Try our new research platform with insights from 80,000+ expert users

Ekran System vs One Identity Privileged Access Suite for Unix comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Ekran System
Ranking in Privileged Access Management (PAM)
23rd
Average Rating
8.0
Reviews Sentiment
7.5
Number of Reviews
1
Ranking in other categories
User Activity Monitoring (4th)
One Identity Privileged Acc...
Ranking in Privileged Access Management (PAM)
34th
Average Rating
7.6
Number of Reviews
3
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of June 2025, in the Privileged Access Management (PAM) category, the mindshare of Ekran System is 0.5%, up from 0.3% compared to the previous year. The mindshare of One Identity Privileged Access Suite for Unix is 0.4%, up from 0.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

Andreas Lalos - PeerSpot reviewer
Early threat detection and diverse OS support with enhanced security
Ekran System offers a lightweight solution that does not impact the systems where it is implemented. It provides rich metadata for monitored activities and includes threat analysis capabilities for early alerting and investigation of unauthorized actions. Additionally, it supports diverse operating systems and allows for monitoring and enforcement policies, like blocking actions for policy violations, and provides a retention of historical data in a lightweight format.
Hicham Barnoussi - PeerSpot reviewer
A reliable solution with great password and session management
The setup process depends on the environment of the customer. It's not dependent on the solution. For customers with normal use cases and scenarios, it's a straightforward implementation, but for a customer with more than one environment, they may have BeyondTrust in one environment and Safeguard in another one. When they want to consolidate later, there may be complications. It depends on the devices and assets they would like to have under their PAM solution. The standard time for implementation is four weeks. I rate the setup an eight out of ten. There needs to be a dedicated resource for maintenance.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It supports diverse operating systems and allows for monitoring and enforcement policies, like blocking actions for policy violations, and provides a retention of historical data in a lightweight format."
"The most valuable features are session and password management."
"The most valuable feature of this solution is that it is easy to use."
"Privileged Access Suite's best feature is it's straightforward to use."
 

Cons

"Ekran System could improve in terms of communication to the market, particularly after their rebranding as Shiteka."
"There is a new trend of not having any privileged users or accounts."
"Privileged Access Suite's interface could be better."
"Product management should be improved."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
855,156 professionals have used our research since 2012.
 

Questions from the Community

What is your experience regarding pricing and costs for Ekran System?
The business model has become more complex with changes in feature licensing, yet they provide affordable options, particularly with the standard edition, which doesn't charge for the management co...
What needs improvement with Ekran System?
Ekran System could improve in terms of communication to the market, particularly after their rebranding as Shiteka. The solution does not support other protocols beyond traditional monitoring chann...
What is your primary use case for Ekran System?
The primary use case for Ekran System is third-party vendor monitoring and privileged access management monitoring. It is also used for privilege access management solutions.
Ask a question
Earn 20 points
 

Overview

 

Sample Customers

Deloitte, UPS, Seoul National University, KDN, Finat, Constitutional Court of Korea, Ukrsibbank
University of East Anglia, nForce Secure, dunnhumby
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: May 2025.
855,156 professionals have used our research since 2012.