

BeyondTrust Password Safe and One Identity Safeguard are both prominent solutions in the password management and security market. BeyondTrust is favored for ease of deployment and customer support, while One Identity is chosen for its advanced features and comprehensive analytics.
Features: BeyondTrust Password Safe offers strong credential management, robust reporting capabilities, and secure password storage. One Identity Safeguard is noted for comprehensive threat analytics, advanced integration options, and detailed auditing functions.
Room for Improvement: BeyondTrust Password Safe could improve integration functionality, enhance mobile accessibility, and expand reporting tools. One Identity Safeguard may benefit from faster performance, reduced administrative complexity, and a more intuitive user interface.
Ease of Deployment and Customer Service: BeyondTrust Password Safe is recognized for straightforward deployment processes and prompt customer support. One Identity Safeguard users often face challenges in initial setup but report positive support experiences post-deployment.
Pricing and ROI: BeyondTrust offers competitive pricing with a favorable ROI and low setup costs. One Identity Safeguard is priced higher, but users find its cost justified by advanced features and long-term benefits, making it a valuable investment for comprehensive solutions.
Next year, we may add another BeyondTrust element because the overall experience has been good.
It has also reduced the time spent on password management, saving our team time in managing privileged accounts, and is helping with automation that reduces manual efforts.
Instead of manually reconstructing activity, everything is already logged and searchable, which has improved response time during internal reviews.
It has reduced inside and external threats, which is essential for preventing privileged user damage, and decreased privileged account incidents by 40%.
The tickets for minor issues have been resolved efficiently.
One person gets aligned for troubleshooting and maintenance activities during their downtime, and within an hour, they complete these tasks.
The support and maintenance from BeyondTrust are commendable.
Documentation and knowledge base resources are also useful for resolving common issues and understanding product features, making customer support reliable and meeting enterprise expectations.
The customer team is knowledgeable and technically strong, especially when dealing with configuration issues, session monitoring, or password-related queries.
I sometimes need escalations to reach expertise.
If using the built-in database, it requires good knowledge in Microsoft SQL, which could complicate scalability.
BeyondTrust Password Safe is scalable and stable from my perspective, as if you increase your CPU and RAM, you can use as many user licenses as you want on a single platform.
In my experience, the scalability of BeyondTrust Password Safe is also a nine.
The scalability of One Identity Safeguard is perfect, scoring ten out of ten.
The system can distribute tasks across nodes, improving performance as demand grows.
The platform is designed to support horizontal scaling, so adding capacity is relatively straightforward without redesigning the entire architecture.
In BeyondTrust Password Safe, the upgrade activity can take longer, and I have occasionally experienced being stuck during appliance version upgrades.
The solution is very stable.
With proper sizing and high availability configuration, the system handles multiple concurrent sessions efficiently, making it a dependable and stable platform suitable for enterprise environments.
It appears designed as a dependable enterprise-grade solution, reflecting well in its production performance.
I would rate it a nine out of ten for stability.
This feature would allow PAM to check the credentials of privileged accounts, indicating if they are correct or not, showing if the heartbeat has failed if they are wrong.
This would help in identifying suspicious activities immediately when users log in.
There are limitations when accessing or creating connectors for each application.
For some configurations on the SPS side, if I need to make changes, such as for DNS servers, I must redeploy the machine.
There are many steps. We are still in the onboarding phase, and it seems very manual.
Another area for improvement could be the threat detection capabilities, like those seen in other PAM vendors.
The pricing model is more affordable with the option of going for either unlimited devices or users.
Pricing is managed by a different team, however, I know it's less expensive than CyberArk Privilege Access.
My experience with the pricing, setup cost, and licensing of BeyondTrust Password Safe is good because we have an asset-based license, not a user-based one, allowing us to add many clients with privilege access.
It is one of those where the more you buy, the cheaper it is.
It is cheaper than CyberArk.
Regarding pricing, it may appear slightly on the higher side initially compared to some alternatives, but when we evaluate it against the security benefits, compliance support, and risk reduction, it proves to be cost-effective in the long run.
BeyondTrust JIT (Just-in-Time) Access helps minimize risks in the organization by allowing privileged accounts to be provisioned temporarily, granting users elevated access only for the required duration.
The flexibility of the licensing model is significantly better as it offers both unlimited users and unlimited devices, unlike Delinea, which is based on the number of users.
The features I find valuable in Password Safe include password retention and management, session privilege monitoring, live monitoring and recording, and the use of PS automation scripts for creating connections.
The auditing and approval mechanisms are features we did not have before and are greatly appreciated.
Automatic credential rotation helps our team by removing the need for manual changes to privileged passwords, reducing the risk of stale or shared credentials and ensuring that every access is controlled and compliant.
The password vault has been a game changer because it provides a secure and controlled way to store, manage, and rotate sensitive credentials without exposing them to users.
| Product | Mindshare (%) |
|---|---|
| One Identity Safeguard | 4.4% |
| BeyondTrust Password Safe | 2.7% |
| Other | 92.9% |


| Company Size | Count |
|---|---|
| Small Business | 13 |
| Midsize Enterprise | 5 |
| Large Enterprise | 10 |
| Company Size | Count |
|---|---|
| Small Business | 64 |
| Midsize Enterprise | 25 |
| Large Enterprise | 31 |
BeyondTrust Password Safe is a robust Privileged Access Management tool designed to secure access to servers, databases, and applications. It automates onboarding, rotation, and integration processes, enhancing efficiency and compliance with advanced security measures.
BeyondTrust Password Safe offers a comprehensive approach to managing privileged accounts, integrating smoothly into organizational frameworks to bolster security protocols. Its standout capabilities include session recording, Smart Rules for onboarding automation, and sophisticated auditing tools that support compliance and real-time monitoring. While it exhibits high availability and facilitates seamless usability, enhancements are needed in management console integration, documentation, and installation processes. Users benefit from its password rotation and policy enforcement, despite facing challenges with authentication sync times and session disconnects.
What are the core features of BeyondTrust Password Safe?In industries with stringent security demands, BeyondTrust Password Safe is employed to safeguard privileged accounts, ensuring compliance with regulatory requirements. It is crucial for sectors like finance and healthcare, where access to sensitive data must be tightly controlled and monitored.
One Identity Safeguard manages and monitors privileged access, enhancing security with features like automatic session recording, real-time monitoring, and credential rotation. It integrates seamlessly, supports compliance with audit trails, and improves operational efficiency across organizations. This robust platform significantly bolsters security protocols while controlling sensitive operations.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.