We performed a comparison between CyberArk Endpoint Privilege Manager and One Identity Safeguard based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."This is the number one product for privilege account security."
"The most valuable features of CyberArk Endpoint Privilege Manager are password management, session management, onboarding rules, platform customization, and safety management."
"The department management aspect of the solution is the most valuable aspect."
"The feature called PTA, which stands for Privileged Threat Analytics keeps track of what admins are doing and works with Centimeters. If something fishy is going on with a user's credentials, it alerts the security team so they can act fast. Plus, it automates stuff like resetting credentials or blocking users. So, if there's a potential hack, CyberArk can change passwords and lock out users in a snap. It also gives you a heads-up if anything unusual is going on with server activities, like someone creating new users with uncontrolled credentials."
"We can do both server and endpoint protection."
"The solution is scalable."
"The solution's technical support is good."
"It offers great performance."
"The most unique and valuable features are the upstream and downstream throughput capacities; the Safeguard platform provides agile integration. In actuality, all the features are valuable. They're good, user-friendly."
"There are a lot of features, so it's going to sound funny, but one of the most simplistic features, the Favorites feature, is the one we like the best. You do a full run-through of configuration to check out a server and then you can save that whole configuration as a favorite. So the next time you go in, you click on the favorite that you configured and it automatically takes you to the end so you can check the server out that much faster. It saves a lot of time..."
"I have found One Identity Safeguard to be stable."
"I have found the most useful feature of One Identity Safeguard to be Privileged Sessions."
"Safeguard has the ability to record and retrieve in the full-video format."
"There are numerous valuable data protection features, including the content and information that offer us more scalable protection as needed."
"It is easy to manage. There is a very logical, clear user interface. Also, the integration of scripts is thoughtfully implemented. Overall, it's a nice product to manage."
"I like that One Identity Safeguard lets you configure the maximum number of connections to the target, a configuration I didn't find in its competitor."
"CyberArk meets clients' need very spot-on. It covers everything customers ask for. As for improvements, honestly, the feedback's been really positive. I haven't heard any specific areas that need work."
"It's an old product and has many areas that can be improved."
"The installation process is pretty difficult."
"For an experienced system implementer it will take approximately one day. However, for somebody who is inexperienced it may take up to five days."
"They need much better integration with Azure AD."
"The solution can be complex to use at times."
"CyberArk Endpoint Privilege Manager can be better by making its UI more consistent."
"We have had some major issues with the tool, but we have worked with the R&D teams and we have worked with support. There is room for improvement, especially on response times. But they're working on it and they're doing the best they can."
"Cost-wise, it is a little bit expensive, which makes it difficult to get management approval. Its price should be reduced."
"I would like to see support for RDP over HTTPS so this product can be used in conjunction with the Microsoft terminal."
"The main thing that needs improvement is the slowness. Apart from that, the change password check-in feature also needs improvement because it is not working perfectly accurately."
"Even though we have two nodes, there's no way to do an upgrade without taking everything completely offline. It would be nice if they could improve that."
"Monitoring of the platform should be easier and more functional so that you can have a clear picture of the running service."
"There is a lack of documentation and many problems with the plugins."
"One Identity Safeguard can improve by having more integration with multiple devices."
"We would like to have the option of importing assets by using the CSV file. It was available in the earlier versions, but it is not available now."
More CyberArk Endpoint Privilege Manager Pricing and Cost Advice →
Prevent security breaches and limit damage by putting in place a privileged access management solution. Get a free 45-day trial, or request a demo of One Identity SafeGuard.
CyberArk Endpoint Privilege Manager is ranked 7th in Privileged Access Management (PAM) with 25 reviews while One Identity Safeguard is ranked 5th in Privileged Access Management (PAM) with 38 reviews. CyberArk Endpoint Privilege Manager is rated 8.0, while One Identity Safeguard is rated 8.2. The top reviewer of CyberArk Endpoint Privilege Manager writes "Offers integrated solutions and expands its capabilities through strategic acquisitions". On the other hand, the top reviewer of One Identity Safeguard writes "Provides us with centralized storage of secrets and credentials, and visibility into the use of privileged access". CyberArk Endpoint Privilege Manager is most compared with Microsoft Defender for Endpoint, BeyondTrust Endpoint Privilege Management, CrowdStrike Falcon, CyberArk Privileged Access Manager and Tanium, whereas One Identity Safeguard is most compared with CyberArk Privileged Access Manager, WALLIX Bastion, Delinea Secret Server, BeyondTrust Privileged Remote Access and Fudo PAM. See our CyberArk Endpoint Privilege Manager vs. One Identity Safeguard report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.