Try our new research platform with insights from 80,000+ expert users

BeyondTrust DevOps Secrets Safe vs One Identity Privileged Access Suite for Unix comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

BeyondTrust DevOps Secrets ...
Ranking in Privileged Access Management (PAM)
42nd
Average Rating
7.6
Reviews Sentiment
6.6
Number of Reviews
4
Ranking in other categories
Enterprise Password Managers (26th)
One Identity Privileged Acc...
Ranking in Privileged Access Management (PAM)
35th
Average Rating
7.6
Number of Reviews
3
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of October 2025, in the Privileged Access Management (PAM) category, the mindshare of BeyondTrust DevOps Secrets Safe is 0.6%, up from 0.3% compared to the previous year. The mindshare of One Identity Privileged Access Suite for Unix is 0.5%, up from 0.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
One Identity Privileged Access Suite for Unix0.5%
BeyondTrust DevOps Secrets Safe0.6%
Other98.9%
Privileged Access Management (PAM)
 

Featured Reviews

Stephen Hui - PeerSpot reviewer
Has all necessary functionalities, is sophisticated and mature; still contains some bugs
There are still some bugs in the solution but a lot less than there used to be. Unfortunately, CyberArk and BeyondTrust are in fierce competition. Many customers have already adopted CyberArk, but they need a proven remote access solution and are likely to go with BeyondTrust. Both solutions can be used, it's just more work for IT to manage them. CyberArk is still leading the market share globally, and BeyondTrust is always classified second, followed by Delinea or Thycotic.
Hicham Barnoussi - PeerSpot reviewer
A reliable solution with great password and session management
The setup process depends on the environment of the customer. It's not dependent on the solution. For customers with normal use cases and scenarios, it's a straightforward implementation, but for a customer with more than one environment, they may have BeyondTrust in one environment and Safeguard in another one. When they want to consolidate later, there may be complications. It depends on the devices and assets they would like to have under their PAM solution. The standard time for implementation is four weeks. I rate the setup an eight out of ten. There needs to be a dedicated resource for maintenance.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The local administrator can manage all the user's logins in one, simple, straight-away account access. Additionally, the solution is user-friendly."
"DevOps Secrets Safe allows you to customize a lot of rules."
"The most valuable features of BeyondTrust DevOps Secrets Safe are the ease of use and the API is very nice. Additionally, the interface is very good between AD and Unix."
"A sophisticated and mature solution."
"The most valuable features are session and password management."
"Privileged Access Suite's best feature is it's straightforward to use."
"The most valuable feature of this solution is that it is easy to use."
 

Cons

"The support for the solution is not very good, they could improve by being quicker."
"You need to improvise many of the customized rules, which can lead to some errors. BeyondTrust should reduce the error rate."
"We had some issues with the solution and once we contacted support they eventually solved the problem. They could improve their response time."
"The product contains some bugs."
"Product management should be improved."
"Privileged Access Suite's interface could be better."
"There is a new trend of not having any privileged users or accounts."
 

Pricing and Cost Advice

"There is an annual license required to use BeyondTrust DevOps Secrets Safe."
Information not available
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
869,513 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
35%
Retailer
12%
Computer Software Company
10%
Government
10%
No data available
 

Overview

 

Sample Customers

Starbucks, Ebay, CSC, RBC, Williams-Sonoma, Carbonite
University of East Anglia, nForce Secure, dunnhumby
Find out what your peers are saying about BeyondTrust DevOps Secrets Safe vs. One Identity Privileged Access Suite for Unix and other solutions. Updated: September 2025.
869,513 professionals have used our research since 2012.