Try our new research platform with insights from 80,000+ expert users

Fudo PAM vs One Identity Safeguard comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Fudo PAM
Ranking in Privileged Access Management (PAM)
22nd
Average Rating
8.0
Reviews Sentiment
7.0
Number of Reviews
5
Ranking in other categories
No ranking in other categories
One Identity Safeguard
Ranking in Privileged Access Management (PAM)
2nd
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
52
Ranking in other categories
User Entity Behavior Analytics (UEBA) (6th), Non-Human Identity Management (NHIM) (3rd)
 

Mindshare comparison

As of February 2026, in the Privileged Access Management (PAM) category, the mindshare of Fudo PAM is 2.5%, up from 2.4% compared to the previous year. The mindshare of One Identity Safeguard is 3.9%, down from 4.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
One Identity Safeguard3.9%
Fudo PAM2.5%
Other93.6%
Privileged Access Management (PAM)
 

Featured Reviews

TD
BDM at Oberig-it
Works with SCTP, STTPS, SQL, and MySQL protocols
There are some areas for improvement in the Fudo PAM cake that we want to improve in terms of scaling. Scaling is an optional feature because we closed some big projects with enterprise customers from different countries, including Ukraine, Kaloxetine, Uzbekistan, and others. We closed projects in different areas with customers of different sizes. When we talk about enterprise customers, we should consider that they have different use cases and desires for Fudo PAM. We compared our options for customers to choose their vendors, and we discovered Fudo PAM has few scaling options. In Fudo PAM, there should be additional features for scaling and organizing remote sessions for remote systems in remote networks.
Vyas Shubham - PeerSpot reviewer
Product Manager at a computer software company with 11-50 employees
Centralized controls have improved privileged access and simplified compliant audit workflows
We use One Identity Safeguard as a central control point for all our privileged access, which helps standardize the access policies across teams and platforms. We also use it for the approval workflows, which are enforced for high-risk systems and add an extra security layer for production access. I have been using it for one and a half years. The best feature I appreciate is the session proxying and recording. It provides transparent session access for admins without exposing the real passwords. Another valuable feature is automated password rotation, which changes the credentials automatically after each use or on a schedule. It reduces the risk of leakage and reuse of passwords. Additionally, the approval workflow and the access request feature add governance with multi-level approvals for sensitive systems. These are the features that I appreciate the most. When we started using the session proxying and recording features, overall, it was a manageable and fairly smooth process for us. However, like most security platform deployments, it had a few learning curves. Session proxying and recording worked with our major systems including Windows, Linux, and network devices with minimal configuration. Some devices and services required slight changes to firewall rules and configuration to ensure the proxy could connect cleanly. Additionally, our admins needed orientation so they understood they were joining a recorded session, particularly for remote or support use. We spent considerable time adjusting the session filtering, retention settings, and naming conventions so recordings were useful and not overwhelming. These are some areas where we encountered challenges.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We are convinced that Fudo PAM is better than competing products like WALLIX."
"Session recording and password management are the two main aspects."
"Fudo PAM was the most flexible and intuitive interface out of all of the products in the PAM sector."
"The main benefit of the solution is that it's very easy to set up. It only takes a couple of hours to install everything."
"it's perfect to control and administer computers in our company."
"We use the Approval Anywhere, or cloud assistant feature and it is great. It enables us to add an extra layer of security for critical passwords without adding time to the approval process."
"The transparent mode for privileged sessions is a very good solution."
"It is generally easy-to-use and install."
"I have found the most useful feature of One Identity Safeguard to be Privileged Sessions."
"One Identity Safeguard is stable and provides great performance."
"We are able to log and get reporting on all privileged activity that is being performed. We like the fact that we can leverage the session recording feature, which is especially valuable when we're dealing with third-party vendors that have to remote into our our boxes and servers to do any work on behalf of the bank. Now, we can record everything they are doing to ensure that they're only doing the changes that were needed. In addition, we use it to leverage knowledge transfer with our internal staff."
"One Identity Safeguard has positively impacted my organization by improving our security posture, eliminating shared privileged credentials, increasing visibility into admin activity, and making compliance audits faster and more reliable."
"The initial setup is very easy."
 

Cons

"Professional training and certification would be great."
"The configuration is difficult."
"Fudo PAM’s scalability is not very strong."
"The stability is not very good."
"I would like to see better server management. You have to know exactly what you're looking for to get the right server."
"I would like to see an adjustment with more enterprise architecture. You can buy multiple appliances but you can not fully separate different functions, so scaling might be a bit more complicated."
"On a scale of one to ten, the stability is an eight."
"We have feature requests and would like to see the turnaround times on those features to be faster."
"The GUI has room for improvement because it is confusing and cumbersome."
"One Identity Safeguard can improve by having more integration with multiple devices."
"We would like to be able to generate certificate signing requests (CSRs) from the interface for certificates."
"I find it complicated to implement HTTPS monitoring because the documentation is unclear."
"The SPS could be a lot easier to administrate and the parts should be unified, from a design perspective, so that I can recognize the systems as being part of the same package. They feel like they have been forced together."
 

Pricing and Cost Advice

"The pricing is great. We've been given discounts that make it cheaper than using any other solution."
"It is cheaper than CyberArk. Its price is fair."
"The pricing is about $80,000 per 100 servers. There are few elective costs."
"Setup cost, pricing and licensing are all very expensive."
"Safeguard is cheaper than CyberArk."
"Its subscription cost is too much, and sometimes, it is very difficult to pitch the solution to the management for cost approval. If the cost is reduced a little bit, it would be easier. If its cost was less, many other organizations that currently cannot afford it would be able to use this technology. I'm sure many organizations around the globe are having issues with identity management, and it is a very difficult task for IT to manage privileged accounts."
"The full license is expensive but if you plan to use it in a big organization then it is the best option because it is more flexible."
"It is more expensive than Secret Server but way less expensive than CyberArk. As a customer, I would like the pricing to be lower, but it has a good price point."
"As compared to other products, it is reasonable, but the training sessions are too expensive."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
882,333 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
13%
Government
13%
Comms Service Provider
12%
Computer Software Company
9%
Computer Software Company
10%
University
8%
Comms Service Provider
7%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business31
Midsize Enterprise17
Large Enterprise19
 

Questions from the Community

Ask a question
Earn 20 points
What is your experience regarding pricing and costs for One Identity Safeguard?
My experience with pricing, setup cost, and licensing has been a good experience overall, as the back and forth with One Identity is something that is acceptable; other tools have options to do thi...
What needs improvement with One Identity Safeguard?
One Identity Safeguard could be improved with a password manager and an identity manager as one big access management system. I believe improvements could be made around integrating with other tools.
What is your primary use case for One Identity Safeguard?
My main use case for One Identity Safeguard is using only one module for privileged session, which we use for admins and contractors. A quick specific example of how my team uses One Identity Safeg...
 

Also Known As

Fudo Privileged Access Management
No data available
 

Overview

 

Sample Customers

KFC, BP, Santander, Burger King, ING, Starbucks, Yahoo, DHL
Cavium
Find out what your peers are saying about Fudo PAM vs. One Identity Safeguard and other solutions. Updated: February 2026.
882,333 professionals have used our research since 2012.