Fudo PAM vs One Identity Safeguard comparison

Cancel
You must select at least 2 products to compare!
Fudo Security Logo
1,113 views|648 comparisons
One Identity Logo
3,655 views|1,588 comparisons
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Fudo PAM and One Identity Safeguard based on real PeerSpot user reviews.

Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Fudo PAM vs. One Identity Safeguard Report (Updated: March 2024).
765,386 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"We are convinced that Fudo PAM is better than competing products like WALLIX.""it's perfect to control and administer computers in our company.""Fudo PAM was the most flexible and intuitive interface out of all of the products in the PAM sector.""Session recording and password management are the two main aspects.""The main benefit of the solution is that it's very easy to set up. It only takes a couple of hours to install everything."

More Fudo PAM Pros →

"One Identity Safeguard is stable and provides great performance.""The most unique and valuable features are the upstream and downstream throughput capacities; the Safeguard platform provides agile integration. In actuality, all the features are valuable. They're good, user-friendly.""It is generally easy-to-use and install.""One of the most important things is that it is very easy to use and install. It is also agentless, so all of the operations happen more smoothly than any other product.""We use the solution’s Approval Anywhere feature which enables us to add an extra layer of security for critical passwords without adding time-consuming approval processes. By using this platform, if someone goes on a vacation, out of office, or needs urgent/planned leave, then our setup will select the functions tied to that person and automatically delegate them to the next person. That person can start performing that duty based on their access. No sharing of passwords is required.""There are numerous valuable data protection features, including the content and information that offer us more scalable protection as needed.""I have found One Identity Safeguard to be stable.""I like Safeguard's snapshot feature that enables us to review the last time an application was opened and by whom. If there are any issues, we can look behind the scenes to see what has been done. We can suspend a user's access or close off a server."

More One Identity Safeguard Pros →

Cons
"The stability is not very good.""Professional training and certification would be great.""I would like to see better server management. You have to know exactly what you're looking for to get the right server.""Fudo PAM’s scalability is not very strong.""The configuration is difficult."

More Fudo PAM Cons →

"When we compare One Identity Safeguard with Cyberark, we know CyberArk has other tools or other features that are more complex and more useful for the customers. For example, I have one customer that wants to elevate the permission that is available in CyberArk.""For some users, the physical appliance has been a bit buggy.""Transparent mode was too cumbersome, so I don't foresee us being able to use it. On paper when we were initially talking about it, it was definitely going to be the preferred method until we realized the burden it would be on our network guys. Then, we had to step back and reevaluate what we wanted to do. That's when we changed our approach to use the RD Gateway feature.""The deployment affects our privileged users because it takes a long time for them to request privileges, which impacts the SLA.""The multilanguage functionality does not support the Arabic language, even though this solution is deployed in an Arabic region.""We can't review or audit HTTP and HTTPS. This functionality should be added so that we can review and audit HTTP and HTTPS.""The interface is better now, but it still could be improved a lot. It needs more organization, menus, automatic refresh of information, and Web 2.0.""We currently have a problem with the Active Directory integrations on Windows. Some of our users need to be logged with Active Directory, but we are having communication issues between One Identity and Active Directory. It seems that Active Directory is not well-integrated."

More One Identity Safeguard Cons →

Pricing and Cost Advice
  • "The pricing is great. We've been given discounts that make it cheaper than using any other solution."
  • More Fudo PAM Pricing and Cost Advice →

  • "Setup cost, pricing and licensing are all very expensive."
  • "Our licensing costs are on a yearly basis."
  • "It was definitely cheaper than the other two products that we evaluated."
  • "They offer a fair price for a robust solution."
  • "The full license is expensive but if you plan to use it in a big organization then it is the best option because it is more flexible."
  • "It is a bit on the pricey side, but you get what you pay for. You don't want to get anything too cheap because then you get cheap stuff and cheap support. That really never helps anybody."
  • "The pricing is about $80,000 per 100 servers. There are few elective costs."
  • "We have a yearly license. The cost depends on how much a company wants to invest in technology. In our organization, we believe in modern digitization and automation processes so we found it affordable. One Identity was not that much less than other solutions and it is not a cheap solution. There were number of cheaper solutions. However, it's the most effective, according to our evaluation."
  • More One Identity Safeguard Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
    765,386 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Session recording and password management are the two main aspects.
    Top Answer:There are some areas for improvement in the Fudo PAM cake that we want to improve in terms of scaling. Scaling is an optional feature because we closed some big projects with enterprise customers from… more »
    Top Answer:The main use case is for protecting privileged user access, such as securing remote access services. Another important use case is when we work with third-party users and need to provide password… more »
    Top Answer:The identity discovery is good, and the performance is pretty good value.
    Top Answer:They have comparable pricing. All identity products are essentially priced in a similar way. It's a per-user base. Usually, they start at one price, and when you start pricing the competition, you… more »
    Top Answer:Something for One Identity to look at is having integration guidelines for how to logically group accounts. This is always something you need people to do. It would be especially helpful when you have… more »
    Ranking
    Views
    1,113
    Comparisons
    648
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Views
    3,655
    Comparisons
    1,588
    Reviews
    15
    Average Words per Review
    907
    Rating
    7.7
    Comparisons
    Also Known As
    Fudo Privileged Access Management
    Learn More
    Overview

    We are the leading vendor of innovative IT security solutions. We focus on privileged access management and privileged session monitoring, combined under the Fudo Security brand. The Fudo product line merges innovation and an intuitive user experience with strong security features. These are the hallmarks of the future designs of the company.

    One Identity Safeguard is an integrated system that combines a secure, toughened password safe and a session management and monitoring solution with threat detection and analytics into one integrated solution. It stores, manages, records, and analyzes privileged access in a secure manner.

    One Identity Safeguard Features

    One Identity Safeguard has many valuable key features. Some of the most useful ones include:

    • Policy-based release control: Seek access and approve privileged passwords and sessions using a secure online browser that supports mobile devices. Depending on your organization's policies, requests can be authorized immediately or require dual/multiple approvals. You can set One Identity Safeguard to match your personalized needs, whether your policies consider the requestor's identity and level of access, the time and day of the request attempt, and/or the specific resource requested. You can also enter reason codes and/or connect to ticketing systems.

    • Vault for personal passwords: In a free personal password vault, every one of your employees can keep and generate random passwords for non-federated business accounts. This allows your company to use a sanctioned tool to securely share and retrieve passwords, giving you much-needed security and visibility into your company's accounts.

    • Auditing, recording, and replaying entire sessions: All session activity is collected, indexed, and kept in tamper-proof audit trails that can be viewed like a video and searched like a database, down to the keystrokes, mouse movements, and windows viewed. Security teams can search across sessions for certain events and play the recording from the exact point where the search criterion happened. For forensics and compliance purposes, audit trails are encrypted, time-stamped, and cryptographically signed.

    • Approval in any location: Approve or refuse requests from anywhere, using One Identity Starling Two-Factor Authentication, without having to connect to a VPN.
    • Instantly on: Safeguard for Privileged Sessions can be implemented in a transparent manner, with no changes to user workflows required. Safeguard, when acting as a proxy gateway, can act as a network router, unseen to both the user and the server. Admins can continue to use their normal client programs and access target servers and systems without disrupting their everyday routine.

    • Biometrics of user behavior: Even when performing identical operations like typing or moving a mouse, each person has his or her own unique pattern of behavior. These behavioral characteristics are examined by the Safeguard algorithms. Keystroke dynamics and mouse movement analysis aid in the detection of security breaches while also acting as a continuous biometric authentication system.

    • Favorites: Right from the login screen, quickly access the passwords you use the most. You can combine many password requests into a single favorite, allowing you to log into all of your accounts with a single click.

    • Discovery options: With host, directory, and network-discovery options, you can quickly find privileged accounts or systems on your network.

    Reviews from Real Users

    One Identity Safeguard stands out among its competitors for a number of reasons. Two major ones are its stability and its connection control. PeerSpot users take note of the advantages of these features in their reviews:

    One PeerSpot reviewer, a Software Solutions Architect at a computer software company, writes, “I have found the most useful feature of One Identity Safeguard to be Privileged Sessions. One Identity Safeguard is a stable solution.” He adds, “I rate One Identity Safeguard a nine out of ten.”

    Walid S., Networking and Security Engineer at a tech services company, mentions of the solution, “We deployed it into our company for controlling a client's behavior in our data center. It is very useful to control their connections, such as RDP.”

    Offer
    Learn more about Fudo PAM
    Securely store, manage, record and analyze privileged access

    Prevent security breaches and limit damage by putting in place a privileged access management solution. Get a free 45-day trial, or request a demo of One Identity SafeGuard.

    Sample Customers
    KFC, BP, Santander, Burger King, ING, Starbucks, Yahoo, DHL
    Cavium
    Top Industries
    VISITORS READING REVIEWS
    Financial Services Firm20%
    Computer Software Company16%
    Energy/Utilities Company9%
    Comms Service Provider7%
    REVIEWERS
    Financial Services Firm42%
    Healthcare Company16%
    Manufacturing Company11%
    University5%
    VISITORS READING REVIEWS
    Computer Software Company20%
    Financial Services Firm12%
    Government7%
    Manufacturing Company7%
    Company Size
    VISITORS READING REVIEWS
    Small Business27%
    Midsize Enterprise19%
    Large Enterprise53%
    REVIEWERS
    Small Business37%
    Midsize Enterprise24%
    Large Enterprise39%
    VISITORS READING REVIEWS
    Small Business24%
    Midsize Enterprise20%
    Large Enterprise57%
    Buyer's Guide
    Fudo PAM vs. One Identity Safeguard
    March 2024
    Find out what your peers are saying about Fudo PAM vs. One Identity Safeguard and other solutions. Updated: March 2024.
    765,386 professionals have used our research since 2012.

    Fudo PAM is ranked 21st in Privileged Access Management (PAM) with 5 reviews while One Identity Safeguard is ranked 5th in Privileged Access Management (PAM) with 38 reviews. Fudo PAM is rated 8.0, while One Identity Safeguard is rated 8.2. The top reviewer of Fudo PAM writes " Works with SCTP, STTPS, SQL, and MySQL protocols". On the other hand, the top reviewer of One Identity Safeguard writes "Provides us with centralized storage of secrets and credentials, and visibility into the use of privileged access". Fudo PAM is most compared with WALLIX Bastion, CyberArk Privileged Access Manager, Delinea Secret Server, ManageEngine PAM360 and Teleport, whereas One Identity Safeguard is most compared with CyberArk Privileged Access Manager, WALLIX Bastion, Delinea Secret Server, BeyondTrust Privileged Remote Access and ManageEngine PAM360. See our Fudo PAM vs. One Identity Safeguard report.

    See our list of best Privileged Access Management (PAM) vendors.

    We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.