No more typing reviews! Try our Samantha, our new voice AI agent.

Astrix vs One Identity Safeguard comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Astrix
Ranking in Non-Human Identity Management (NHIM)
5th
Average Rating
8.0
Reviews Sentiment
7.5
Number of Reviews
1
Ranking in other categories
Threat Intelligence Platforms (TIP) (71st)
One Identity Safeguard
Ranking in Non-Human Identity Management (NHIM)
1st
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
57
Ranking in other categories
User Entity Behavior Analytics (UEBA) (5th), Privileged Access Management (PAM) (2nd)
 

Mindshare comparison

As of April 2026, in the Non-Human Identity Management (NHIM) category, the mindshare of Astrix is 15.3%, up from 15.5% compared to the previous year. The mindshare of One Identity Safeguard is 6.1%, down from 6.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Non-Human Identity Management (NHIM) Mindshare Distribution
ProductMindshare (%)
One Identity Safeguard6.1%
Astrix15.3%
Other78.6%
Non-Human Identity Management (NHIM)
 

Featured Reviews

Ahamed Shadhir - PeerSpot reviewer
System Engineer at Idkatar
Automated SaaS access governance has reduced OAuth risks and improves audit readiness
The best features are deep OAuth app visibility, real-time risk detection, automated remediation, risk scoring and prioritization, and SaaS-to-SaaS threat detection. The real-time risk detection and alerts have benefited us the most. Astrix continuously monitors connections and third-party apps, flagging high-risk applications automatically when risky permission, suspicious behavior, or unusual access patterns are detected. This helped us considerably. Since deploying Astrix, we've seen a 42% reduction in high-risk third-party OAuth apps, a 65% reduction in dormant SaaS integration, faster vendor offboarding from days to an hour, and improved audit readiness. The faster offboarding has been transformative. Before Astrix, offboarding was mostly manual and checklist-driven. When an employee or vendor left, we would disable their primary account, remove them from groups, manually review shared drives, and try to identify third-party apps they had authorized. After Astrix, it is centralized, automated, and immediate.
ST
Senior Information Technology Consultant at Helse Nord IKT
Centralized privileged access has improved control and now supports secure vendor billing oversight
The transparent mode is a seamless approach when using it. We have some issues with it, but we are working on it to make it work for us. Managing remote access for privileged users with the secure remote access feature is both easy and hard depending on the scenario we face. We have some systems that are easy and take not even a minute to set up, while others take a bit longer. We are in the middle of integrating One Identity Safeguard with the IGA solution, Identity Manager. We have some A2A setups, but it is not optimal. We are using RPA for developers, not actually RPA accounts, but that is something we are working on. We are also using the service account password rotation on the asset to some degree, and we are exploring options there. For integrating One Identity Safeguard, figuring out how password rotation works is a bit difficult because we have to make custom integrations. After that, it was no problem really. For the A2A use, it is not as easy as using something like HashiCorp's password management tools. It is mostly for certain features in One Identity Safeguard that I would like some improvements. Some of the things you can do in entitlements, there is a lot you can do there, but not everything is optimal. You have to have duplicates of a lot of things to make it work the way you want.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Since deploying Astrix, we've seen a 42% reduction in high-risk third-party OAuth apps, a 65% reduction in dormant SaaS integration, faster vendor offboarding from days to an hour, and improved audit readiness."
"Since deploying Astrix, we've seen a 42% reduction in high-risk third-party OAuth apps, a 65% reduction in dormant SaaS integration, faster vendor offboarding from days to an hour, and improved audit readiness."
"But otherwise, I think it is a good product and a good buy."
"The initial setup is very easy."
"Technical support is brilliant."
"The system is easy to manage, as it is not a system that you will change everything all of a sudden. It evolves most of the time with customer requests."
"The solution's most valuable features are the efficiency and the quality of the recording."
"The whole product solves the privileged access management challenge for our company. We have a secure tunnel, a secure session manager, and automatic logging of sessions, which is good for forensic purposes. We have a rich level of logs and can trace what happened on which machine and see who did what."
"We use the solution’s “transparent mode” feature for privileged sessions. It is very easy because it is only a simple configuration for our users. We don't have to modify our network. We install it, configure it, and it works. So, it is super easy. The rollout for our users is seamless."
"This is an extremely stable product."
 

Cons

"Customer support could be improved so that faster support on services would attract more customers."
"Customer support could be improved so that faster support on services would attract more customers."
"The Transparent Mode could be somewhat easier to use."
"Improving the way we develop new connectors for non-typical systems would be beneficial."
"We would like to be able to generate certificate signing requests (CSRs) from the interface for certificates."
"When we compare One Identity Safeguard with CyberArk, we know CyberArk has other tools or other features that are more complex and more useful for the customers."
"We can't review or audit HTTP and HTTPS. This functionality should be added so that we can review and audit HTTP and HTTPS."
"For the A2A use, it is not as easy as using something like HashiCorp's password management tools."
"The product uses a lot of resources in current sessions."
"The deployment affects our privileged users because it takes a long time for them to request privileges, which impacts the SLA."
 

Pricing and Cost Advice

Information not available
"It was definitely cheaper than the other two products that we evaluated."
"Our licensing costs are on a yearly basis."
"One Identity Safeguard is expensive and the cost goes up as we scale."
"The license is very expensive for us, partly due to inflation and partly because of the exchange rate between the Dollar and the Iranian Rial. We purchased a perpetual license that we've been using up until now, but I believe that we are not going to update it in the future. Instead, we plan to find another third-party to support us with the license, in the sense that we would have access to their license as a shared agreement."
"We have a yearly license. The cost depends on how much a company wants to invest in technology. In our organization, we believe in modern digitization and automation processes so we found it affordable. One Identity was not that much less than other solutions and it is not a cheap solution. There were number of cheaper solutions. However, it's the most effective, according to our evaluation."
"The pricing is about $80,000 per 100 servers. There are few elective costs."
"It is a bit on the pricey side, but you get what you pay for. You don't want to get anything too cheap because then you get cheap stuff and cheap support. That really never helps anybody."
"Setup cost, pricing and licensing are all very expensive."
report
Use our free recommendation engine to learn which Non-Human Identity Management (NHIM) solutions are best for your needs.
885,728 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Healthcare Company
11%
Financial Services Firm
9%
University
9%
Outsourcing Company
9%
University
11%
Computer Software Company
7%
Financial Services Firm
7%
Outsourcing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business44
Midsize Enterprise22
Large Enterprise22
 

Questions from the Community

Ask a question
Earn 20 points
What is your experience regarding pricing and costs for One Identity Safeguard?
We have a separate department that studies setup costs for each product, but as far as my information goes, the pricing and setup costs are very good.
What needs improvement with One Identity Safeguard?
The most common improvement needed is for upgrades. One Identity Safeguard's desktop client should have a faster and easier upgrade process that ensures compatibility.
What is your primary use case for One Identity Safeguard?
One Identity Safeguard serves as our Privileged Access Management solution to enforce session management for administrators and allow them to access our systems in recorded sessions, which secures ...
 

Overview

 

Sample Customers

Information Not Available
Cavium
Find out what your peers are saying about One Identity, GitGuardian, Entro Security and others in Non-Human Identity Management (NHIM). Updated: March 2026.
885,728 professionals have used our research since 2012.