No more typing reviews! Try our Samantha, our new voice AI agent.

Fudo PAM vs One Identity Privileged Access Suite for Unix comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Fudo PAM
Ranking in Privileged Access Management (PAM)
24th
Average Rating
8.0
Reviews Sentiment
7.0
Number of Reviews
5
Ranking in other categories
No ranking in other categories
One Identity Privileged Acc...
Ranking in Privileged Access Management (PAM)
33rd
Average Rating
7.6
Number of Reviews
3
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2026, in the Privileged Access Management (PAM) category, the mindshare of Fudo PAM is 2.4%, down from 2.7% compared to the previous year. The mindshare of One Identity Privileged Access Suite for Unix is 1.0%, up from 0.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
Fudo PAM2.4%
One Identity Privileged Access Suite for Unix1.0%
Other96.6%
Privileged Access Management (PAM)
 

Featured Reviews

TD
BDM at Oberig-it
Works with SCTP, STTPS, SQL, and MySQL protocols
There are some areas for improvement in the Fudo PAM cake that we want to improve in terms of scaling. Scaling is an optional feature because we closed some big projects with enterprise customers from different countries, including Ukraine, Kaloxetine, Uzbekistan, and others. We closed projects in different areas with customers of different sizes. When we talk about enterprise customers, we should consider that they have different use cases and desires for Fudo PAM. We compared our options for customers to choose their vendors, and we discovered Fudo PAM has few scaling options. In Fudo PAM, there should be additional features for scaling and organizing remote sessions for remote systems in remote networks.
Hicham Barnoussi - PeerSpot reviewer
Managing Partner at Smpl ID
A reliable solution with great password and session management
The setup process depends on the environment of the customer. It's not dependent on the solution. For customers with normal use cases and scenarios, it's a straightforward implementation, but for a customer with more than one environment, they may have BeyondTrust in one environment and Safeguard in another one. When they want to consolidate later, there may be complications. It depends on the devices and assets they would like to have under their PAM solution. The standard time for implementation is four weeks. I rate the setup an eight out of ten. There needs to be a dedicated resource for maintenance.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Fudo PAM was the most flexible and intuitive interface out of all of the products in the PAM sector."
"This is a solution that I recommend because it is a simple privileged access management system that is done very well."
"The main benefit of the solution is that it's very easy to set up. It only takes a couple of hours to install everything."
"We are convinced that Fudo PAM is better than competing products like WALLIX."
"it's perfect to control and administer computers in our company."
"I think that Fudo Privileged Access Management is a very good program."
"Right now we are encouraging our customers to use Fudo PAM because it is the only product in PAM technology that we have to offer them."
"Session recording and password management are the two main aspects."
"The most valuable feature of this solution is that it is easy to use."
"Privileged Access Suite's best feature is it's straightforward to use."
"The most valuable features are session and password management."
"Safeguard is a mature solution and is implemented by a large number of customers."
"The technical support for this solution is very good."
"Privileged Access Suite's best feature is it's straightforward to use."
 

Cons

"Professional training and certification would be great."
"The configuration is difficult."
"Fudo PAM’s scalability is not very strong."
"I would like to see better server management. You have to know exactly what you're looking for to get the right server."
"The stability is not very good."
"Professional training and certification would be great."
"The configuration is difficult."
"To tell you the truth, I find that Fudo is not very stable and we had some issues during the implementation."
"Privileged Access Suite's interface could be better."
"Product management should be improved."
"Product management should be improved."
"I rate the technical support a six out of ten. The technical support of One Identity depends on the case; if it is product-related, it takes quite a while, and they have to go back to the product management team."
"There is a new trend of not having any privileged users or accounts."
"Privileged Access Suite's interface could be better."
 

Pricing and Cost Advice

"The pricing is great. We've been given discounts that make it cheaper than using any other solution."
Information not available
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
894,738 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Comms Service Provider
13%
Government
13%
Financial Services Firm
10%
Computer Software Company
9%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Also Known As

Fudo Privileged Access Management
No data available
 

Overview

 

Sample Customers

KFC, BP, Santander, Burger King, ING, Starbucks, Yahoo, DHL
University of East Anglia, nForce Secure, dunnhumby
Find out what your peers are saying about Fudo PAM vs. One Identity Privileged Access Suite for Unix and other solutions. Updated: April 2026.
894,738 professionals have used our research since 2012.