometimes the support team doesn't have answers for bugs.

What do I think about the stability of the solution?

One Identity Safeguard is very stable.

One Identity Safeguard is deployed in my organization as a hybrid model.

One Identity Safeguard is deployed in a hybrid cloud setup.

What do I think about the scalability of the solution?

One Identity Safeguard's scalability is very efficient; it handles my organization's growth effectively.

How are customer service and support?

The customer support for One Identity Safeguard is very responsive and proactive.

Which solution did I use previously and why did I switch?

I did not use another option before choosing One Identity Safeguard.

How was the initial setup?

The deployment of One Identity Safeguard took two to three weeks.

The deployment of One Identity Safeguard did not affect my privileged users; it was not disruptive to them.

Not much training was required to start using One Identity Safeguard, both for those who manage it and for end users. It is self-service, and it is very easy to learn how to use it. The learning curve is smooth.

What about the implementation team?

I use the virtual appliances version of One Identity Safeguard because it suits my organization well with load balancing.

What was our ROI?

I have seen a return on investment with One Identity Safeguard, leading to efficient management and lower upfront cost. It has reduced inside and external threats, which is essential for preventing privileged user damage, and decreased privileged account incidents by 40%.

What's my experience with pricing, setup cost, and licensing?

One Identity Safeguard has a competitive setup cost, and the pricing is competitive.

My experience with pricing, setup cost, and licensing for One Identity Safeguard is that the pricing is very competitive.

Which other solutions did I evaluate?

Before choosing One Identity Safeguard, I did not really evaluate other options.

What other advice do I have?

I chose eight out of 10 for One Identity Safeguard because the pricing is very competitive. It is a nice tool that helps to identify anomalous behavior, a deal breaker feature for some customers. It also helps with access request simplification plus threat detection, where it streamlines requests and quickly detects threats.

My advice for others looking into using One Identity Safeguard is that it is a serious, enterprise-grade identity safeguard. It excels at security, monitoring, and compliance, but trades off simplicity and ease of use.

One Identity Safeguard has been a cost-effective tool that has prevented major security breaches, avoided insider threats and misuse of admin privileges, and reduced audit and compliance costs. However, the initial cost plus setup effort is a bit high.

I gave this review a rating of 8 out of 10.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    Nikita Bhojwani

Centralized controls have strengthened privileged access security and simplified compliance audits

  • April 17, 2026
  • Review provided by PeerSpot

What is our primary use case?

Our primary use case for One Identity Safeguard is to secure, control, and monitor privileged access across critical systems in the organization. We mainly use it for privileged session management, password vaulting, and enforcing least-privilege access policy. It helps us manage administrative access to servers, databases, and network devices by centralizing credential storage and rotating passwords automatically. Additionally, we use it for session recording and real-time monitoring, which strengthens our audit and compliance capability. Overall, it plays a key role in reducing insider threats, improving security visibility, and ensuring regulatory compliance.

A common example of how we use One Identity Safeguard for privileged session management is when a system administrator needs access to a production server. Instead of sharing static credentials, they request access through One Identity Safeguard. For password vaulting, the admin never sees the actual passwords. One Identity Safeguard automatically injects the credential during login, and the password is rotated after the session ends. This ensures that credentials are never exposed or reused. For privileged session management, once the admin connects to the server through One Identity Safeguard, the entire session is monitored and recorded. If any suspicious activity occurs, we have the ability to terminate the session in real-time. These session recordings are also used later for auditing and compliance checks. This approach significantly improves security while still allowing admins to do their work efficiently without manual credential handling.

One additional point to add about our main use case is how well One Identity Safeguard integrated into our overall security workflow. It is not just a standalone tool; it works as a central control point for all privileged access. In our day-to-day operation, it reduces manual effort for the IT team by automating password management and access approval. It also standardizes how privileged access is handled across different teams, which improves consistency and reduces human error. Another important aspect is its role in compliance. Since all privileged activities are logged and recorded, it makes audits much smoother and faster. Instead of collecting logs from multiple systems, everything is available in one place. Overall, it fits seamlessly into our workflow by enhancing security without slowing down operations, which is critical for maintaining both productivity and control.

What is most valuable?

One Identity Safeguard offers several powerful features, but a few stand out in day-to-day use. The most important feature is privileged password vaulting. It securely stores credentials in a centralized vault and automatically rotates passwords, which significantly reduces the risk of credential misuse or leakage. Another key feature is privileged session management. It allows us to monitor, record, and even replay user sessions in real-time. This is extremely useful for both security monitoring and audit purposes, as every action can be traced back if needed. A standout capability is real-time monitoring and threat detection. The platform can generate alerts or even block suspicious activity during live sessions, which adds a strong layer of proactive security. I also find the session recording with search and indexing very valuable. Since sessions are indexed, it becomes easy to quickly investigate specific actions without reviewing entire recordings. Additionally, the analytics and behavior monitoring feature helps identify unusual user activity using behavioral patterns, which is useful for detecting insider threats or compromised accounts. Finally, automation and workflow-based access control is a significant advantage. Access requests, approvals, and provisioning are handled through automated workflows, reducing manual effort while ensuring consistent policy enforcement.

What needs improvement?

While One Identity Safeguard is a strong PAM solution, there are a few areas where it could be improved. One area is the user interface and reporting customization. Although the platform is functional, creating highly customized reports or dashboards can sometimes be less intuitive and may require additional effort. Another improvement area is integration flexibility, especially with some third-party or legacy systems. While it integrates well with standard environments like Active Directory, expanding smoother integration across a wider range of tools would make it even more versatile.

For how long have I used the solution?

I have been using One Identity Safeguard for two years.

What do I think about the stability of the solution?

One Identity Safeguard has been highly reliable and stable in our experience. Once deployed and properly configured, the platform runs consistently with minimal downtime. We have not faced any major performance issues, even while handling multiple concurrent privileged sessions and the integration across our hybrid environment. There have been occasionally minor issues, mostly related to integration or configuration, but nothing critical, and they were quickly resolved.

What do I think about the scalability of the solution?

One Identity Safeguard has shown good scalability in our experience and has effectively handled growth in our organization. As our environment expands, whether adding more users, servers, or cloud resources, it is relatively straightforward to scale by extending the deployment, especially since we are using virtual appliances. We can add capacity without major architecture changes or downtime. It also handles an increasing number of privileged sessions and access requests without noticeable performance degradation.

How are customer service and support?

Our experience with customer support has been quite positive. The support team is generally responsive and knowledgeable, especially for standard use configurations, and we have mainly expressed satisfaction in this area because we have solved almost all problems using One Identity Safeguard.

Which solution did I use previously and why did I switch?

Prior to implementing One Identity Safeguard, we were using a mix of native tools and manual processes, along with limited capability from tools like CyberArk Privileged Access Manager in some parts of the environment. We decided to switch to One Identity Safeguard mainly for its unified approach to privileged access management. It offered better centralized control, easier integration with our hybrid environment, and more streamlined workflows for both administrators and end-users. Another key reason was the ease of deployment and usability, which made it more practical for our team than maintaining multiple tools or a more complex setup.

How was the initial setup?

The deployment took approximately four to six weeks in our environment. The initial setup, including deploying the virtual appliance and basic configuration, was completed within the first one to two weeks. After that, most of the time went into integration with systems like Microsoft Active Directory and Microsoft Azure, policy configuration, and testing. We also spent time on fine-tuning access control, onboarding users, and validating workflows, which is critical to ensure everything runs smoothly in production.

What about the implementation team?

There is a formal vendor-partner ecosystem in place beyond a direct customer relationship with One Identity. One Identity operates through a structured partner program that includes system integrators, resellers, and managed service providers who help with implementation, deployment, and ongoing support for One Identity Safeguard. However, in our specific case, our relationship is primarily as a customer, and we do not have any strategic alliance, reseller, or co-development relationship with the vendor.

What was our ROI?

We have definitely seen a clear return on investment after implementing One Identity Safeguard, both in terms of cost savings and operational efficiency. From a time-saving perspective, audit preparation time has reduced by around 40 to 50 percent since all privileged activity logs and session recordings are centralized and available. What earlier took a day can be done in an hour now. In terms of operational efficiency, automation of password management and access workflows has reduced manual effort by approximately 30 to 40 percent, allowing our IT team to focus more on strategic tasks instead of routine access management. While it is harder to quantify exactly, the platform has helped us prevent potential security incidents by enforcing strict access control and real-time monitoring. Avoiding even a single major breach can result in significant financial savings.

What's my experience with pricing, setup cost, and licensing?

Our experience with pricing, setup cost, and licensing was reasonable for an enterprise-grade PAM solution, though it does require a notable initial investment. The licensing model is fairly structured, typically based on the number of users, assets, or sessions being managed. It is flexible enough to scale as the organization grows, but it is important to plan properly to optimize cost. In terms of setup cost, the main investment was around implementation, integration, and initial configuration. Since we deployed in a hybrid environment, there was some additional effort involved, but nothing unexpected for a solution of this scale.

What other advice do I have?

My advice to others considering One Identity Safeguard would be to start with a clear understanding of privileged access requirements and define strong governance policies upfront. One Identity Safeguard is a powerful tool, but its effectiveness depends on how well it aligns with your organization's PAM strategy. Another key point is to invest time in proper policy configuration, such as session recording rules, approval workflows, and access controls to avoid unnecessary friction for end-users while still maintaining strong security. Training and onboarding are equally important; administrators and the security team should be comfortable with reviewing session logs and responding to alerts. Otherwise, the value of monitoring and auditing can be diminished. Finally, continuous review is essential. Regularly analyze reports, refine policies, and ensure integration with your broader security stack to get maximum value from the platform.

One Identity Safeguard, in my experience, has had a significant positive impact on our organization, especially in terms of security, efficiency, and compliance. From a security standpoint, it has greatly reduced the risks associated with privileged accounts. By eliminating shared credentials and enforcing password rotation, we have minimized the chances of unauthorized access and insider threats. Operationally, it has improved efficiency by automating tasks such as password management and access approval. This has reduced the manual workload on the team and streamlined how privileged access is granted and monitored. It has also strengthened our compliance posture. Since all privileged activities are logged and recorded, audits have become much smoother and faster, with all the required data readily available in one place. Additionally, the real-time monitoring and session control capability have given us better visibility and faster response to potential risks, which has improved our overall incident management process. I would rate this review as a nine out of ten.


    Nitin Yadav

Secure access has improved privileged workflows and real-time monitoring streamlines daily tasks

  • April 17, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for One Identity Safeguard includes privilege access, session recording, and real-time monitoring.

In daily work, I use session recording and real-time monitoring as part of my workflow.

My main use case is privilege access.

What is most valuable?

The best features One Identity Safeguard offers include secure and controlled access along with real-time session controlling.

The real-time session control feature helps me in my daily tasks by providing session controlling and monitoring in user sessions that occur, allowing proactive management across web and platform access instead of reacting after something goes wrong.

Session monitoring and recording are also crucial parts of the features.

One Identity Safeguard has a noticeable positive impact around security and operational efficiency, providing secure, strong security, real-time monitoring, and full visibility.

Operational efficiency has improved as it requires less manual effort for the IT team and makes troubleshooting easier.

What needs improvement?

One Identity Safeguard needs improvement in deployment and integrating with other products.

Many team members feel that the biggest friction with One Identity Safeguard relates to access requests, session approvals, and policy changes, which require more clicks than expected.

I think One Identity Safeguard is a good product, but it just needs improvement in tech support.

For how long have I used the solution?

I have been using One Identity Safeguard for the last two years.

What do I think about the stability of the solution?

One Identity Safeguard is stable in my network.

What do I think about the scalability of the solution?

Scalability is very good as it can easily scale with organizational growth by adding more virtual appliances, and it handles increasing users, servers, and privilege accounts without any major performance issues.

How are customer service and support?

Customer support is really good.

Which solution did I use previously and why did I switch?

I previously used a different tool for managing, but it lacked centralized control, proper auditing, and security features.

How was the initial setup?

The deployment of the solution took around two to four weeks due to initial setups, integrations, and policy configurations.

End users need a minimum of two to three weeks to understand the solutions.

What was our ROI?

I have seen a return on investment in both money saved and time saved.

I have experienced noticeable time savings and some indirect cost benefits, specifically in that access provision has reduced from hours to minutes, requiring less manual effort, and the cost impact has been mitigated due to fewer security incidents and audit issues.

What's my experience with pricing, setup cost, and licensing?

The pricing, setup cost, and licensing are not the cheapest, but they offer strong security features that justify the cost.

The license is usually based on the number of user accounts, which is straightforward to understand, and the setup cost is good and reasonable.

Which other solutions did I evaluate?

Before choosing One Identity Safeguard, I evaluated BeyondTrust.

What other advice do I have?

My advice for others considering One Identity Safeguard would be to plan and execute the deployment properly during the implementation phase.

I have given this review a rating of 8.


    Nitin

Privileged access has become controlled and monitoring now supports security and compliance

  • April 17, 2026
  • Review provided by PeerSpot

What is our primary use case?

I use One Identity Safeguard mainly for managing and securing privileged access like controlling admin accounts and monitoring sensitive sessions.

For example, I use One Identity Safeguard to grant temporary admin access to users and track their sessions to make sure everything is secure.

One Identity Safeguard also helps with password vaulting and automatic rotation.

This means we don't have to share or manually manage sensitive credentials.

We are using One Identity Safeguard in a hybrid setup, partly on-premises for sensitive access control and partly integrated with cloud services.

We have integrated One Identity Safeguard with our cloud environment on Microsoft Azure and also with some internal DevOps workflows so privileged access can be controlled during the deployments and automation tasks.

It was moderately easy overall to integrate One Identity Safeguard with our DevOps workflows and Microsoft Azure environment.

Microsoft Azure integration was pretty smooth, but the DevOps workflow setup took a bit more effort to configure and test properly.

What is most valuable?

I think the best features One Identity Safeguard offers are strong password vaulting with auto-rotation, session monitoring and recording, and real-time alerts that help catch suspicious activity quickly.

The real-time alerts from One Identity Safeguard are pretty reliable.

Alerts come in quickly, and they have helped us respond faster to suspicious activity before it becomes a bigger issue.

The session recording and audit logs from One Identity Safeguard really stand out.

They make tracking and reviewing activity easy.

But it would be even better if the UI was a bit more user-friendly.

One Identity Safeguard has improved security a lot by controlling privileged access, and it also reduced risks since all sensitive activities are monitored and logged.

We have seen fewer security risks since access is controlled and monitored by One Identity Safeguard, and it definitely helped with compliance because all actions are logged and easy to audit.

What needs improvement?

I think One Identity Safeguard could be improved by making the UI more user-friendly and simplifying some configurations, as it can feel a bit complex at times.

Reporting with One Identity Safeguard could be more detailed and easier to customize, and better integration with other tools would make the overall experience smoother.

For how long have I used the solution?

I have been using One Identity Safeguard for around one and a half years.

What do I think about the stability of the solution?

One Identity Safeguard is generally stable and reliable in day-to-day use.

What do I think about the scalability of the solution?

One Identity Safeguard is generally considered highly scalable and enterprise-ready.

How are customer service and support?

Customer support for One Identity Safeguard is generally good and knowledgeable, especially when it comes to technical issues and enterprise deployments.

Which solution did I use previously and why did I switch?

Earlier we were using a mix of manual access management and some basic PAM tools, but we switched to One Identity Safeguard for better automation, strong security controls, and easier auditing.

How was the initial setup?

Admins needed a bit of training for One Identity Safeguard, maybe a few days to get comfortable with policies and setup.

But for end-users, it was pretty minimal since most of it runs in the background.

It was mostly seamless for privileged users after deploying One Identity Safeguard.

They just had to follow the new access request process, and after a short adjustment period, it didn't really disturb their daily work.

What about the implementation team?

We didn't purchase One Identity Safeguard through the Microsoft Azure Marketplace.

We went through a direct vendor licensing process.

What was our ROI?

We have seen ROI with One Identity Safeguard mainly in reduced manual efforts and faster access handling.

Roughly around 40 percent less time spent on managing privileged accounts, and also fewer security incidents that need manual intervention, which saved both time and operational costs.

What's my experience with pricing, setup cost, and licensing?

Pricing for One Identity Safeguard was on the higher side but justified by the security features.

Setup cost was manageable and licensing is typically subscription-based per appliance or capacity, which makes it easier to scale but can add up in larger environments.

Which other solutions did I evaluate?

We did evaluate a few options before finalizing One Identity Safeguard. The main ones we looked at were CyberArk, BeyondTrust, and several others.

CyberArk was very strong but felt a bit complex and costly, and BeyondTrust was solid for remote access and monitoring.

In the end, we chose One Identity Safeguard because it fit better with our hybrid setup and integration needs.

What other advice do I have?

One Identity Safeguard is a solid and reliable PAM solution in my experience.

My advice would be to start with a clear access model before you deploy One Identity Safeguard. I would rate this review an 8 out of 10.


    Prithviraj kallurkar

Centralized controls have transformed privileged access and streamlined audit workflows

  • April 16, 2026
  • Review provided by PeerSpot

What is our primary use case?

I am familiar with One Identity Safeguard and am also evaluating it for the organization.

For our primary use case for evaluating One Identity Safeguard, we aim to strengthen privileged access management across our environment. Currently, we are looking to improve how we control, monitor, and secure access to critical systems, especially for admin and high-privilege accounts. Additionally, as our infrastructure is a mix of on-premises and cloud, we need a solution that can provide centralized visibility and control across the environment. One Identity Safeguard aligns well with that need while also helping us streamline access workflows and improve audit readiness.

A good example of a scenario where One Identity Safeguard would really help my team is managing third-party vendor access. When external vendors need access to our critical servers for maintenance or troubleshooting, it often involves sharing credentials or giving standing access, which increases risk. With One Identity Safeguard, we could provide temporary, just-in-time access without exposing actual passwords. The vendor would request access, get approval, and then log in through One Identity Safeguard. Their entire session would be monitored and recorded. This helps us in multiple ways: no credential sharing, full visibility of what actions were performed, and an audit trail for compliance. Once the task is done, access is also automatically revoked. In this scenario, One Identity Safeguard directly reduces security risk while also making the process more controlled and compliant.

There is one important scenario related to internal privileged user management that I would like to add about my use case for One Identity Safeguard. For example, our system administrators currently have standing access to central servers. With One Identity Safeguard, we can shift to a just-in-time access model where admin rights are granted only when needed and for a limited time. This significantly reduces the risk of misuse or accidental changes. Another scenario would be audit and compliance. During audits, it is often challenging to provide clear evidence of who accessed what and what actions were performed. One Identity Safeguard helps by maintaining session recordings and detailed logs, making audits much smoother and faster.

What is most valuable?

In my opinion, the best features of One Identity Safeguard are the ones that directly improve both security and operational control. First, privileged session monitoring and recording stand out. One Identity Safeguard can capture and replay entire sessions with searchable logs, even down to the commands and screen activity. This is extremely useful for audits and incident investigations. Second would be secure password vaulting with automated rotation, which is a big advantage. It eliminates manual credential handling and reduces the risk of password exposure while enforcing strong security policies. Another key feature is real-time monitoring and threat detection. One Identity Safeguard can detect suspicious behavior during a session and even block unsafe actions, which adds a proactive security layer rather than just reactive logging. Finally, centralized privileged access governance is an essential feature. Bringing password management, session control, and analytics into a single platform makes it much easier to manage hybrid environments effectively.

Session monitoring and recording, even from demos and industry feedback, has the biggest impact on audits in terms of clarity and speed. Instead of relying only on logs or user statements, with One Identity Safeguard, I can actually replay a full session, see exactly what commands were run, what changes were made, and in what sequence. During an audit or investigation, instead of spending hours correlating logs, my team can directly pull the session recording as evidence. It reduces ambiguity, speeds up root cause analysis, and makes compliance reporting much stronger and more defensible. For example, if there is any suspected misconfiguration or data change, I do not have to guess; I can literally watch what happened.

For day-to-day operations, automated password rotation in One Identity Safeguard shifts us from a manual, reactive process to a fully automated, policy-driven approach. Today, IT teams often spend time resetting privileged passwords, handling access requests, and responding to potential credential exposure. With automation in place, most of the effort is eliminated. Passwords are rotated automatically after each use or on a scheduled basis, so there is no need for frequent manual resets. In fact, it does not just reduce how often we reset passwords; it removes the need for manual resets almost entirely. In terms of workload, this means fewer support tickets related to password issues, less coordination between teams for credential sharing, and reduced human error. The IT team can shift focus from routine tasks to more strategic work like security improvements and system optimization. One important operational change is that users no longer handle actual credentials. They request access, get approved, and One Identity Safeguard manages everything in the background. That is a big shift in thinking, but it slightly improves security.

What needs improvement?

The feature I think is a bit underrated in One Identity Safeguard is the approval workflow and access request system. It might sound basic, but having a structured, policy-based approval process really improves governance. It ensures that every privileged access is justified, approved, and tracked, which is especially useful in large teams where accountability can get blurred. Another underrated aspect is integration flexibility. One Identity Safeguard can integrate with directories, SIM tools, and hybrid environments, making it easier to fit into existing infrastructure rather than focusing on a complete overhaul. If I had to point out something that could be improved or is sometimes seen as missing, it would be user experience or UI. Some users feel it could be more intuitive, especially for non-technical users. Initially, deployment complexity, as with many PAM solutions, means setup and fine-tuning policies can take time. Advanced analytics depth is another area where, while good, some organizations compare it to competitors that offer more mature, AI-driven insights. Overall, One Identity Safeguard is very strong in core PAM capabilities such as session control and credential security, but there is room to improve usability and advanced analytics.

One area where the UI in One Identity Safeguard could improve is navigation and ease of use, especially for first-time or non-technical users. For example, when a user wants to request access to a resource, the process can feel a bit layered. Users may need to navigate through multiple menus to find the right asset or account. A more guided, simplified request flow, such as a single dashboard with request access front and center, would make it more intuitive. Another example is session management and monitoring views. While the data is very powerful, the interface can sometimes feel dense. There is a lot of information on screen. For someone who just wants to quickly check activity sessions, review a recording, or identify risk behavior, it could benefit from a more clean dashboard-style layout with clear visuals highlighting instead of heavy tables. Also, in policy configuration, setting up rules for access or password rotation can be a bit complex. It often requires understanding multiple parameters and dependencies. A more wizard-based setup or user-friendly policy builder would make it easier, especially for teams that are not deeply specialized in PAM.

While One Identity Safeguard is strong in core PAM capabilities, there are a few areas where it could be improved in the future. One area is deeper integration, especially with modern cloud-native and DevOps tools. While it integrates well with traditional infrastructure, tighter, more seamless integration with platforms such as CI or CD pipelines or container environments could make it even more relevant for evolving architecture. Another improvement could be in advanced analytics and AI-driven insights. The current monitoring and alerting are solid, but having behavior analytics with more predictive capabilities, such as identifying malicious behaviors before they become risks, would add a strong proactive security layer.

From a documentation perspective, it would be helpful if there were more real-world use cases and step-by-step implementation examples. Sometimes the current documentation feels a bit too feature-focused, and adding practical scenarios would make onboarding easier. Regarding training, more structured learning paths or short guided tutorials for different user levels, from beginners to advanced, would be helpful.

For how long have I used the solution?

I have been using One Identity Safeguard for a year now.

What do I think about the stability of the solution?

Overall, we have seen good stability and strong scalability with One Identity Safeguard, especially after the initial tuning phase. Once the system was properly deployed and integrated, it has been very reliable in day-to-day operations. We have not experienced any major unplanned outages in production. Most issues, when they occurred, were related to initial configuration changes or network level dependency. In terms of downtime, we only see planned downtime during upgrades or maintenance windows. Even those were manageable because we schedule them during off-peak hours. The system supports clustering or redundant configuration, so access can often continue through other nodes depending on the setup. Overall, downtime impact has been minimal.

What do I think about the scalability of the solution?

One Identity Safeguard has met our needs well as the environment has grown. As we added more privileged accounts, systems, and user groups, we were able to scale by expanding the virtual appliance footprint and clustering. The platform is designed to support horizontal scaling, so adding capacity is relatively straightforward without redesigning the entire architecture.

How are customer service and support?

I have had to reach out to One Identity customer support a few times, mainly during the initial development phase or for a couple of integration-related queries. Overall, the experience has been decent to good, but it varies depending on the type of issue. For critical or well-defined technical issues, especially around configuration or known product behavior, the support team has been quite effective. They have provided clear guidance and documentation references, and in some cases, helped us resolve issues within a reasonable timeframe. Overall, the responsiveness from the technical side has been generally good, and the knowledge of the support team has been useful. Resolution time has been good for common use issues but slow for complex or custom scenarios, and handling escalations has been manageable.

Which solution did I use previously and why did I switch?

Previously, we used a more basic PAM approach built around a legacy vaulting solution combined with manual approval workflows, ticket-based access, and shared admin controls. We switched mainly because of limited access visibility and auditing, too much manual effort, weak hybrid or cloud integration, especially as we moved more workloads to Azure, and scaling challenges that arose as the number of privileged accounts and systems increased.

How was the initial setup?

The initial deployment of One Identity Safeguard on virtual appliances took roughly six to eight weeks end-to-end, including planning, setup, integration, and user rollout. The process was done in phases. First, we set up the core One Identity Safeguard appliance in a controlled environment and integrated it with our identity sources such as Active Directory. After that, we configured privileged accounts, session policies, and audit requirements. We also ran a pilot with a small group of administrators to validate session recording, access workflows, and reporting before going wider. In terms of disruption, it was minimal for most privileged users, but not completely zero. During the pilot phase, there were some adjustments needed because users had to get used to logging in through One Identity Safeguard gateways instead of directly accessing the system. Overall, the phased rollout approach helped reduce disruption significantly, and most users adapted quickly after the initial onboarding period.

What about the implementation team?

For the administration team, we needed more structured training, roughly a few days of focused hands-on sessions, plus some internal sandboxing practice. This covered things such as configuring safe rules, policies, integration with Active Directory, and audit logs. The learning curve is a bit steep initially because One Identity Safeguard has a lot of depth, especially around policy design and access control models. For end users, the training was relatively light. Most of it was around how to access systems through One Identity Safeguard gateways, how session recording works, and what changes in other login workflows. A short one to two-hour walkthrough session plus quick reference guides were usually enough for them to get comfortable with it.

What was our ROI?

Overall, we have seen a clear ROI from One Identity Safeguard, mostly in the form of time savings, reduced manual effort, and improved audit efficiency rather than just direct headcount reduction. In terms of time saved, one of the biggest gains is the privileged access workflow, such as password rotation and session approvals. What used to require manual coordination or admin intervention is now largely automated. This has noticeably reduced day-to-day operational overhead for the infrastructure team, amounting to multiple FTE days per week after deployment. From a security and compliance standpoint, the ROI is more evident. Session recording and audit trails have reduced the time spent preparing for audits and investigating incidents. Instead of manually reconstructing activity, everything is already logged and searchable, which has improved response time during internal reviews.

What's my experience with pricing, setup cost, and licensing?

We evaluated the pricing and setup cost as part of the overall deployment, and as with most enterprise PAM solutions, it is not cheap, but it is fairly aligned with what you get in terms of capability and security coverage. From a licensing perspective, One Identity Safeguard follows a custom enterprise model, typically based on factors such as the number of privileged accounts, users, and the modules you deploy. It is negotiated based on scope and scale rather than a simple per-user licensing. In our case, the initial setup cost was higher than expected, mainly because it was not just a software license; it included infrastructure planning, virtual appliance development, integration work, and security configuration.

Which other solutions did I evaluate?

Before choosing One Identity Safeguard, we did evaluate a few other enterprise PAM solutions. The main ones were CyberArk Privileged Access Manager and BeyondTrust Privileged Access Manager. We compared them mainly on session recording and monitoring capabilities, ease of deployment in hybrid environments, and integration with Active Directory. One Identity Safeguard stood out because it offered a strong balance of deep session monitoring and solid integration with our identity stack, along with easier appliance-based development. It aligned well with our internal compliance and auditing requirements without adding too much operational complexity. Overall, the decision came down to fit with our hybrid infrastructure, ease of control, scalability, and compliance readiness rather than just feature comparison.

What other advice do I have?

Even during the evaluation phase, One Identity Safeguard has shown clear positive impacts across key areas in my organization. From a security posture perspective, the biggest improvement is the elimination of direct credential exposure. Instead of sharing admin passwords, access is brokered through One Identity Safeguard, which significantly reduces the risk of credential misuse or leakage. In terms of audit readiness, we have seen a big improvement in visibility. The ability to track sessions and maintain detailed logs means we can quickly answer questions such as who accessed what, when, and what actions were performed. Even in a pilot, this level of transparency makes audits much more straightforward. On the operational efficiency side, processes such as access requests and approvals have become more structured instead of informal or manual coordination. Everything follows a defined workflow, which reduces delays and confusion.

Since we are still in the evaluating or pilot phase of One Identity Safeguard, we do not have long-term production metrics yet, but we have observed some early indicators and rough estimates. For example, in terms of operational efficiency, we have seen a noticeable drop of roughly thirty to forty percent in password-related support requests within the pilot group, mainly because users no longer need to request or manage credentials manually. From an audit perspective, the time required to gather access logs and evidence has reduced significantly. Tasks that earlier took hours, such as correlating logs, can now be done in minutes using session recordings. We estimate around fifty to sixty percent reduction in audit preparation time for privileged access reviews. On the security side, while it is early to quantify incidents, we have effectively reduced the risk surface by eliminating shared credentials in the pilot scope. That alone is a major improvement, even if it is not directly measurable yet. Earlier estimates show thirty to forty percent fewer password-related tickets and fifty percent faster audit preparation, along with reducing risk and eliminating shared credentials.

The integration of One Identity Safeguard has had a clear positive impact on both security and operational efficiency. From a security perspective, the most noticeable improvement is tighter controls over privileged access across systems. For example, before One Identity Safeguard, some privileged accounts, especially service accounts used in automation, had unrestricted access. Just-in-time access and session recording have significantly improved visibility. Now, even when an automation job or admin session runs, we can trace exactly what was accessed and when.

My advice for others looking into using One Identity Safeguard is that it offers a positive ROI overall, but it is mostly reflected in time savings, operational efficiency, and risk reduction rather than a single direct cost metric. In practical terms, the biggest measurable benefit has been time saved for IT and security teams. Tasks such as privileged access approvals, password rotation, and session audits are now largely automated or centralized. Another key area is auditing and compliance efficiency. Before One Identity Safeguard, preparing for audits required collecting logs from multiple systems and manually correlating activity. Now, session records and searchable audit trails make this process faster, saving a significant amount of effort during compliance cycles. Overall, the ROI is very real, but it shows more in time saved, reduced risk, and smoother operation rather than a direct headcount or cost-cutting figure.

Before wrapping up, I would say that my overall experience with One Identity Safeguard has been strong and reliable for our needs, especially for privileged access control in a hybrid environment. What stands out most is the visibility and control it brings to privileged activity, having full session recording and centralized access workflows. It has also helped us move away from fragmented manual processes towards a more structured and governed access model, which becomes very important as the environment scales. Overall, it has been a solid investment from both a security and operational standpoint. I would rate my overall experience with One Identity Safeguard as a nine out of ten.


    Abhinandan Yadav

Privileged accounts have been secured and audits are now faster with automated controls

  • April 15, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case of One Identity Safeguard is to manage and secure privileged access in our IT environment. We use it for password vaulting, automatic credential rotation, and monitoring administrator sessions on servers, network devices, and critical systems.

What is most valuable?

The best features of One Identity Safeguard are password vaulting and automatic rotation, session monitoring and recording, real-time alerting and threat detection, just-in-time and least privilege access, and centralized management and reporting.

One Identity Safeguard's real-time alerting helps us quickly identify any unusual or unauthorized activity, such as failed login attempts or access outside of business hours. For example, if someone attempts to access a privileged account unexpectedly, we get an alert immediately and can take action.

One Identity Safeguard has had a very positive impact on our organization. It has significantly improved our security by protecting privileged accounts, which are a main target for attacks. With features such as password vaulting and session monitoring, we now have full control and visibility over admin activities. It also helps with compliance and auditing. All user actions are recorded and easily available for review. This makes audits much faster and more efficient.

What needs improvement?

The UI can be more user-friendly. The initial setup is slightly complex. Integration with some tools can be improved.

A few additional improvements could make One Identity Safeguard even better. Along with the UI, the reporting could be more customizable to filter for specific reporting needs. Sometimes it takes extra steps to get the exact report we want.

For how long have I used the solution?

I have been using One Identity Safeguard for the last two years.

What do I think about the stability of the solution?

One Identity Safeguard is now stable.

What do I think about the scalability of the solution?

The scalability of One Identity Safeguard is very good. The solution supports clustering and load distribution, so as demand increases, we can expand the environment without major changes.

How are customer service and support?

Customer support for One Identity Safeguard is generally good. In our experience, the support team is knowledgeable and able to resolve most issues.

Which solution did I use previously and why did I switch?

We were using a basic manual approach and some native tools for managing privileged access. However, they lacked centralized control, proper auditing, and security features. We switched to One Identity Safeguard to get a more secure and centralized solution with features such as password vaulting, session monitoring, and automated credential management.

How was the initial setup?

The initial setup was quick, but additional time was needed for configuration. There was minimal disruption because we implemented it in phases. Initially, a small group of users was onboarded for testing, and once everything was stable, we gradually rolled it out to other users.

The integration process for One Identity Safeguard was moderate. Basic integrations, such as Active Directory and standard systems, were relatively straightforward and well-documented. However, the more advanced integrations required some custom setup, additional configuration, and some troubleshooting. Overall, it is not very difficult, but it does require some technical knowledge and planning to implement smoothly.

What was our ROI?

We can see a good return on investment with One Identity Safeguard. It has saved a lot of time by automating tasks such as password management and access approvals, which were earlier done manually. It has reduced the workload on our IT team. We have also reduced security risk, which is very important. Additionally, audit preparation time has decreased from hours or days of manual log collection to just a few minutes using the built-in reports.

What's my experience with pricing, setup cost, and licensing?

Our experience with the pricing and licensing of One Identity Safeguard was moderate. The solution is not the cheapest, but it offers strong security features, so the cost is justified. Licensing is usually based on the number of users or accounts, which is straightforward to understand.

Which other solutions did I evaluate?

Before choosing One Identity Safeguard, we evaluated a few other PAM solutions, such as CyberArk Privileged Access Manager and BeyondTrust Privileged Access Management. We compared them based on features, ease of deployment, flexibility, and cost. We selected One Identity Safeguard because it provided a good balance of security features.

What other advice do I have?

My advice to others considering One Identity Safeguard would be to plan the deployment properly and start with a clear understanding of your privileged access requirements.