BeyondTrust Password Safe and One Identity Safeguard are both prominent solutions in the password management and security market. BeyondTrust is favored for ease of deployment and customer support, while One Identity is chosen for its advanced features and comprehensive analytics.
Features: BeyondTrust Password Safe offers strong credential management, robust reporting capabilities, and secure password storage. One Identity Safeguard is noted for comprehensive threat analytics, advanced integration options, and detailed auditing functions.
Room for Improvement: BeyondTrust Password Safe could improve integration functionality, enhance mobile accessibility, and expand reporting tools. One Identity Safeguard may benefit from faster performance, reduced administrative complexity, and a more intuitive user interface.
Ease of Deployment and Customer Service: BeyondTrust Password Safe is recognized for straightforward deployment processes and prompt customer support. One Identity Safeguard users often face challenges in initial setup but report positive support experiences post-deployment.
Pricing and ROI: BeyondTrust offers competitive pricing with a favorable ROI and low setup costs. One Identity Safeguard is priced higher, but users find its cost justified by advanced features and long-term benefits, making it a valuable investment for comprehensive solutions.
Any PAM solution, when I deploy it well and customers use it, leads to a return on investment.
The tickets for minor issues have been resolved efficiently.
I found the technical support from BeyondTrust to be very good.
The technical support from BeyondTrust responds very shortly whenever a ticket is created.
I sometimes need escalations to reach expertise.
Sometimes, I get a very helpful response and they address issues on a call.
When I have day-to-day incidents and problems, the response is good enough in terms of time and quality.
If using the built-in database, it requires good knowledge in Microsoft SQL, which could complicate scalability.
In my experience, the scalability of BeyondTrust Password Safe is also a nine.
The scalability of One Identity Safeguard is perfect, scoring ten out of ten.
We have a cluster of SPPs and a cluster of SPSs, and we can add a node to that cluster without much fuss.
I would rate it a nine out of ten for scalability.
The solution is very stable.
I would rate it a nine out of ten for stability.
In terms of stability, I rate One Identity Safeguard nine to ten out of ten.
I encounter problems primarily with the failover procedure.
This would help in identifying suspicious activities immediately when users log in.
There are limitations when accessing or creating connectors for each application.
I believe one improvement could be having the last used passwords appear more automatically whenever I check for passwords associated with a frequently used system.
For some configurations on the SPS side, if I need to make changes, such as for DNS servers, I must redeploy the machine.
There are many steps. We are still in the onboarding phase, and it seems very manual.
Another area for improvement could be the threat detection capabilities, like those seen in other PAM vendors.
The pricing model is more affordable with the option of going for either unlimited devices or users.
Pricing is managed by a different team, however, I know it's less expensive than CyberArk Privilege Access.
It is one of those where the more you buy, the cheaper it is.
It is cheaper than CyberArk.
It is more expensive than Secret Server but way less expensive than CyberArk.
The flexibility of the licensing model is significantly better as it offers both unlimited users and unlimited devices, unlike Delinea, which is based on the number of users.
The features I find valuable in Password Safe include password retention and management, session privilege monitoring, live monitoring and recording, and the use of PS automation scripts for creating connections.
The most valuable features of BeyondTrust Password Safe, in my opinion, are its ease of use and robust security management.
The auditing and approval mechanisms are features we did not have before and are greatly appreciated.
I think One Identity should improve its documentation because it is vast and not clear, and clear documentation on implementing the solution would be advantageous for consultants.
Compared to other PAM solutions, it is easy to implement and use from an administrator's point of view.
Beyond Trust Password Safe is an automated solution that combines password and privileged session management into a single platform. Password Safe delivers secure access control, auditing, alerting, recording, and monitoring.
This free and open-source password manager supports Windows and Linux, and some ports are available for other platforms as well. Their proprietary algorithm, Twofish, is considered highly secure, with the advantage that it is not affiliated with NIST. The Twofish algorithm secures the data while keys are delivered using SHA-256 authentication.
The application is easy to use, and you can download the Windows app from several sites. Additionally, the application is available in 14 languages.
Beyond Trust Password Safe Key Features
What can you do with Password Safe?
Beyond Trust Password Safe Benefits
Reviews from Real Users
A PAM Architect at a tech services company says, "BeyondTrust Password Safe's features that I have found most valuable are really those that are knitted in. That is their Smart Rules and Smart Groups, where you design your administration model so you create your AD groups and your asset groups, and configure Password Safe."
An I.S. Architect at a insurance company mentions that "Session recording, password rotation, and password vaulting are the most valuable features."
"One of the most valuable features is that this is a product designed with enterprises in mind," adds a Cybersecurity Architect at a tech vendor.
One Identity Safeguard manages and monitors privileged access, enhancing security with features like automatic session recording, real-time monitoring, and credential rotation. It integrates seamlessly, supports compliance with audit trails, and improves operational efficiency across organizations. This robust platform significantly bolsters security protocols while controlling sensitive operations.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.