Sign in Agent Mode
Categories
Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

7 AWS reviews

External reviews

38 reviews
from

External reviews are not included in the AWS star rating for the product.


    Prithviraj

Privileged access has become controlled and auditable while password rotation runs automatically

  • April 26, 2026
  • Review from a verified AWS customer

What is our primary use case?

One Identity Safeguard's main use case in our organization is to manage and secure privileged access across our environment, primarily controlling administration access to critical systems like servers, databases, and network devices. It helps us enforce secure password management and provides session monitoring, allowing us to track what privileged users are doing in real time or review it later for auditing purposes. In day-to-day operations, we use it to grant temporary access to admins, rotate credentials automatically, and ensure that no one has standing privileged access longer than necessary. It has become an important tool for maintaining compliance and reducing the risk of unauthorized access.

Recently, we faced a situation where one of our database servers needed urgent troubleshooting from a senior admin. Instead of sharing credentials or giving permanent access, we used One Identity Safeguard to grant temporary privileged access. The admin requested access through the system, it got approved, and One Identity Safeguard automatically provided the credentials without exposing the actual password. The entire session was recorded, which gave us confidence from a security and audit perspective. What made a difference was that once the task was completed, the access was automatically revoked and the password was rotated or changed, alleviating concerns about lingering access or manual cleanup. This made the entire process much more secure and streamlined compared to previous methods.

What is most valuable?

The best features of One Identity Safeguard include several standout capabilities we rely on heavily. The biggest feature for us is privileged session monitoring and recording, which gives full visibility into what admins are doing, and the ability to replay sessions later is particularly useful for audits or troubleshooting. It enhances security since everything is tracked and traceable. Another key feature is secure password management with automatic rotation, eliminating the need for manual credential management. The system handles password changes regularly, significantly reducing risk. We also find the access request and approval workflow very valuable. Instead of informal access sharing, everything goes through a structured process that maintains control and compliance. We would also highlight real-time monitoring and alerting; if any suspicious activity occurs during a session, it can be flagged or halted immediately, adding an extra layer of protection. Overall, the combination of visibility, control, and automation makes it very useful, focusing on securing access while making the process manageable and auditable.

Beyond the main use case, One Identity Safeguard has integrated into our daily operations for access control, not just for high-risk situations. We use it routinely for managing privileged sessions, especially for admins who need temporary access to different systems. One standout aspect is how it enforces a structured workflow. Instead of informal access requests over email or chat, everything goes through an approval process, keeping things clean and auditable. It reduces dependency on individuals since credentials are not shared manually anymore, fostering better security habits across the team. People are more aware of access policies, and there is a clear accountability trail for every action. It is not just a tool we use occasionally; it is essential to our regular IT and security processes.

There are smaller features worth noting as well. One we find particularly useful is the ability to launch sessions directly through the platform without exposing credentials, allowing admins to connect through One Identity Safeguard without needing to see the password. Another beneficial feature is the session search and indexing; if an investigation is necessary, we can quickly identify specific sessions based on users, time, or activity rather than manually sifting through logs. This capability has been extremely helpful during audits or incident reviews. Furthermore, the policy-based access controls are quite flexible. Once set up properly, access governance operates automatically in the background, reducing manual effort. Integration with Active Directory services facilitates onboarding and management, avoiding the need to recreate everything from scratch. It is these smaller practical features that enhance usability on a daily basis, not just in audits or critical situations.

What needs improvement?

One Identity Safeguard works well for us overall, but there are several areas where improvements could be made. The initial setup and deployment can be quite complex, particularly if you are new to privileged access management tools, and understanding the architecture and configuration requires time. A more guided setup or simpler onboarding would be beneficial. The user interface could also be improved; while functional, it is not always intuitive, especially for new users. A more modern and user-friendly UI would facilitate daily operations. We have also found that reporting and customization of reports could be more flexible; although the data is available, it sometimes requires extra effort to obtain the desired format or detail level for audits or management reporting. Additionally, customer support response times could improve, particularly for non-critical issues; while the support team is knowledgeable, faster turnaround would make a difference. Overall, these are not deal breakers, but enhancing these areas would make the product more efficient and easier to adopt.

We would appreciate more automation and smarter workflows. While the approvals process functions effectively, adding more flexibility, such as conditional approvals or risk-based access, would enhance its strength. We also believe that better dashboarding and visibility would help; while data can be obtained, having customizable or real-time dashboards for aspects like active sessions, risk alerts, or access trends would allow for a quick overview without requiring in-depth report digging. Overall, these enhancements do not indicate major gaps, but they would improve usability and give the product a more modern and future-ready feel.

For how long have I used the solution?

I have been using One Identity Safeguard for a year.

What do I think about the stability of the solution?

One Identity Safeguard has proven to be stable and reliable within our environment. Once we managed to get past the initial setup and configuration, it operates consistently without major issues or downtime. Day-to-day tasks such as access requests, session monitoring, and password rotation function smoothly. It appears designed as a dependable enterprise-grade solution, reflecting well in its production performance. Similar to most complex security tools, we encountered minor issues during deployment and fine-tuning, but none that significantly impacted operations. Stability has not been a concern; it has been a reliable part of our environment.

What do I think about the scalability of the solution?

One Identity Safeguard has managed scalability effectively in our experience. As our environment grows—adding more servers, users, and privileged accounts—we have scaled its use without significant complications since we are using the virtual appliances model. Scaling primarily involves allocating additional resources or deploying more instances as needed. Platform-wise, it is designed to support enterprise-scale environments, capable of managing large numbers of sessions and users as long as it is correctly sized and configured. However, we have noticed that performance can vary based on how it is deployed; the type of workload and the number of active sessions influence capacity. Proper infrastructure planning is therefore crucial. Overall, it has adapted to our growth without necessitating major redesigns, requiring only resource tuning and scaling as demand escalated. We would say it is highly scalable, particularly for mid to large enterprise environments, provided the architecture is well planned.

How are customer service and support?

Overall, our experience with One Identity Safeguard support has been quite positive. The support team is generally knowledgeable and technically adept, particularly when addressing complex issues. Whenever we raise critical tickets, they guide us appropriately and provide workable solutions. From our observations, once we connect with the right support engineer, the quality of assistance is high. The primary area for improvement is response speed and escalation, which aligns with general user feedback, noting strong support but inconsistent response times. Overall, we would assess the support as reliable and knowledgeable, although there is scope for improvement regarding response consistency.

Which solution did I use previously and why did I switch?

Before transitioning to One Identity Safeguard, we mainly relied on a mixture of manual processes and basic access control tools, using native solutions such as Active Directory for access management along with internal processes for handling privileged credentials. We decided to switch due to scalability and security concerns; the existing approach was inadequate, leading to challenges with shared credentials, limited visibility of privileged sessions, and insufficient audit trails. It required substantial manual effort to manage and track access. After evaluating several dedicated PAM solutions, we selected One Identity Safeguard because it offered a more comprehensive and centralized approach, highlighting features such as session recording, automated password rotation, and structured access workflows. The move stemmed from our need for improved security, compliance, and operational efficiency as our environment expanded.

How was the initial setup?

The initial deployment took us around three weeks. Setting up the virtual appliances was relatively fast, but a significant amount of time went into configuration, integrating it with existing systems such as Active Directory, and defining access policies. We also allocated time to test different use cases and ensure everything operated as expected before broader rollout. While the technical setup was quick, the overall time was largely influenced by planning, integration, and fine-tuning.

Overall, the deployment was fairly smooth, though there was a slight adjustment period for our privileged users. Initially, some admins found it somewhat disruptive as they were accustomed to direct access, and now had to use an approval workflow in One Identity Safeguard to initiate sessions. There was a small learning curve and some resistance initially; however, once they became familiar with the process, things settled down quickly. Many users even began appreciating the simplified access requests and the removal of the need to manage or remember privileged credentials. We facilitated the transition by implementing a phased rollout and providing basic training, which helped minimize disruptions. While there was initial friction, it was temporary, and overall adoption progressed smoothly.

What about the implementation team?

The team managing One Identity Safeguard required a moderate level of training. We spent several days reviewing the architecture, configuration, and best practices, followed by a couple of weeks of hands-on learning during the implementation phase. While the tool is not overly complex, understanding how to design privileged access workflows and policies is essential for maximizing its use. For end users, particularly admins just needing to request and use access, the training requirements were minimal; a short session or demonstration sufficed to illustrate how to request access and launch sessions through the platform. Most people adapted quickly after one or two uses. Overall, more effort is needed on the admin side, while regular users find it quite straightforward.

What was our ROI?

We have seen a return on investment since implementing One Identity Safeguard. From a time-saving perspective, access provisioning has accelerated dramatically; what used to take twenty to thirty minutes per request can now be completed in just a few minutes, which accumulates significantly across multiple daily requests. Overall, we have likely reduced admin effort related to access management by forty percent, and from an operational efficiency standpoint, we no longer need to manage or rotate privileged credentials manually. This shift saves a considerable amount of ongoing effort and diminishes dependency on a few key individuals. We have also experienced indirect ROI by reducing security risk; quantifying it precisely is challenging, but eliminating shared credentials and enforcing session monitoring has materially lowered our exposure to potential incidents, which could be costly if they occurred. In terms of audit compliance, we have cut preparation time by approximately forty to fifty percent since most required data is readily available through logs and sessions. While headcount has not decreased, it has allowed our teams to focus more on strategic tasks instead of manual access management. Therefore, the ROI stems from a combination of time savings, enhanced security posture, and streamlined audit processes rather than direct cost reduction.

What's my experience with pricing, setup cost, and licensing?

Our pricing and licensing experience was fairly typical for an enterprise security solution. It is not the cheapest option available, but it aligns with the level of security and control it delivers. The initial setup cost was moderate; we did not incur major hardware expenses as we opted for virtual appliances, but there was still some investment needed for configuration and internal resources. Licensing is structured and scalable, which is beneficial as the environment grows, although it can seem complex initially to fully understand what is included and how to size it appropriately, requiring close collaboration with the vendor during that phase. From a value perspective, we see it as justified because it replaces many manual processes and mitigates security risks. However, organizations should plan their licensing thoughtfully to avoid over or under-provisioning. Overall, it represents a solid investment, although entering with a clear understanding of requirements is essential for maximizing value.

Which other solutions did I evaluate?

Before selecting One Identity Safeguard, we assessed a few PAM solutions, specifically CyberArk and BeyondTrust. Both are reputable solutions and widely recognized in the market. CyberArk is particularly feature-rich, but we found it somewhat complex and costly relative to our requirements. BeyondTrust was also a strong contender, especially regarding usability, but in our case, One Identity Safeguard presented a better balance between functionality, ease of use, and overall cost. We also took into account how well One Identity Safeguard integrated into our existing environment and the speed at which we could deploy it compared to alternatives. Overall, the decision was not due to shortcomings of the other tools, but rather finding the right fit for our specific needs.

What other advice do I have?

My main advice for those considering One Identity Safeguard is to carefully plan your implementation beforehand. This is not a plug-and-play tool; you will extract the most value by clearly defining your privileged access policies, workflows, and use cases in advance. We also highly recommend conducting a proof of concept in your environment to test real scenarios, particularly edge cases such as legacy systems or service accounts, as challenges often arise in these areas. This testing approach is strongly advocated by practitioners since real-world scenarios provide a clearer picture than demos. Additionally, invest time training your admins and establishing clear processes. The tool is powerful, but it works most effectively when your team understands how to use it properly. From a technical standpoint, ensure you size and secure your deployment accurately—planning for storage, access restrictions, and network setup, especially in cloud environments, is vital. Overall, it is a robust solution whose success hinges on effective planning, implementation, and alignment with your organization's processes. I would rate this product an eight out of ten.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    Aditi Komol

Centralized controls have transformed privileged access and now ensure accountable daily operations

  • April 25, 2026
  • Review provided by PeerSpot

What is our primary use case?

One Identity Safeguard is used primarily in our day-to-day operations to manage and secure privileged access across our IT environment by controlling, monitoring, and auditing all administrative sessions. Instead of sharing static credentials, users request access through One Identity Safeguard, which grants time-bound privileged sessions with proper approval workflows. It automatically records and monitors these sessions for security and compliance purposes, while also securely storing and rotating passwords for critical systems, reducing the risk of credential misuse. Overall, it helps us to enforce strong governance, maintain accountability, and ensure that all sensitive access is controlled, traceable, and aligned with our security policies on a daily basis.

A recent example of using One Identity Safeguard was when a team member needed temporary administrative access to a production server for troubleshooting. Instead of sharing credentials directly, they raised a request through One Identity Safeguard that went through an approval workflow. Once approved, they were granted a time-limited session without ever seeing the actual password. The entire session was recorded and monitored in real-time. After the task was completed, access was automatically revoked and the password was rotated. This ensures security, accountability, and compliance without any manual intervention or risk of credential misuse.

In addition to the core use case, One Identity Safeguard fits seamlessly into our workflow by acting as a central control point for all privileged activities. This means every sensitive access request, whether for servers, databases, or network devices, follows a standardized and secure process with approvals, session monitoring, and automatic credential management. It has significantly reduced the need for manual password sharing and tracking, while also improving coordination between teams because everyone follows the same access process, making our operations more structured, secure, and audit-ready without slowing down productivity.

What is most valuable?

One Identity Safeguard's best features that stand out the most are its strong combination of password vault, session monitoring, and automated access control. It securely stores and automatically rotates privileged credentials, so users never see the actual password, which greatly reduces security risk. The session recording and real-time monitoring provide complete visibility into all administrative activities, making auditing and compliance much easier. Another key feature is its approval-based workflow system that ensures every privileged access request is controlled and time-bound, along with real-time alerting for threat detection that helps quickly identify suspicious behavior. Overall, these features work together to provide a highly secure, transparent, and well-governed privileged access environment that fits seamlessly into daily operations.

Session monitoring and real-time alerting have improved our security by giving full visibility into admin activities. For example, we once detected an unusual command during a privileged session and could immediately review the live session recording and take action, which helped prevent a potential threat. Overall, it has made our approach more proactive by allowing us to monitor, detect, and respond to suspicious behavior instantly, instead of reacting after an issue occurs.

One Identity Safeguard has had a strong positive impact on our organization by significantly improving security, control, and accountability around privileged access. We no longer rely on shared or static credentials and instead use controlled, time-bound access with full session monitoring, which has reduced the risk of misuse and insider threats. It also makes audits much easier because every activity is recorded and traceable. Operationally, it has streamlined workflows by automating password management and access approvals, saving time for the IT team and creating a more structured, secure, and compliant environment overall.

What needs improvement?

One Identity Safeguard can be improved by making the user interface more intuitive and easier to navigate, especially for new users who may find the initial experience slightly complex. Simplifying the setup and configuration process, which can require technical expertise and time during deployment, would also be beneficial. There is room to enhance its reporting and dashboard customization to provide more flexible, real-time insights without relying on external tools. Improving integration capabilities with modern cloud platforms and third-party applications would make it more adaptable in hybrid environments. Overall, while it is a strong solution, these improvements would make it more user-friendly and efficient to manage.

Beyond the earlier points, better performance optimization and faster load times when dealing with large volumes of session recordings or logs would be valuable. Sometimes searching or reviewing sessions can feel slightly slow. Enhancing alert customization with more granular controls would help reduce noise and focus only on critical security events. More detailed and simplified documentation or in-product guidance would make troubleshooting and advanced configuration easier for teams, especially during initial adoption. These small enhancements would further improve usability and overall efficiency.

For how long have I used the solution?

I have been using One Identity Safeguard for the last one and a half years.

What do I think about the stability of the solution?

One Identity Safeguard is quite stable and reliable, as it consistently handles privileged access management tasks without major disruption. This aligns with user feedback where it is often rated very high for stability, sometimes around 9 out of 10, with minimal downtime and strong performance even in enterprise environments. Although like any system, there can be occasional minor issues such as small bugs or upgrade-related challenges, overall it is dependable and performs smoothly for day-to-day operations.

What do I think about the scalability of the solution?

One Identity Safeguard handles scalability quite well, as it is designed with a flexible architecture that can grow with our organization, supporting additional users, systems, and workloads without major performance issues. Features like clustering and distributed deployments help manage load effectively as the environment expands. Overall, it scales smoothly for enterprise use with only minor challenges, such as needing proper planning and resource allocation when scaling to very large environments.

How are customer service and support?

Customer support for One Identity Safeguard has been generally good in our experience, as the support team is knowledgeable and helpful in resolving standard issues, especially during setup and troubleshooting. However, there have been occasional delays in response time for more complex cases, which aligns with some user feedback where support is effective but could be improved in responsiveness and consistency for critical issues. Overall, our experience has been positive, but with slight room for improvement in faster turnaround for advanced or urgent problems.

Which solution did I use previously and why did I switch?

Before using One Identity Safeguard, we relied on manual credential management and some basic tools within Microsoft Active Directory, but we switched because those lacked proper security, auditing, and centralized control for privileged access, which One Identity Safeguard handles much more effectively.

How was the initial setup?

The deployment of One Identity Safeguard in our organization was relatively moderate in terms of timeline. The initial setup of the virtual appliances and basic configuration was completed within a few days, but the overall deployment, including integration, policy setup, access workflow, and testing, took a couple of weeks to fully stabilize. While the core installation is quick, achieving a fully optimized and production-ready setup requires proper planning and time to align with existing security and operational processes.

What about the implementation team?

We do not have any business relationship with the vendor beyond being a customer, as we use One Identity Safeguard purely for internal privileged access management and security purposes. We are not part of their partner ecosystem, such as a reseller, integrator, or service partner, although we are aware that One Identity Safeguard does offer a structured partner program that includes resellers, service providers, and implementation partners within its global partner network.

What was our ROI?

We have seen a clear return on investment with One Identity Safeguard, as it has reduced manual efforts by around 40 to 50%, improved audit readiness significantly, and saved time on access management tasks, allowing the IT team to focus on more critical work without needing additional resources.

What's my experience with pricing, setup cost, and licensing?

Our experience with pricing, setup cost, and licensing for One Identity Safeguard was generally straightforward, as the licensing model is typically based on the number of users or managed assets, which makes it scalable. The procurement and setup process was smooth with clear guidance from the vendor. Although the overall cost is on the higher side compared to similar tools and some effort was needed to fully understand licensing and the feature inclusion, considering the strong security, automation, and compliance benefits it provides, we found the investment justified with no major challenges during implementation.

Which other solutions did I evaluate?

Before selecting One Identity Safeguard, we evaluated other privileged access management solutions such as CyberArk, BeyondTrust, and Delinea, but we chose One Identity Safeguard because it offered a strong balance of security, ease of use, and integration capabilities suited to our environment.

What other advice do I have?

The training required for One Identity Safeguard was moderate. Administrators needed a more in-depth understanding of policies, session management, and configuration, which took some structured learning and hands-on practice over a few days. For our end-users, the training was fairly simple since they mainly needed to learn how to request access and use approved sessions, which was easy to pick up with basic guidance. Overall, it was not overly complex, but it did require some initial effort for admins to fully utilize the platform effectively.

The deployment of One Identity Safeguard had a manageable impact on our privileged users. There was a slight initial adjustment period where users had to adapt to the new process of requesting access and working through controlled sessions instead of using direct credentials, which caused minor disruption in the beginning. However, with proper communication and training, the transition became smooth. Over time, users actually found it more convenient and secure since they no longer needed to manage or remember privileged passwords. Overall, the deployment did not significantly disrupt operations and quickly became a normal part of the workflow.

Feedback from our team on One Identity Safeguard has generally been positive, especially regarding its strong security features, reliable session monitoring, and the convenience of not having to handle or remember privileged passwords, which has improved both confidence and compliance in daily operations. However, some users have mentioned that the interface can feel a bit complex initially and takes time to get used to. There have been occasional comments about performance being slightly slow when searching session recordings, but overall, the usability is considered good once familiar, and the functionality is highly valued for maintaining secure and controlled access across the organization.

The integration of One Identity Safeguard with systems such as Microsoft Azure and Active Directory was generally manageable but required some planning and technical understanding. The core integrations were fairly straightforward with available connectors and documentation. However, certain configurations, especially around secure credential handling, session policies, and aligning with existing workflows, took additional effort and testing. In some cases, we faced minor challenges with fine-tuning permissions and ensuring seamless automation in DevOps processes. But overall, once properly set up, the integrations have been stable and effective in supporting our security and operational needs.

I would rate this review as an 8 out of 10 overall.


    Twinkle

Centralized controls have improved privileged access security and audit visibility

  • April 20, 2026
  • Review from a verified AWS customer

What is our primary use case?

In our organization, the primary use of One Identity Safeguard is managing and securing privileged access, and we mainly use it to store and protect sensitive credentials like admin passwords, ensuring that they are not exposed or misused. It also helps in monitoring privileged sessions, allowing us to track and audit activities performed by administrators or high-level users. This adds a stronger layer of security and compliance, as all credential access is controlled, recorded, and reviewed when needed. Overall, it plays a key role in protecting sensitive systems and reducing the risk of insider or outsider threats.

A common example of how we use One Identity Safeguard to secure privileged access is when a system administrator needs access to a production server. Instead of sharing or knowing the actual admin password, they request access through One Identity Safeguard, which securely provides a temporary credential for a session without exposing the password. This system automatically records an entire session, including actions performed on the server. If anything unusual happens, such as an unauthorized change or risky commands, the session logs and recording can be viewed by a security team, ensuring that privileged access is tightly controlled, fully monitored, and auditable at all times.

One additional point about our main use case is that we use One Identity Safeguard not just for securing access but also for enforcing strict governance and accountability across teams. For example, we apply role-based access control and approval workflows, so any privileged access request must be approved before it is granted.

What is most valuable?

The best features of One Identity Safeguard mainly revolve around strong security, visibility, and control over privileged access. One of the most valuable features is its password management, where sensitive credentials are securely stored, automatically rotated, and accessed only through a controlled workflow, reducing the risk of misuse. Another standout feature is session monitoring and recording, which captures every action taken during privileged sessions.

The session monitoring and recording feature in One Identity Safeguard has been extremely valuable for our team, especially from a security and compliance perspective. We use it quite regularly whenever an administrator accesses critical systems. Every privileged session is recorded in detail, covering screen activity, commands executed, and user behavior, so we have a complete audit trail. This has helped us quickly investigate incidents, verify actions taken on sensitive systems, and ensure that all activities follow internal policies.

One Identity Safeguard has had a very positive impact on our organization, especially in terms of security, efficiency, and visibility. It has helped us centralize and control privileged access and provided a structured secure approach. As a result, we now have much better visibility into accessing credentialed systems and the actions performed, which has improved accountability and compliance.

One Identity Safeguard has significantly improved accountability and compliance by giving us complete visibility of all privileged activities. Every access requires approval, and a session is logged and recorded, which means we always have a great audit trail of who accessed what and when. This has made internal and external audits much smoother, as we can quickly provide evidence without manually tracking.

What needs improvement?

One Identity Safeguard is a strong PAM solution, but there are definitely a few areas where it could be improved based on practical experience and known limitations. One key area is performance and resource usage, especially when advanced features like session recording or OCR are enabled. These features consume significant CPU and storage, and in some cases, may slow down connections or processing time if not optimized properly. Improving efficiency here would make the platform smoother and more scalable.

One additional improvement that would be helpful in One Identity Safeguard is better integration flexibility with modern cloud and DevOps tools. While it supports many systems, connecting with newer platforms for automation workflows in dynamic environments can sometimes require extra effort or customization.

For how long have I used the solution?

I have been using One Identity Safeguard for two years.

What do I think about the stability of the solution?

One Identity Safeguard is stable.

What do I think about the scalability of the solution?

One Identity Safeguard is highly scalable, and that is a core strength in enterprise environments. It is designed for scale through clustering and a distributed architecture, allowing multiple appliances to work together as a single system. For example, organizations can add multiple One Identity Safeguard appliances to handle an increasing number of users, privileged accounts, and session traffic without impacting performance.

How are customer service and support?

Customer support for One Identity Safeguard has been generally reliable based on our experience. On the positive side, the customer team is knowledgeable and technically strong, especially when dealing with configuration issues, session monitoring, or password-related queries. For standard or well-defined issues, responses are usually helpful and resolve problems efficiently.

Which solution did I use previously and why did I switch?

We evaluated a few other privileged access management (PAM) solutions before implementing One Identity Safeguard, including CyberArk and other enterprise PAM tools in the same space.

How was the initial setup?

The deployment of One Identity Safeguard was relatively quick compared to many other IAM and PAM solutions because it is delivered as a pre-configured appliance, either physical or virtual. The initial setup can be done quite fast, which helps to reduce the time to value.

What about the implementation team?

The deployment of One Identity Safeguard was fairly smooth overall with minimal disruption for privileged users. During the initial rollout, there was a short adjustment period where users had to request access through the system instead of directly using credentials, which slightly changed their workflow. However, once they became familiar with the process, it actually improved their experience by simplifying access and removing the need to remember or manage sensitive passwords.

The training required for One Identity Safeguard was quite manageable and varied by role. For end-users and privileged users, training was minimal, and basic guidance was enough for them to understand how to request access and start sessions since the interface is fairly straightforward for daily use.

What was our ROI?

We have seen a clear return on investment with One Identity Safeguard, mainly driven by time savings, reduced manual effort, and fewer security-related incidents. One of the biggest measurable improvements has been in IT workload reduction. After implementing One Identity Safeguard, we saw a significant drop in manual tasks including password handling, privileged access approvals, and incident troubleshooting.

What other advice do I have?

My advice to others looking into using One Identity Safeguard is that we have seen a clear return on investment, mainly derived from saved operational efficiency and reduced security overhead. A simple way to explain it is time saved, faster administration, fewer security incidents, and efficiency gained.

Overall, One Identity Safeguard stands out as a strong and well-built privileged access management solution, especially for organizations that want tighter control over admin activity without slowing down operations. I would rate this product a nine out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    Ahitesh Anumala

Privileged access has become tightly controlled and audit preparation now runs faster

  • April 20, 2026
  • Review provided by PeerSpot

What is our primary use case?

I mainly use One Identity Safeguard to secure and control privileged access by managing admin credentials, granting time-based access, and monitoring sessions to ensure security and compliance.

For example, when an admin needs access to a production server, they request it through One Identity Safeguard, which grants time-limited access after approval. The system automatically injects the credentials, so the password is never exposed, and the entire session is monitored and recorded. This helps my team maintain security and quickly review activity during an audit.

What is most valuable?

One key benefit of my main use case with One Identity Safeguard is that it helped me eliminate shared admin credentials, which was a major security risk earlier. Now, every access request is tracked and tied to an individual user, improving accountability. It also simplified audits by providing clear session records, which solved a big challenge I previously faced with compliance visibility.

The best features One Identity Safeguard offers include credential injection, session monitoring, and role-based access control. Credential injection ensures passwords are never exposed to users, improving security, while session monitoring and recording provide full visibility and an audit trail of activity. Role-based access helps enforce a least privilege policy, and additional features such as real-time alerts, reporting, and integration with other systems make it a comprehensive solution for managing and securing privilege.

What needs improvement?

I would appreciate more flexibility in reporting and easier customization of dashboards in One Identity Safeguard. While the core features are strong, some advanced configuration can be somewhat complex. Features such as integration are useful but are used less frequently in daily operations compared to credential management and session monitoring. Adding a more intuitive control and simplifying advanced settings would enhance the usability.

One Identity Safeguard could be improved with a more user-friendly interface and simpler initial setup, as the learning curve can be somewhat steep. Enhancing reporting customization and expanding integration with more third-party tools would also add value. Additionally, faster support response times and smoother scalability for large environments would further improve the overall experience.

A specific challenge I faced during the use of One Identity Safeguard was during initial setup and policy configuration, which was time-consuming and required careful tuning to match my environment. At times, navigating advanced settings and generating custom reports also felt less intuitive, which slowed things down. Improving documentation and simplifying these configurations would make the experience much smoother for my team.

For how long have I used the solution?

I have been using One Identity Safeguard for two years.

What do I think about the stability of the solution?

Overall, One Identity Safeguard's authentication service is stable and reliable.

What do I think about the scalability of the solution?

One Identity Safeguard is highly scalable and can support growing environments effectively. It allows me to add more systems and users without major performance issues, and its clustering and load distribution capabilities help maintain performance as demand increases. Overall, it scales well for both mid-sized and large enterprise environments.

How are customer service and support?

Customer support for One Identity Safeguard was generally good, with a knowledgeable and helpful team assisting during the setup and troubleshooting. In most cases, issues were resolved efficiently, but response times can sometimes be slower for more complex problems.

Which solution did I use previously and why did I switch?

I was previously using a basic in-house solution for managing privileged credentials, but it lacked advanced features such as session monitoring and automated password management. I switched to One Identity Safeguard for better security, centralized control, and improved compliance capability.

How was the initial setup?

The integration of One Identity Safeguard with my DevOps environment and cloud applications was generally smooth, especially with standard systems, but it required some initial configuration and fine-tuning to align with my DevOps workflow and core cloud applications. I did face minor challenges around setup and policy configuration, but once implemented, it worked reliably and integrated well with my environment.

What was our ROI?

I have seen a clear return on investment with One Identity Safeguard. I have reduced manual effort for access management by around thirty to forty percent, which has saved significant staff hours. Audit preparation time has decreased by nearly fifty percent, and improved security controls have helped lower the risks of costly incidents. Overall, the efficiency gains and risk reduction have justified the investment.

What's my experience with pricing, setup cost, and licensing?

In terms of pricing and licensing, my experience with One Identity Safeguard has been fairly reasonable. It is based on the number of users and privileged accounts, with options for a subscription or perpetual licensing. The initial setup cost was moderate, especially considering the security benefits, although some investment was required for deployment and configuration. Overall, I found the pricing was justified with the environment.

Which other solutions did I evaluate?

Before choosing One Identity Safeguard, I evaluated a few other privileged access management solutions, such as CyberArk Privileged Access Manager, Delinea Secret Server, and BeyondTrust Privileged Access Management. These are well-known options in the market and commonly compared during the evaluation.

What other advice do I have?

My advice for others looking into using One Identity Safeguard would be to plan the implementation carefully and invest time in understanding your access policies and workflow before deployment. One Identity Safeguard is a powerful tool, but it is not plug and play. It requires proper configuration and tuning to get the best results. Start with a phased rollout, focus on high-risk privileged accounts first, and ensure your team is trained properly. Once properly implemented, it can significantly improve security, visibility, and compliance across the organization. I would rate this product nine out of ten.


    Prathamesh Pawar

Centralized control has eliminated shared credentials and provides secure audited admin access

  • April 18, 2026
  • Review provided by PeerSpot

What is our primary use case?

In my daily operations, I rely on One Identity Safeguard for administrator requests for access through One Identity Safeguard, which are approved via workflows. Once approved, sessions are launched, ensuring security without revealing passwords, and all activities are recorded for auditing purposes.

In our environment, there were multiple administrators using shared privilege accounts, which created accountability and security risks. With One Identity Safeguard, we implemented password vaulting where passwords are automatically rotated and never exposed to users, ensuring secure access and eliminating shared credential risks.

In our daily operations, One Identity Safeguard is primarily used to manage and control privilege access to critical systems such as servers, network devices, and databases. Administrators and users request access through One Identity Safeguard, which follows an approval-based workflow. Once access is approved, users can securely connect to the target system without directly viewing or knowing the privilege credentials. All sessions are proxied through One Identity Safeguard, ensuring that passwords are never exposed. Additionally, every session is monitored and recorded, allowing security teams to review activities when required. We also use One Identity Safeguard for automated password rotation, ensuring that privileged account passwords are regularly updated without manual intervention. Overall, it acts as a centralized platform for security, secure access management, auditing, and compliance in our environment.

How has it helped my organization?

The implementation of One Identity Safeguard has had a significant positive impact on our organization's security and operational efficiency, reducing the risk of credential misuse by eliminating shared privilege accounts and enforcing secure password vaulting with automated rotation. One Identity Safeguard improves security by eliminating shared credentials, enhancing visibility through session monitoring, simplifying compliance, and streamlining privilege access management.

After implementing One Identity Safeguard, we achieved several measurable improvements in our environment. We eliminated the use of shared privilege accounts, significantly improving accountability and reducing security risks. Privileged password exposure was reduced to zero, as all credentials are securely stored and managed through the vault with automatic rotation. Audit and compliance processes became faster and more efficient, as we could provide complete session logs and recordings whenever required. We implemented shared account management, achieved zero password exposure, improved audit readiness, reduced access management time, and gained full visibility into privileged activities.

What is most valuable?

The most valuable features of One Identity Safeguard are its strong privilege access control and session security capabilities. One key feature is password vaulting with automated rotation, which ensures that privileged credentials are never exposed to users and are regularly updated. Key features include password vaulting with rotation, session monitoring and recording, secure remote access without exposing credentials, approval-based workflows, and seamless integration with Active Directory.

One Identity Safeguard integrates seamlessly with Microsoft Active Directory, simplifying user authentication and access management. The integration provides centralized authentication, group-based access control, and automated management of privileged domain accounts, reducing manual efforts and improving security.

Additional features include session proxy access, granular policy control, threat detection, detailed audit logs, multifactor authentication, and high availability support.

What needs improvement?

While One Identity Safeguard is a strong privilege access management solution, there are some areas where improvements can be made. The initial deployment and configuration can be complex, especially in a large enterprise environment with multiple integrations. The user interface can be improved to make navigation more intuitive, particularly for new users and administrators. Reporting and customization options could be more flexible, as generating tailored reports sometimes requires additional effort. Integration with third-party tools, although supported, can be time-consuming and may require deeper technical expertise. Additionally, performance tuning may be required in high-load environments to ensure optimal session handling response times. Areas for improvement include complex initial setup, UI enhancement, more flexible reporting, and easier third-party integration.

Improvements can be made in areas such as simplifying the deployment and initial configuration process, especially for large complex environments. The user interface could be made more intuitive and user-friendly, making it easier for new users and administrators to navigate. Reporting capabilities can be enhanced with more customization options and easier report generation. Streamlining integration with third-party tools and platforms could reduce implementation efforts and time. Additionally, improved performance optimization for high-load environments would help ensure smoother session handling and a better user experience.

For how long have I used the solution?

I have been using One Identity Safeguard for the last one year.

What do I think about the stability of the solution?

One Identity Safeguard is stable in my environment and has been reliable in our production environment. We have not experienced any major downtime or critical issues after the initial deployment and configuration phase. The solution performs reliably for daily privilege access operations, including session management and password vaulting. With proper sizing and high availability configuration, the system handles multiple concurrent sessions efficiently, making it a dependable and stable platform suitable for enterprise environments.

What do I think about the scalability of the solution?

One Identity Safeguard is highly scalable and well-suited for enterprise environments. The solution can handle a growing number of privileged accounts and target systems without significant performance impact when properly sized, supporting horizontal scaling by adding additional appliances, allowing organizations to expand capacity as needed.

How are customer service and support?

One Identity's customer support is knowledgeable and provides helpful guidance for troubleshooting and configuration-related issues. For standard issues, the response time is responsive and the resolutions are effective. For more complex or critical issues, response time can sometimes vary, but overall, my support experience has been satisfactory. Documentation and knowledge base resources are also useful for resolving common issues and understanding product features, making customer support reliable and meeting enterprise expectations.

Which solution did I use previously and why did I switch?

Before implementing One Identity Safeguard, we relied on manual methods and basic access control mechanisms to manage privileged accounts. In some cases, privileged credentials were shared among administrators, and password management was handled manually, increasing security risks and reducing accountability. We moved to One Identity Safeguard for better security, centralized control, and session visibility.

How was the initial setup?

The deployment of One Identity Safeguard in our environment took approximately four to six weeks. The initial setup of the physical appliance was straightforward, but the overall implementation required careful planning, especially for integration with Active Directory and onboarding the target systems. One of the main challenges was defining and configuring access policies and approval workflows according to the organization's requirements, but the solution is stable after implementation.

What about the implementation team?

The training required for One Identity Safeguard was moderate. For administrators, detailed training is needed to understand policy configuration, password vaulting, session management, and integration. It typically took a few days of hands-on sessions along with initial setup implementation support. For end-users, minimal training is required as the access request and approval workflow is straightforward and user-friendly. Overall, with proper initial training and documentation, the team quickly adapts to the solution in daily operations.

What was our ROI?

I believe One Identity Safeguard delivers a strong return on investment by significantly reducing security risks and improving operational efficiency. ROI is achieved through reduced security risks, lower manual efforts, faster audits, and improved operational efficiency.

What's my experience with pricing, setup cost, and licensing?

One Identity Safeguard is priced at a premium level, typical for enterprise-grade privilege access management solutions. The licensing is generally based on the number of privileged accounts, users, or appliances, depending on the deployment model and components used. The initial setup cost includes the appliance cost, implementation efforts, and integration with existing systems, such as Active Directory and other infrastructure components.

Which other solutions did I evaluate?

Before finalizing on One Identity Safeguard, we evaluated other privilege access management solutions, such as CyberArk and BeyondTrust. CyberArk is a strong market leader with advanced features, but it can be complex to implement and manage. BeyondTrust also offers good capabilities, especially for endpoint privilege management and remote access, but we found One Identity Safeguard to be more aligned with our requirements in terms of ease of use and deployment flexibility. We chose One Identity Safeguard because it provides a good balance between security, usability, and integration capabilities, particularly with Active Directory.

What other advice do I have?

Overall, my experience with One Identity Safeguard has been very positive. It is a reliable and secure privilege access management solution that effectively protects sensitive accounts and provides full visibility into administrator activity, with minor improvements needed in terms of UI and reporting enhancements.

Before implementing One Identity Safeguard, I advise clearly defining your privilege access management strategy and identifying all critical systems and accounts. Plan integrations in advance, especially with Active Directory and other security tools, to ensure a smooth deployment. Focus on designing proper access policies and approval workflows, as these play a key role in effective implementation. Provide adequate training to administrators so they can fully utilize features like session monitoring, password vaulting, and reporting. Starting with a phased deployment approach, onboarding critical systems first and then gradually expanding across the environment is beneficial. Overall, proper planning and user training are key to maximizing the benefits of the solution.

One Identity Safeguard is a mature and enterprise-ready privilege access management solution that provides a strong balance between security and usability. The key value of the solution lies in its ability to centralize privilege access control while maintaining full visibility and auditability for user activities, making it a mature and reliable PAM solution that balances security and usability with strong long-term value for enterprise environments. I would rate this solution a nine out of ten.


    Swapnil Karkala

Privileged access has become streamlined and compliance improves through automated monitoring

  • April 18, 2026
  • Review from a verified AWS customer

What is our primary use case?

Our primary use case for One Identity Safeguard includes privileged password management, where it includes vaulting, rotating, and checking in and checking out privileged credentials. Secure remote access helps to grant access to Windows/Linux servers based on group membership. We also use it for session monitoring and recording, where it helps to monitor, record, and audit privileged sessions for compliance. Access request simplification plus threat detection helps to streamline requests and quickly detect threats seamlessly.

In my day-to-day work, One Identity Safeguard helps to identify anomalous behavior, a deal breaker feature for some customers. It also helps to detect threats and streamline requests and quickly detect threats.

What is most valuable?

The best features One Identity Safeguard offers are out-of-box templates, which simplify password rotation workflows and have a nice interface. It is also pretty stable.

The out-of-box templates from One Identity Safeguard make onboarding much easier for my team in day-to-day work.

One Identity Safeguard's automation of password management and incident investigations has cut manual efforts significantly.

One Identity Safeguard has positively impacted my organization by improving compliance, posture, and audit capabilities. It has cut manual efforts by 30 to 40% via automation and also decreased privileged account incidents by up to 40%.

What needs improvement?

I think One Identity Safeguard can be improved as it can be slow sometimes.

Regarding needed improvements, I want to mention that there is a lack of documentation and many plug-in problems.

I think One Identity Safeguard needs improvements because sometimes the support team doesn't have answers for bugs.

What do I think about the stability of the solution?

One Identity Safeguard is very stable.

One Identity Safeguard is deployed in my organization as a hybrid model.

One Identity Safeguard is deployed in a hybrid cloud setup.

What do I think about the scalability of the solution?

One Identity Safeguard's scalability is very efficient; it handles my organization's growth effectively.

How are customer service and support?

The customer support for One Identity Safeguard is very responsive and proactive.

Which solution did I use previously and why did I switch?

I did not use another option before choosing One Identity Safeguard.

How was the initial setup?

The deployment of One Identity Safeguard took two to three weeks.

The deployment of One Identity Safeguard did not affect my privileged users; it was not disruptive to them.

Not much training was required to start using One Identity Safeguard, both for those who manage it and for end users. It is self-service, and it is very easy to learn how to use it. The learning curve is smooth.

What about the implementation team?

I use the virtual appliances version of One Identity Safeguard because it suits my organization well with load balancing.

What was our ROI?

I have seen a return on investment with One Identity Safeguard, leading to efficient management and lower upfront cost. It has reduced inside and external threats, which is essential for preventing privileged user damage, and decreased privileged account incidents by 40%.

What's my experience with pricing, setup cost, and licensing?

One Identity Safeguard has a competitive setup cost, and the pricing is competitive.

My experience with pricing, setup cost, and licensing for One Identity Safeguard is that the pricing is very competitive.

Which other solutions did I evaluate?

Before choosing One Identity Safeguard, I did not really evaluate other options.

What other advice do I have?

I chose eight out of 10 for One Identity Safeguard because the pricing is very competitive. It is a nice tool that helps to identify anomalous behavior, a deal breaker feature for some customers. It also helps with access request simplification plus threat detection, where it streamlines requests and quickly detects threats.

My advice for others looking into using One Identity Safeguard is that it is a serious, enterprise-grade identity safeguard. It excels at security, monitoring, and compliance, but trades off simplicity and ease of use.

One Identity Safeguard has been a cost-effective tool that has prevented major security breaches, avoided insider threats and misuse of admin privileges, and reduced audit and compliance costs. However, the initial cost plus setup effort is a bit high.

I gave this review a rating of 8 out of 10.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    Nikita Bhojwani

Centralized controls have strengthened privileged access security and simplified compliance audits

  • April 17, 2026
  • Review provided by PeerSpot

What is our primary use case?

Our primary use case for One Identity Safeguard is to secure, control, and monitor privileged access across critical systems in the organization. We mainly use it for privileged session management, password vaulting, and enforcing least-privilege access policy. It helps us manage administrative access to servers, databases, and network devices by centralizing credential storage and rotating passwords automatically. Additionally, we use it for session recording and real-time monitoring, which strengthens our audit and compliance capability. Overall, it plays a key role in reducing insider threats, improving security visibility, and ensuring regulatory compliance.

A common example of how we use One Identity Safeguard for privileged session management is when a system administrator needs access to a production server. Instead of sharing static credentials, they request access through One Identity Safeguard. For password vaulting, the admin never sees the actual passwords. One Identity Safeguard automatically injects the credential during login, and the password is rotated after the session ends. This ensures that credentials are never exposed or reused. For privileged session management, once the admin connects to the server through One Identity Safeguard, the entire session is monitored and recorded. If any suspicious activity occurs, we have the ability to terminate the session in real-time. These session recordings are also used later for auditing and compliance checks. This approach significantly improves security while still allowing admins to do their work efficiently without manual credential handling.

One additional point to add about our main use case is how well One Identity Safeguard integrated into our overall security workflow. It is not just a standalone tool; it works as a central control point for all privileged access. In our day-to-day operation, it reduces manual effort for the IT team by automating password management and access approval. It also standardizes how privileged access is handled across different teams, which improves consistency and reduces human error. Another important aspect is its role in compliance. Since all privileged activities are logged and recorded, it makes audits much smoother and faster. Instead of collecting logs from multiple systems, everything is available in one place. Overall, it fits seamlessly into our workflow by enhancing security without slowing down operations, which is critical for maintaining both productivity and control.

What is most valuable?

One Identity Safeguard offers several powerful features, but a few stand out in day-to-day use. The most important feature is privileged password vaulting. It securely stores credentials in a centralized vault and automatically rotates passwords, which significantly reduces the risk of credential misuse or leakage. Another key feature is privileged session management. It allows us to monitor, record, and even replay user sessions in real-time. This is extremely useful for both security monitoring and audit purposes, as every action can be traced back if needed. A standout capability is real-time monitoring and threat detection. The platform can generate alerts or even block suspicious activity during live sessions, which adds a strong layer of proactive security. I also find the session recording with search and indexing very valuable. Since sessions are indexed, it becomes easy to quickly investigate specific actions without reviewing entire recordings. Additionally, the analytics and behavior monitoring feature helps identify unusual user activity using behavioral patterns, which is useful for detecting insider threats or compromised accounts. Finally, automation and workflow-based access control is a significant advantage. Access requests, approvals, and provisioning are handled through automated workflows, reducing manual effort while ensuring consistent policy enforcement.

What needs improvement?

While One Identity Safeguard is a strong PAM solution, there are a few areas where it could be improved. One area is the user interface and reporting customization. Although the platform is functional, creating highly customized reports or dashboards can sometimes be less intuitive and may require additional effort. Another improvement area is integration flexibility, especially with some third-party or legacy systems. While it integrates well with standard environments like Active Directory, expanding smoother integration across a wider range of tools would make it even more versatile.

For how long have I used the solution?

I have been using One Identity Safeguard for two years.

What do I think about the stability of the solution?

One Identity Safeguard has been highly reliable and stable in our experience. Once deployed and properly configured, the platform runs consistently with minimal downtime. We have not faced any major performance issues, even while handling multiple concurrent privileged sessions and the integration across our hybrid environment. There have been occasionally minor issues, mostly related to integration or configuration, but nothing critical, and they were quickly resolved.

What do I think about the scalability of the solution?

One Identity Safeguard has shown good scalability in our experience and has effectively handled growth in our organization. As our environment expands, whether adding more users, servers, or cloud resources, it is relatively straightforward to scale by extending the deployment, especially since we are using virtual appliances. We can add capacity without major architecture changes or downtime. It also handles an increasing number of privileged sessions and access requests without noticeable performance degradation.

How are customer service and support?

Our experience with customer support has been quite positive. The support team is generally responsive and knowledgeable, especially for standard use configurations, and we have mainly expressed satisfaction in this area because we have solved almost all problems using One Identity Safeguard.

Which solution did I use previously and why did I switch?

Prior to implementing One Identity Safeguard, we were using a mix of native tools and manual processes, along with limited capability from tools like CyberArk Privileged Access Manager in some parts of the environment. We decided to switch to One Identity Safeguard mainly for its unified approach to privileged access management. It offered better centralized control, easier integration with our hybrid environment, and more streamlined workflows for both administrators and end-users. Another key reason was the ease of deployment and usability, which made it more practical for our team than maintaining multiple tools or a more complex setup.

How was the initial setup?

The deployment took approximately four to six weeks in our environment. The initial setup, including deploying the virtual appliance and basic configuration, was completed within the first one to two weeks. After that, most of the time went into integration with systems like Microsoft Active Directory and Microsoft Azure, policy configuration, and testing. We also spent time on fine-tuning access control, onboarding users, and validating workflows, which is critical to ensure everything runs smoothly in production.

What about the implementation team?

There is a formal vendor-partner ecosystem in place beyond a direct customer relationship with One Identity. One Identity operates through a structured partner program that includes system integrators, resellers, and managed service providers who help with implementation, deployment, and ongoing support for One Identity Safeguard. However, in our specific case, our relationship is primarily as a customer, and we do not have any strategic alliance, reseller, or co-development relationship with the vendor.

What was our ROI?

We have definitely seen a clear return on investment after implementing One Identity Safeguard, both in terms of cost savings and operational efficiency. From a time-saving perspective, audit preparation time has reduced by around 40 to 50 percent since all privileged activity logs and session recordings are centralized and available. What earlier took a day can be done in an hour now. In terms of operational efficiency, automation of password management and access workflows has reduced manual effort by approximately 30 to 40 percent, allowing our IT team to focus more on strategic tasks instead of routine access management. While it is harder to quantify exactly, the platform has helped us prevent potential security incidents by enforcing strict access control and real-time monitoring. Avoiding even a single major breach can result in significant financial savings.

What's my experience with pricing, setup cost, and licensing?

Our experience with pricing, setup cost, and licensing was reasonable for an enterprise-grade PAM solution, though it does require a notable initial investment. The licensing model is fairly structured, typically based on the number of users, assets, or sessions being managed. It is flexible enough to scale as the organization grows, but it is important to plan properly to optimize cost. In terms of setup cost, the main investment was around implementation, integration, and initial configuration. Since we deployed in a hybrid environment, there was some additional effort involved, but nothing unexpected for a solution of this scale.

What other advice do I have?

My advice to others considering One Identity Safeguard would be to start with a clear understanding of privileged access requirements and define strong governance policies upfront. One Identity Safeguard is a powerful tool, but its effectiveness depends on how well it aligns with your organization's PAM strategy. Another key point is to invest time in proper policy configuration, such as session recording rules, approval workflows, and access controls to avoid unnecessary friction for end-users while still maintaining strong security. Training and onboarding are equally important; administrators and the security team should be comfortable with reviewing session logs and responding to alerts. Otherwise, the value of monitoring and auditing can be diminished. Finally, continuous review is essential. Regularly analyze reports, refine policies, and ensure integration with your broader security stack to get maximum value from the platform.

One Identity Safeguard, in my experience, has had a significant positive impact on our organization, especially in terms of security, efficiency, and compliance. From a security standpoint, it has greatly reduced the risks associated with privileged accounts. By eliminating shared credentials and enforcing password rotation, we have minimized the chances of unauthorized access and insider threats. Operationally, it has improved efficiency by automating tasks such as password management and access approval. This has reduced the manual workload on the team and streamlined how privileged access is granted and monitored. It has also strengthened our compliance posture. Since all privileged activities are logged and recorded, audits have become much smoother and faster, with all the required data readily available in one place. Additionally, the real-time monitoring and session control capability have given us better visibility and faster response to potential risks, which has improved our overall incident management process. I would rate this review as a nine out of ten.


    Nitin Yadav

Secure access has improved privileged workflows and real-time monitoring streamlines daily tasks

  • April 17, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for One Identity Safeguard includes privilege access, session recording, and real-time monitoring.

In daily work, I use session recording and real-time monitoring as part of my workflow.

My main use case is privilege access.

What is most valuable?

The best features One Identity Safeguard offers include secure and controlled access along with real-time session controlling.

The real-time session control feature helps me in my daily tasks by providing session controlling and monitoring in user sessions that occur, allowing proactive management across web and platform access instead of reacting after something goes wrong.

Session monitoring and recording are also crucial parts of the features.

One Identity Safeguard has a noticeable positive impact around security and operational efficiency, providing secure, strong security, real-time monitoring, and full visibility.

Operational efficiency has improved as it requires less manual effort for the IT team and makes troubleshooting easier.

What needs improvement?

One Identity Safeguard needs improvement in deployment and integrating with other products.

Many team members feel that the biggest friction with One Identity Safeguard relates to access requests, session approvals, and policy changes, which require more clicks than expected.

I think One Identity Safeguard is a good product, but it just needs improvement in tech support.

For how long have I used the solution?

I have been using One Identity Safeguard for the last two years.

What do I think about the stability of the solution?

One Identity Safeguard is stable in my network.

What do I think about the scalability of the solution?

Scalability is very good as it can easily scale with organizational growth by adding more virtual appliances, and it handles increasing users, servers, and privilege accounts without any major performance issues.

How are customer service and support?

Customer support is really good.

Which solution did I use previously and why did I switch?

I previously used a different tool for managing, but it lacked centralized control, proper auditing, and security features.

How was the initial setup?

The deployment of the solution took around two to four weeks due to initial setups, integrations, and policy configurations.

End users need a minimum of two to three weeks to understand the solutions.

What was our ROI?

I have seen a return on investment in both money saved and time saved.

I have experienced noticeable time savings and some indirect cost benefits, specifically in that access provision has reduced from hours to minutes, requiring less manual effort, and the cost impact has been mitigated due to fewer security incidents and audit issues.

What's my experience with pricing, setup cost, and licensing?

The pricing, setup cost, and licensing are not the cheapest, but they offer strong security features that justify the cost.

The license is usually based on the number of user accounts, which is straightforward to understand, and the setup cost is good and reasonable.

Which other solutions did I evaluate?

Before choosing One Identity Safeguard, I evaluated BeyondTrust.

What other advice do I have?

My advice for others considering One Identity Safeguard would be to plan and execute the deployment properly during the implementation phase.

I have given this review a rating of 8.


    reviewer2814237

Privileged access has become controlled and monitoring now supports security and compliance

  • April 17, 2026
  • Review provided by PeerSpot

What is our primary use case?

I use One Identity Safeguard mainly for managing and securing privileged access like controlling admin accounts and monitoring sensitive sessions.

For example, I use One Identity Safeguard to grant temporary admin access to users and track their sessions to make sure everything is secure.

One Identity Safeguard also helps with password vaulting and automatic rotation.

This means we don't have to share or manually manage sensitive credentials.

We are using One Identity Safeguard in a hybrid setup, partly on-premises for sensitive access control and partly integrated with cloud services.

We have integrated One Identity Safeguard with our cloud environment on Microsoft Azure and also with some internal DevOps workflows so privileged access can be controlled during the deployments and automation tasks.

It was moderately easy overall to integrate One Identity Safeguard with our DevOps workflows and Microsoft Azure environment.

Microsoft Azure integration was pretty smooth, but the DevOps workflow setup took a bit more effort to configure and test properly.

What is most valuable?

I think the best features One Identity Safeguard offers are strong password vaulting with auto-rotation, session monitoring and recording, and real-time alerts that help catch suspicious activity quickly.

The real-time alerts from One Identity Safeguard are pretty reliable.

Alerts come in quickly, and they have helped us respond faster to suspicious activity before it becomes a bigger issue.

The session recording and audit logs from One Identity Safeguard really stand out.

They make tracking and reviewing activity easy.

But it would be even better if the UI was a bit more user-friendly.

One Identity Safeguard has improved security a lot by controlling privileged access, and it also reduced risks since all sensitive activities are monitored and logged.

We have seen fewer security risks since access is controlled and monitored by One Identity Safeguard, and it definitely helped with compliance because all actions are logged and easy to audit.

What needs improvement?

I think One Identity Safeguard could be improved by making the UI more user-friendly and simplifying some configurations, as it can feel a bit complex at times.

Reporting with One Identity Safeguard could be more detailed and easier to customize, and better integration with other tools would make the overall experience smoother.

For how long have I used the solution?

I have been using One Identity Safeguard for around one and a half years.

What do I think about the stability of the solution?

One Identity Safeguard is generally stable and reliable in day-to-day use.

What do I think about the scalability of the solution?

One Identity Safeguard is generally considered highly scalable and enterprise-ready.

How are customer service and support?

Customer support for One Identity Safeguard is generally good and knowledgeable, especially when it comes to technical issues and enterprise deployments.

Which solution did I use previously and why did I switch?

Earlier we were using a mix of manual access management and some basic PAM tools, but we switched to One Identity Safeguard for better automation, strong security controls, and easier auditing.

How was the initial setup?

Admins needed a bit of training for One Identity Safeguard, maybe a few days to get comfortable with policies and setup.

But for end-users, it was pretty minimal since most of it runs in the background.

It was mostly seamless for privileged users after deploying One Identity Safeguard.

They just had to follow the new access request process, and after a short adjustment period, it didn't really disturb their daily work.

What about the implementation team?

We didn't purchase One Identity Safeguard through the Microsoft Azure Marketplace.

We went through a direct vendor licensing process.

What was our ROI?

We have seen ROI with One Identity Safeguard mainly in reduced manual efforts and faster access handling.

Roughly around 40 percent less time spent on managing privileged accounts, and also fewer security incidents that need manual intervention, which saved both time and operational costs.

What's my experience with pricing, setup cost, and licensing?

Pricing for One Identity Safeguard was on the higher side but justified by the security features.

Setup cost was manageable and licensing is typically subscription-based per appliance or capacity, which makes it easier to scale but can add up in larger environments.

Which other solutions did I evaluate?

We did evaluate a few options before finalizing One Identity Safeguard. The main ones we looked at were CyberArk, BeyondTrust, and several others.

CyberArk was very strong but felt a bit complex and costly, and BeyondTrust was solid for remote access and monitoring.

In the end, we chose One Identity Safeguard because it fit better with our hybrid setup and integration needs.

What other advice do I have?

One Identity Safeguard is a solid and reliable PAM solution in my experience.

My advice would be to start with a clear access model before you deploy One Identity Safeguard. I would rate this review an 8 out of 10.


    Prithviraj kallurkar

Centralized controls have transformed privileged access and streamlined audit workflows

  • April 16, 2026
  • Review provided by PeerSpot

What is our primary use case?

I am familiar with One Identity Safeguard and am also evaluating it for the organization.

For our primary use case for evaluating One Identity Safeguard, we aim to strengthen privileged access management across our environment. Currently, we are looking to improve how we control, monitor, and secure access to critical systems, especially for admin and high-privilege accounts. Additionally, as our infrastructure is a mix of on-premises and cloud, we need a solution that can provide centralized visibility and control across the environment. One Identity Safeguard aligns well with that need while also helping us streamline access workflows and improve audit readiness.

A good example of a scenario where One Identity Safeguard would really help my team is managing third-party vendor access. When external vendors need access to our critical servers for maintenance or troubleshooting, it often involves sharing credentials or giving standing access, which increases risk. With One Identity Safeguard, we could provide temporary, just-in-time access without exposing actual passwords. The vendor would request access, get approval, and then log in through One Identity Safeguard. Their entire session would be monitored and recorded. This helps us in multiple ways: no credential sharing, full visibility of what actions were performed, and an audit trail for compliance. Once the task is done, access is also automatically revoked. In this scenario, One Identity Safeguard directly reduces security risk while also making the process more controlled and compliant.

There is one important scenario related to internal privileged user management that I would like to add about my use case for One Identity Safeguard. For example, our system administrators currently have standing access to central servers. With One Identity Safeguard, we can shift to a just-in-time access model where admin rights are granted only when needed and for a limited time. This significantly reduces the risk of misuse or accidental changes. Another scenario would be audit and compliance. During audits, it is often challenging to provide clear evidence of who accessed what and what actions were performed. One Identity Safeguard helps by maintaining session recordings and detailed logs, making audits much smoother and faster.

What is most valuable?

In my opinion, the best features of One Identity Safeguard are the ones that directly improve both security and operational control. First, privileged session monitoring and recording stand out. One Identity Safeguard can capture and replay entire sessions with searchable logs, even down to the commands and screen activity. This is extremely useful for audits and incident investigations. Second would be secure password vaulting with automated rotation, which is a big advantage. It eliminates manual credential handling and reduces the risk of password exposure while enforcing strong security policies. Another key feature is real-time monitoring and threat detection. One Identity Safeguard can detect suspicious behavior during a session and even block unsafe actions, which adds a proactive security layer rather than just reactive logging. Finally, centralized privileged access governance is an essential feature. Bringing password management, session control, and analytics into a single platform makes it much easier to manage hybrid environments effectively.

Session monitoring and recording, even from demos and industry feedback, has the biggest impact on audits in terms of clarity and speed. Instead of relying only on logs or user statements, with One Identity Safeguard, I can actually replay a full session, see exactly what commands were run, what changes were made, and in what sequence. During an audit or investigation, instead of spending hours correlating logs, my team can directly pull the session recording as evidence. It reduces ambiguity, speeds up root cause analysis, and makes compliance reporting much stronger and more defensible. For example, if there is any suspected misconfiguration or data change, I do not have to guess; I can literally watch what happened.

For day-to-day operations, automated password rotation in One Identity Safeguard shifts us from a manual, reactive process to a fully automated, policy-driven approach. Today, IT teams often spend time resetting privileged passwords, handling access requests, and responding to potential credential exposure. With automation in place, most of the effort is eliminated. Passwords are rotated automatically after each use or on a scheduled basis, so there is no need for frequent manual resets. In fact, it does not just reduce how often we reset passwords; it removes the need for manual resets almost entirely. In terms of workload, this means fewer support tickets related to password issues, less coordination between teams for credential sharing, and reduced human error. The IT team can shift focus from routine tasks to more strategic work like security improvements and system optimization. One important operational change is that users no longer handle actual credentials. They request access, get approved, and One Identity Safeguard manages everything in the background. That is a big shift in thinking, but it slightly improves security.

What needs improvement?

The feature I think is a bit underrated in One Identity Safeguard is the approval workflow and access request system. It might sound basic, but having a structured, policy-based approval process really improves governance. It ensures that every privileged access is justified, approved, and tracked, which is especially useful in large teams where accountability can get blurred. Another underrated aspect is integration flexibility. One Identity Safeguard can integrate with directories, SIM tools, and hybrid environments, making it easier to fit into existing infrastructure rather than focusing on a complete overhaul. If I had to point out something that could be improved or is sometimes seen as missing, it would be user experience or UI. Some users feel it could be more intuitive, especially for non-technical users. Initially, deployment complexity, as with many PAM solutions, means setup and fine-tuning policies can take time. Advanced analytics depth is another area where, while good, some organizations compare it to competitors that offer more mature, AI-driven insights. Overall, One Identity Safeguard is very strong in core PAM capabilities such as session control and credential security, but there is room to improve usability and advanced analytics.

One area where the UI in One Identity Safeguard could improve is navigation and ease of use, especially for first-time or non-technical users. For example, when a user wants to request access to a resource, the process can feel a bit layered. Users may need to navigate through multiple menus to find the right asset or account. A more guided, simplified request flow, such as a single dashboard with request access front and center, would make it more intuitive. Another example is session management and monitoring views. While the data is very powerful, the interface can sometimes feel dense. There is a lot of information on screen. For someone who just wants to quickly check activity sessions, review a recording, or identify risk behavior, it could benefit from a more clean dashboard-style layout with clear visuals highlighting instead of heavy tables. Also, in policy configuration, setting up rules for access or password rotation can be a bit complex. It often requires understanding multiple parameters and dependencies. A more wizard-based setup or user-friendly policy builder would make it easier, especially for teams that are not deeply specialized in PAM.

While One Identity Safeguard is strong in core PAM capabilities, there are a few areas where it could be improved in the future. One area is deeper integration, especially with modern cloud-native and DevOps tools. While it integrates well with traditional infrastructure, tighter, more seamless integration with platforms such as CI or CD pipelines or container environments could make it even more relevant for evolving architecture. Another improvement could be in advanced analytics and AI-driven insights. The current monitoring and alerting are solid, but having behavior analytics with more predictive capabilities, such as identifying malicious behaviors before they become risks, would add a strong proactive security layer.

From a documentation perspective, it would be helpful if there were more real-world use cases and step-by-step implementation examples. Sometimes the current documentation feels a bit too feature-focused, and adding practical scenarios would make onboarding easier. Regarding training, more structured learning paths or short guided tutorials for different user levels, from beginners to advanced, would be helpful.

For how long have I used the solution?

I have been using One Identity Safeguard for a year now.

What do I think about the stability of the solution?

Overall, we have seen good stability and strong scalability with One Identity Safeguard, especially after the initial tuning phase. Once the system was properly deployed and integrated, it has been very reliable in day-to-day operations. We have not experienced any major unplanned outages in production. Most issues, when they occurred, were related to initial configuration changes or network level dependency. In terms of downtime, we only see planned downtime during upgrades or maintenance windows. Even those were manageable because we schedule them during off-peak hours. The system supports clustering or redundant configuration, so access can often continue through other nodes depending on the setup. Overall, downtime impact has been minimal.

What do I think about the scalability of the solution?

One Identity Safeguard has met our needs well as the environment has grown. As we added more privileged accounts, systems, and user groups, we were able to scale by expanding the virtual appliance footprint and clustering. The platform is designed to support horizontal scaling, so adding capacity is relatively straightforward without redesigning the entire architecture.

How are customer service and support?

I have had to reach out to One Identity customer support a few times, mainly during the initial development phase or for a couple of integration-related queries. Overall, the experience has been decent to good, but it varies depending on the type of issue. For critical or well-defined technical issues, especially around configuration or known product behavior, the support team has been quite effective. They have provided clear guidance and documentation references, and in some cases, helped us resolve issues within a reasonable timeframe. Overall, the responsiveness from the technical side has been generally good, and the knowledge of the support team has been useful. Resolution time has been good for common use issues but slow for complex or custom scenarios, and handling escalations has been manageable.

Which solution did I use previously and why did I switch?

Previously, we used a more basic PAM approach built around a legacy vaulting solution combined with manual approval workflows, ticket-based access, and shared admin controls. We switched mainly because of limited access visibility and auditing, too much manual effort, weak hybrid or cloud integration, especially as we moved more workloads to Azure, and scaling challenges that arose as the number of privileged accounts and systems increased.

How was the initial setup?

The initial deployment of One Identity Safeguard on virtual appliances took roughly six to eight weeks end-to-end, including planning, setup, integration, and user rollout. The process was done in phases. First, we set up the core One Identity Safeguard appliance in a controlled environment and integrated it with our identity sources such as Active Directory. After that, we configured privileged accounts, session policies, and audit requirements. We also ran a pilot with a small group of administrators to validate session recording, access workflows, and reporting before going wider. In terms of disruption, it was minimal for most privileged users, but not completely zero. During the pilot phase, there were some adjustments needed because users had to get used to logging in through One Identity Safeguard gateways instead of directly accessing the system. Overall, the phased rollout approach helped reduce disruption significantly, and most users adapted quickly after the initial onboarding period.

What about the implementation team?

For the administration team, we needed more structured training, roughly a few days of focused hands-on sessions, plus some internal sandboxing practice. This covered things such as configuring safe rules, policies, integration with Active Directory, and audit logs. The learning curve is a bit steep initially because One Identity Safeguard has a lot of depth, especially around policy design and access control models. For end users, the training was relatively light. Most of it was around how to access systems through One Identity Safeguard gateways, how session recording works, and what changes in other login workflows. A short one to two-hour walkthrough session plus quick reference guides were usually enough for them to get comfortable with it.

What was our ROI?

Overall, we have seen a clear ROI from One Identity Safeguard, mostly in the form of time savings, reduced manual effort, and improved audit efficiency rather than just direct headcount reduction. In terms of time saved, one of the biggest gains is the privileged access workflow, such as password rotation and session approvals. What used to require manual coordination or admin intervention is now largely automated. This has noticeably reduced day-to-day operational overhead for the infrastructure team, amounting to multiple FTE days per week after deployment. From a security and compliance standpoint, the ROI is more evident. Session recording and audit trails have reduced the time spent preparing for audits and investigating incidents. Instead of manually reconstructing activity, everything is already logged and searchable, which has improved response time during internal reviews.

What's my experience with pricing, setup cost, and licensing?

We evaluated the pricing and setup cost as part of the overall deployment, and as with most enterprise PAM solutions, it is not cheap, but it is fairly aligned with what you get in terms of capability and security coverage. From a licensing perspective, One Identity Safeguard follows a custom enterprise model, typically based on factors such as the number of privileged accounts, users, and the modules you deploy. It is negotiated based on scope and scale rather than a simple per-user licensing. In our case, the initial setup cost was higher than expected, mainly because it was not just a software license; it included infrastructure planning, virtual appliance development, integration work, and security configuration.

Which other solutions did I evaluate?

Before choosing One Identity Safeguard, we did evaluate a few other enterprise PAM solutions. The main ones were CyberArk Privileged Access Manager and BeyondTrust Privileged Access Manager. We compared them mainly on session recording and monitoring capabilities, ease of deployment in hybrid environments, and integration with Active Directory. One Identity Safeguard stood out because it offered a strong balance of deep session monitoring and solid integration with our identity stack, along with easier appliance-based development. It aligned well with our internal compliance and auditing requirements without adding too much operational complexity. Overall, the decision came down to fit with our hybrid infrastructure, ease of control, scalability, and compliance readiness rather than just feature comparison.

What other advice do I have?

Even during the evaluation phase, One Identity Safeguard has shown clear positive impacts across key areas in my organization. From a security posture perspective, the biggest improvement is the elimination of direct credential exposure. Instead of sharing admin passwords, access is brokered through One Identity Safeguard, which significantly reduces the risk of credential misuse or leakage. In terms of audit readiness, we have seen a big improvement in visibility. The ability to track sessions and maintain detailed logs means we can quickly answer questions such as who accessed what, when, and what actions were performed. Even in a pilot, this level of transparency makes audits much more straightforward. On the operational efficiency side, processes such as access requests and approvals have become more structured instead of informal or manual coordination. Everything follows a defined workflow, which reduces delays and confusion.

Since we are still in the evaluating or pilot phase of One Identity Safeguard, we do not have long-term production metrics yet, but we have observed some early indicators and rough estimates. For example, in terms of operational efficiency, we have seen a noticeable drop of roughly thirty to forty percent in password-related support requests within the pilot group, mainly because users no longer need to request or manage credentials manually. From an audit perspective, the time required to gather access logs and evidence has reduced significantly. Tasks that earlier took hours, such as correlating logs, can now be done in minutes using session recordings. We estimate around fifty to sixty percent reduction in audit preparation time for privileged access reviews. On the security side, while it is early to quantify incidents, we have effectively reduced the risk surface by eliminating shared credentials in the pilot scope. That alone is a major improvement, even if it is not directly measurable yet. Earlier estimates show thirty to forty percent fewer password-related tickets and fifty percent faster audit preparation, along with reducing risk and eliminating shared credentials.

The integration of One Identity Safeguard has had a clear positive impact on both security and operational efficiency. From a security perspective, the most noticeable improvement is tighter controls over privileged access across systems. For example, before One Identity Safeguard, some privileged accounts, especially service accounts used in automation, had unrestricted access. Just-in-time access and session recording have significantly improved visibility. Now, even when an automation job or admin session runs, we can trace exactly what was accessed and when.

My advice for others looking into using One Identity Safeguard is that it offers a positive ROI overall, but it is mostly reflected in time savings, operational efficiency, and risk reduction rather than a single direct cost metric. In practical terms, the biggest measurable benefit has been time saved for IT and security teams. Tasks such as privileged access approvals, password rotation, and session audits are now largely automated or centralized. Another key area is auditing and compliance efficiency. Before One Identity Safeguard, preparing for audits required collecting logs from multiple systems and manually correlating activity. Now, session records and searchable audit trails make this process faster, saving a significant amount of effort during compliance cycles. Overall, the ROI is very real, but it shows more in time saved, reduced risk, and smoother operation rather than a direct headcount or cost-cutting figure.

Before wrapping up, I would say that my overall experience with One Identity Safeguard has been strong and reliable for our needs, especially for privileged access control in a hybrid environment. What stands out most is the visibility and control it brings to privileged activity, having full session recording and centralized access workflows. It has also helped us move away from fragmented manual processes towards a more structured and governed access model, which becomes very important as the environment scales. Overall, it has been a solid investment from both a security and operational standpoint. I would rate my overall experience with One Identity Safeguard as a nine out of ten.