CyberArk Endpoint Privilege Manager vs One Identity Safeguard comparison

You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between CyberArk Endpoint Privilege Manager and One Identity Safeguard based on real PeerSpot user reviews.

Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed CyberArk Endpoint Privilege Manager vs. One Identity Safeguard Report (Updated: May 2024).
772,127 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
"We were able to reduce the number of privileged accounts by 50%, which helped to simplify our privileged access management environment.""The most valuable features of CyberArk Endpoint Privilege Manager are password management, session management, onboarding rules, platform customization, and safety management.""We can do both server and endpoint protection.""The most valuable feature is that their database is completely encrypted and protected with multiple layers.""The solution's technical support is good.""The most valuable feature of CyberArk Endpoint Privilege Manager is its ability to reset passwords every time that it is needed or periodically.""The most valuable feature of the solution is its performance.""I have always found that CyberArk is a very tight, foolproof product compared to most other products available."

More CyberArk Endpoint Privilege Manager Pros →

"There are a lot of features, so it's going to sound funny, but one of the most simplistic features, the Favorites feature, is the one we like the best. You do a full run-through of configuration to check out a server and then you can save that whole configuration as a favorite. So the next time you go in, you click on the favorite that you configured and it automatically takes you to the end so you can check the server out that much faster. It saves a lot of time...""We are able to log and get reporting on all privileged activity that is being performed. We like the fact that we can leverage the session recording feature, which is especially valuable when we're dealing with third-party vendors that have to remote into our our boxes and servers to do any work on behalf of the bank. Now, we can record everything they are doing to ensure that they're only doing the changes that were needed. In addition, we use it to leverage knowledge transfer with our internal staff.""I like the discovery functionality and the change password feature through the check-in. I also like the bulk import with the help of templates that come with it out of the box. With the help of these few features, my tasks are made easier.""We don't need to use VPN for remote access.""The solution's most valuable features are the efficiency and the quality of the recording.""Safeguard can define and update processes and procedures into the security framework of a company, including mobile. It allows us to change the policies and configurations on a mass scale in regards to security.""All the features are promising, but we love the reporting feature because we can get each and every report. That's a major compliance requirement. Its reporting is really amazing, and it has made life a lot easier.""It offers high availability and enables end users to deploy the solution with 99.999 percent uptime, which is crucial in an enterprise environment with a large number of endpoints."

More One Identity Safeguard Pros →

"The installation process is pretty difficult.""Compared to other tools like Linux, this solution isn't as user-friendly.""The product's threat protection and defense capabilities need enhancement.""The price of the product is an area of concern where improvements are required. The product's price should be made more flexible.""They need much better integration with Azure AD.""The product needs a streamlined user interface; improvements to the user interface can enhance user experience and make the solution more intuitive to navigate.""It is hard to deal with technical support if you are not certified.""One area that has room for improvement is in managing the credentials for network devices."

More CyberArk Endpoint Privilege Manager Cons →

"I would like to see an adjustment with more enterprise architecture. You can buy multiple appliances but you can not fully separate different functions, so scaling might be a bit more complicated.""On a scale of one to ten, the stability is an eight.""I would like to see support for RDP over HTTPS so this product can be used in conjunction with the Microsoft terminal.""From a usability perspective, what we are finding out is that our privileged domain admin users, in particular, want functionality for extending a checkout session. So we are working with One Identity support to see if there's an enhancement that can be made to the product.""When we compare One Identity Safeguard with Cyberark, we know CyberArk has other tools or other features that are more complex and more useful for the customers. For example, I have one customer that wants to elevate the permission that is available in CyberArk.""Something for One Identity to look at is having integration guidelines for how to logically group accounts.""One Identity Safeguard can improve by having more integration with multiple devices.""Some of our users find the functionality a bit complex, and it could be made more user-friendly."

More One Identity Safeguard Cons →

Pricing and Cost Advice
  • "licensing for this solution is based on the number of APV (privileged users), and the number of sessions that you want to record."
  • "I think that it was in the range of $200,000 that had to get approved."
  • "Pricing depends on how many devices you use. Right now, on-premise, it costs us a little, but it's worth it. It seems like the cloud solution is much more expensive. We got this solution one year ago, and it's like we bought the solution, and now they are not going to support it on-premise anymore. We are in the implementation phase, and we missed this, and we already paid for the licenses. This is wasted time from my perspective, and CyberArk should be more customer-friendly."
  • "The cost for CyberArk is very high."
  • "The price of CyberArk Endpoint Privilege Manager is expensive."
  • "The price of CyberArk Endpoint Privilege Manager is expensive. The solution is priced based on the number of accounts onboarded and the number of concurrent sessions. Everyone else is included in the price, such as support."
  • "We pay about $17 per user."
  • "CyberArk Endpoint Privilege Manager has a very high price, so it's a one out of ten for me in terms of pricing."
  • More CyberArk Endpoint Privilege Manager Pricing and Cost Advice →

  • "Setup cost, pricing and licensing are all very expensive."
  • "Our licensing costs are on a yearly basis."
  • "It was definitely cheaper than the other two products that we evaluated."
  • "They offer a fair price for a robust solution."
  • "The full license is expensive but if you plan to use it in a big organization then it is the best option because it is more flexible."
  • "It is a bit on the pricey side, but you get what you pay for. You don't want to get anything too cheap because then you get cheap stuff and cheap support. That really never helps anybody."
  • "The pricing is about $80,000 per 100 servers. There are few elective costs."
  • "We have a yearly license. The cost depends on how much a company wants to invest in technology. In our organization, we believe in modern digitization and automation processes so we found it affordable. One Identity was not that much less than other solutions and it is not a cheap solution. There were number of cheaper solutions. However, it's the most effective, according to our evaluation."
  • More One Identity Safeguard Pricing and Cost Advice →

    Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
    772,127 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpoint… more »
    Top Answer:The most valuable feature of the solution is its performance.
    Top Answer:The identity discovery is good, and the performance is pretty good value.
    Top Answer:They have comparable pricing. All identity products are essentially priced in a similar way. It's a per-user base. Usually, they start at one price, and when you start pricing the competition, you… more »
    Top Answer:Something for One Identity to look at is having integration guidelines for how to logically group accounts. This is always something you need people to do. It would be especially helpful when you have… more »
    Average Words per Review
    Average Words per Review
    Also Known As
    Learn More

    CyberArk Endpoint Privilege Manager, a critical and foundational endpoint control addresses the underlying weaknesses of endpoint defenses against a privileged attacker and helps enterprises defend against these attacks through removing local admin rights, enforcing least privilege, and implementing foundational endpoint security controls across all Windows, macOS and Linux endpoints from hybrid to cloud environments.

    Click here for a free 30 day trial: CyberArk Endpoint Privilege Manager free trial

    One Identity Safeguard manages and monitors privileged access, enhancing security with features like automatic session recording, real-time monitoring, and credential rotation. It integrates seamlessly, supports compliance with audit trails, and improves operational efficiency across organizations. This robust platform significantly bolsters security protocols while controlling sensitive operations.

    Sample Customers
    Top Industries
    Computer Software Company38%
    Manufacturing Company15%
    Comms Service Provider15%
    Energy/Utilities Company8%
    Computer Software Company14%
    Financial Services Firm14%
    Manufacturing Company10%
    Financial Services Firm40%
    Healthcare Company15%
    Manufacturing Company10%
    Computer Software Company21%
    Financial Services Firm13%
    Manufacturing Company7%
    Company Size
    Small Business41%
    Midsize Enterprise22%
    Large Enterprise38%
    Small Business18%
    Midsize Enterprise13%
    Large Enterprise69%
    Small Business36%
    Midsize Enterprise24%
    Large Enterprise40%
    Small Business25%
    Midsize Enterprise21%
    Large Enterprise55%
    Buyer's Guide
    CyberArk Endpoint Privilege Manager vs. One Identity Safeguard
    May 2024
    Find out what your peers are saying about CyberArk Endpoint Privilege Manager vs. One Identity Safeguard and other solutions. Updated: May 2024.
    772,127 professionals have used our research since 2012.

    CyberArk Endpoint Privilege Manager is ranked 6th in Privileged Access Management (PAM) with 28 reviews while One Identity Safeguard is ranked 4th in Privileged Access Management (PAM) with 39 reviews. CyberArk Endpoint Privilege Manager is rated 8.2, while One Identity Safeguard is rated 8.2. The top reviewer of CyberArk Endpoint Privilege Manager writes "Offers integrated solutions and expands its capabilities through strategic acquisitions". On the other hand, the top reviewer of One Identity Safeguard writes "Provides us with centralized storage of secrets and credentials, and visibility into the use of privileged access". CyberArk Endpoint Privilege Manager is most compared with BeyondTrust Endpoint Privilege Management, Microsoft Defender for Endpoint, CrowdStrike Falcon, CyberArk Privileged Access Manager and Tanium, whereas One Identity Safeguard is most compared with CyberArk Privileged Access Manager, WALLIX Bastion, Delinea Secret Server, BeyondTrust Privileged Remote Access and Fudo PAM. See our CyberArk Endpoint Privilege Manager vs. One Identity Safeguard report.

    See our list of best Privileged Access Management (PAM) vendors.

    We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.