No more typing reviews! Try our Samantha, our new voice AI agent.

KeeperPAM vs One Identity Safeguard comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

KeeperPAM
Ranking in Privileged Access Management (PAM)
21st
Average Rating
8.0
Number of Reviews
1
Ranking in other categories
No ranking in other categories
One Identity Safeguard
Ranking in Privileged Access Management (PAM)
2nd
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
57
Ranking in other categories
User Entity Behavior Analytics (UEBA) (5th), Non-Human Identity Management (NHIM) (1st)
 

Mindshare comparison

As of April 2026, in the Privileged Access Management (PAM) category, the mindshare of KeeperPAM is 1.6%, up from 0.4% compared to the previous year. The mindshare of One Identity Safeguard is 4.4%, up from 4.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
One Identity Safeguard4.4%
KeeperPAM1.6%
Other94.0%
Privileged Access Management (PAM)
 

Featured Reviews

Mahesh-Subramanian - PeerSpot reviewer
Vice President at Chargebacks911
Offers security audit that shows us how many passwords are weak and how often they're being changed
There are a couple of things. One is the BreachWatch feature. It's one of the most useful things because it shows us who on our team has weak or compromised passwords. So, it checks the passwords and helps improve them. There's also a security audit that shows us how many passwords are weak and how often they're being changed. Some people haven't changed their passwords for months, even though applications force them to change every 45 or 90 days. So you can catch those issues and warn them. Most applications allow for rotation, but some don't. I've seen people use the same password for years. At least Keeper tells us these passwords haven't been rotated, and we can warn them to change them manually since we can't force people to change the password.
ST
Senior Information Technology Consultant at Helse Nord IKT
Centralized privileged access has improved control and now supports secure vendor billing oversight
The transparent mode is a seamless approach when using it. We have some issues with it, but we are working on it to make it work for us. Managing remote access for privileged users with the secure remote access feature is both easy and hard depending on the scenario we face. We have some systems that are easy and take not even a minute to set up, while others take a bit longer. We are in the middle of integrating One Identity Safeguard with the IGA solution, Identity Manager. We have some A2A setups, but it is not optimal. We are using RPA for developers, not actually RPA accounts, but that is something we are working on. We are also using the service account password rotation on the asset to some degree, and we are exploring options there. For integrating One Identity Safeguard, figuring out how password rotation works is a bit difficult because we have to make custom integrations. After that, it was no problem really. For the A2A use, it is not as easy as using something like HashiCorp's password management tools. It is mostly for certain features in One Identity Safeguard that I would like some improvements. Some of the things you can do in entitlements, there is a lot you can do there, but not everything is optimal. You have to have duplicates of a lot of things to make it work the way you want.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"BreachWatch feature is one of the most useful things because it shows us who on our team has weak or compromised passwords."
"The auditing and approval mechanisms are features we did not have before and are greatly appreciated."
"This is an extremely stable product."
"One of the most important aspects is that it is very easy to use and install. It is also agentless, so all of the operations happen more smoothly than any other product."
"We were able to take an environment where we had several hosts managed by different people and consolidate that into a single, centrally managed solution."
"We are able to log and get reporting on all privileged activity that is being performed. We like the fact that we can leverage the session recording feature, which is especially valuable when we're dealing with third-party vendors that have to remote into our our boxes and servers to do any work on behalf of the bank. Now, we can record everything they are doing to ensure that they're only doing the changes that were needed. In addition, we use it to leverage knowledge transfer with our internal staff."
"We use the solution’s Approval Anywhere feature which enables us to add an extra layer of security for critical passwords without adding time-consuming approval processes. By using this platform, if someone goes on a vacation, out of office, or needs urgent/planned leave, then our setup will select the functions tied to that person and automatically delegate them to the next person. That person can start performing that duty based on their access. No sharing of passwords is required."
"The customer service and technical support are very good."
"We deployed it into our company for controlling a client's behavior in our data center. It is very useful to control their connections, such as RDP."
 

Cons

"The final implementation was challenging because we had to roll it out to three different departments within the same umbrella, each with its own domains."
"The automated change of the passwords, which is now integrated, could be improved to be more flexible regarding different systems."
"We would like to be able to generate certificate signing requests (CSRs) from the interface for certificates."
"One Identity Safeguard could be improved by simplifying the user interface and initial configuration process, especially for first-time users."
"Improving the way we develop new connectors for non-typical systems would be beneficial."
"We can't review or audit HTTP and HTTPS. This functionality should be added so that we can review and audit HTTP and HTTPS."
"Our experience with technical support has been disappointing. We require more prompt and faster response times."
"The high availability function of the box requires a long time to switch over from one appliance to another."
"We have not had any issues with the core product itself, but there is an add-on called SCALUS, which is quite critical to the user experience, and that does not work. They have been having issues with that for quite a long time, like months. That is not great at all."
 

Pricing and Cost Advice

"It's good value for money."
"The license is very expensive for us, partly due to inflation and partly because of the exchange rate between the Dollar and the Iranian Rial. We purchased a perpetual license that we've been using up until now, but I believe that we are not going to update it in the future. Instead, we plan to find another third-party to support us with the license, in the sense that we would have access to their license as a shared agreement."
"It was definitely cheaper than the other two products that we evaluated."
"We bought their other products, so it was not that expensive. It is one of those where the more you buy, the cheaper it is."
"The full license is expensive but if you plan to use it in a big organization then it is the best option because it is more flexible."
"The license is around $3,000 per month."
"We have a yearly license. The cost depends on how much a company wants to invest in technology. In our organization, we believe in modern digitization and automation processes so we found it affordable. One Identity was not that much less than other solutions and it is not a cheap solution. There were number of cheaper solutions. However, it's the most effective, according to our evaluation."
"One Identity Safeguard is expensive and the cost goes up as we scale."
"It is cheaper than CyberArk. Its price is fair."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
885,837 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Media Company
11%
Energy/Utilities Company
8%
Computer Software Company
8%
University
11%
Financial Services Firm
8%
Computer Software Company
7%
Outsourcing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business44
Midsize Enterprise22
Large Enterprise22
 

Questions from the Community

What needs improvement with KeeperPAM?
We had some challenges with the initial setup.
What is your primary use case for KeeperPAM?
We primarily use it to ensure that all our people store their passwords in KeeperPAM and do not have multiple sources for their passwords, including Excel. We also share passwords through KeeperPAM...
What is your experience regarding pricing and costs for One Identity Safeguard?
We have a separate department that studies setup costs for each product, but as far as my information goes, the pricing and setup costs are very good.
What needs improvement with One Identity Safeguard?
The most common improvement needed is for upgrades. One Identity Safeguard's desktop client should have a faster and easier upgrade process that ensures compatibility.
What is your primary use case for One Identity Safeguard?
One Identity Safeguard serves as our Privileged Access Management solution to enforce session management for administrators and allow them to access our systems in recorded sessions, which secures ...
 

Overview

 

Sample Customers

Information Not Available
Cavium
Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM). Updated: March 2026.
885,837 professionals have used our research since 2012.