We use it for controlling the client sessions into our data center.
Networking and Security Engineer at a tech services company with 1-10 employees
Reasonable price, easy to deploy, and useful for session management
Pros and Cons
- "We deployed it into our company for controlling a client's behavior in our data center. It is very useful to control their connections, such as RDP."
- "We can't review or audit HTTP and HTTPS. This functionality should be added so that we can review and audit HTTP and HTTPS."
What is our primary use case?
What is most valuable?
We deployed it into our company for controlling a client's behavior in our data center. It is very useful to control their connections, such as RDP.
What needs improvement?
I requested for an evaluation license, but no one responded to me.
We can't review or audit HTTP and HTTPS. This functionality should be added so that we can review and audit HTTP and HTTPS.
For how long have I used the solution?
I have been using this solution for less than one year.
Buyer's Guide
One Identity Safeguard
August 2025

Learn what your peers think about One Identity Safeguard. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,384 professionals have used our research since 2012.
What do I think about the stability of the solution?
It is stable.
What do I think about the scalability of the solution?
It is scalable. It scales well in our company.
How are customer service and support?
I requested them for an evaluation license, but no one responded to me. They didn't give me an evaluation license.
Which solution did I use previously and why did I switch?
I have some knowledge of Wallix. It is a competitor of One Identity. They have similar functionalities, but I didn't explore it too much.
How was the initial setup?
It was easy. There were no problems. It is easy to navigate through the web interface.
What's my experience with pricing, setup cost, and licensing?
As compared to other products, it is reasonable, but the training sessions are too expensive.
What other advice do I have?
I haven't used other products, but I would highly recommend One Identity SPS.
I would rate it an eight out of 10.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. partner

Software Solutions Architect at a computer software company with 11-50 employees
Simple deployment, responsive support, and scalable
Pros and Cons
- "I have found the most useful feature of One Identity Safeguard to be Privileged Sessions."
- "When we compare One Identity Safeguard with Cyberark, we know CyberArk has other tools or other features that are more complex and more useful for the customers. For example, I have one customer that wants to elevate the permission that is available in CyberArk."
What is most valuable?
I have found the most useful feature of One Identity Safeguard to be Privileged Sessions.
What needs improvement?
When we compare One Identity Safeguard with Cyberark, we know CyberArk has other tools or other features that are more complex and more useful for the customers. For example, I have one customer that wants to elevate the permission that is available in CyberArk.
Another example is, I have one potential customer that wants to use some feature that is available only in CyberArk. The scenario is one user request a patient, however, that user doesn't have the permissions. In that request, he wants to request more permissions elevation and more rights under the live connection. This can be done in CyberArk and not in One Identity Safeguard.
We need to allow more permissions for the user who requests access for the previous account in a live connection.
CyberArk gives stronger features for safeguarding at this moment.
For how long have I used the solution?
I have been using One Identity Safeguard for approximately one year.
What do I think about the stability of the solution?
One Identity Safeguard is a stable solution.
What do I think about the scalability of the solution?
I have found One Identity Safeguard to be scalable.
How are customer service and support?
I have contacted support. I can create tickets for support and in approximately one hour, I have a response from the support. They are very quick.
Which solution did I use previously and why did I switch?
I have previously used Cyberark.
How was the initial setup?
The initial setup of One Identity Safeguard was simple. In one week we can be ready to fully operate.
What other advice do I have?
My advice to others wanting to implement this solution is to do the implementation slowly and concentrate.
I rate One Identity Safeguard a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Buyer's Guide
One Identity Safeguard
August 2025

Learn what your peers think about One Identity Safeguard. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,384 professionals have used our research since 2012.
Works with 10,001+ employees
Session auditing and replay capabilities help to secure our production environment
Pros and Cons
- "All sessions are audited and they are indexed/searchable through the GUI."
- "Monitoring of the platform should be easier and more functional so that you can have a clear picture of the running service."
What is our primary use case?
We use this solution to separate the office environment from the production environment with a secure network zone. All user sessions go through One Identity Safeguard before they can reach the production environment. All sessions are audited and they are indexed/searchable through the GUI. Some of the data are transferred to our SIEM solution. For the moment we use the product for RDP and SSH sessions. We are going to use it for Citrix farms also in transparent mode.
How has it helped my organization?
All user sessions are going through Safeguard. They are all audited and secured with forcing the minimum security settings on the side of the user. With this setup, you can easily secure all of the connections to the production environment from the office. Especially if you have a lot of different places connecting to the production environment, it is a PCI DSS requirement that you secure the flow. In our company we already audited the product as part of the PCI DSS certification.
What is most valuable?
The most valuable feature is auditing the sessions. All of the sessions (RDP, SSH, Citrix) can be audited and replayed on demand.
Complete indexing on SSH sessions means that all commands are searchable after indexing.
What needs improvement?
Management of the farm of appliances. When you have more than one server to handle the traffic, you need to configure everything on each console and maintain seperately. The cluster feature is coming in the next versions, until then you can handle with some scripts but its not straight forward. In case you want to use a farm of appliances instead of one you should consider this.
Monitoring of the platform should be easier and more functional so that you can have a clear picture of the running service. Again when you have a farm of appliances you need to have all the monitoring data centrally so you know what is happening with the overall service. This feature is missing. You have to go on each server to see what is the status there.
For how long have I used the solution?
We have been using this solution for two years.
What do I think about the stability of the solution?
This is an extremely stable product. Outages depend only on your environment. The service can run smoothly forever, depending on your company's setup and possible maintenance outages.
What do I think about the scalability of the solution?
No problem to scale. It's always a good option to use a load balancer in front of the solution to handle the traffic.
How are customer service and technical support?
Our experience with technical support has been extremely good.
Which solution did I use previously and why did I switch?
This was the first implementation of such a product in the company.
How was the initial setup?
Setup is straightforward as long as you plan correctly.
What about the implementation team?
The initial setup was with the vendor. They have extremely good knowledge of the product and provide good support.
What was our ROI?
This solution provides PCI-DSS compliance, so ROI can be considered very good.
What's my experience with pricing, setup cost, and licensing?
The full license is expensive but if you plan to use it in a big organization then it is the best option because it is more flexible.
Which other solutions did I evaluate?
More options where evaluated, like Centrify and CyberArk, before we choose this solution.
What other advice do I have?
Before you decide, do a full analysis of your requirements and see if the product fulfills them. Performing such an analysis after the fact is going to be difficult.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
IT Security Consultant at a tech services company with 51-200 employees
Efficient and stable with excellent technical support
Pros and Cons
- "The solution's most valuable features are the efficiency and the quality of the recording."
- "I would like to see an adjustment with more enterprise architecture. You can buy multiple appliances but you can not fully separate different functions, so scaling might be a bit more complicated."
What is our primary use case?
We primarily use the solution for managing and monitoring privileged users, both internal and external.
How has it helped my organization?
Gave much more visibility over who is doing what and more granular control over external support engineers.
What is most valuable?
The solution's most valuable features are the efficiency and the quality of the recording.
What needs improvement?
I would like to see an adjustment with more enterprise architecture. Currently for SPS (SafeGuard for Privileged Sessions) there is only a single appliance option (both virtual and physical). It can be scaled using a load balancer to handle huge amount of sessions (although the device is quite efficient), but it also means you will need to purchase multiple boxes. It would be beneficial to have segregated modules as an option and you could buy and implement them separately. For example: trap module (proxy), audit module (search interface), storage module (store and encrypt recordings), etc.
For how long have I used the solution?
I've been using the solution for over three years with multiple customers and installations.
What do I think about the stability of the solution?
The stability of the solution is good.
What do I think about the scalability of the solution?
If your current architecture is not designed for this, then it can it may be difficult to expand beyond a certain amount. Our current biggest deployment is for thousands of users.
How are customer service and technical support?
Technical support is brilliant. They are very helpful.
Which solution did I use previously and why did I switch?
I was using other solutions in a lab environment for some demos and comparisons, but in real practice, I have not integrated other solutions.
How was the initial setup?
The initial setup is quite straightforward. However, to figure out how to use it, a consultant or an integrator for new users is highly advised.
What about the implementation team?
We're integrators for the solution. We help clients implement it.
Which other solutions did I evaluate?
Yes, I made some comparison on CyberArk, BeyondTrust, SSH and CA.
What other advice do I have?
We use the on-premises deployment model. We're an integrator company for this solution.
In terms of advice, I'd say new users should involve the integrator architecture team from the beginning. From a technical perspective, you need to have discussions with the network team from the beginning.
I'd rate the solution nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner and integrator
Head of Information Security at a financial services firm with 11-50 employees
Enables us to implement encryption protocols across channels
Pros and Cons
- "The most unique and valuable features are the upstream and downstream throughput capacities; the Safeguard platform provides agile integration. In actuality, all the features are valuable. They're good, user-friendly."
- "Our experience with technical support has been disappointing. We require more prompt and faster response times. We require answers to our questions right away but we haven't received that level of support."
What is our primary use case?
The primary use case for our One Identity Safeguard solution is to optimize security across private accounts, accounts which can be secured upstream and downstream. The solution enables us to implement encryption protocols across channels. It is designed so that depending on the cryptographic case, different policies can be applied in correlation.
How has it helped my organization?
I don't think it's improved our organization internally. I've had to suspend workflows and focus my time and attention on creating technical, instructional, documentation regarding user procedures and practices.
What is most valuable?
The majority of the features offered with this solution are the same as with other similar systems. The most unique and valuable features are the upstream and downstream throughput capacities; the Safeguard platform provides agile integration.
In actuality, all the features are valuable. They're good and user-friendly.
What needs improvement?
The technical support for this solution needs to be immediate, intuitive, and responsive especially as it refers to supporting ticket submissions and processing.
Furthermore, we've had trouble understanding how certain policy framework applies. I would like to see clearly laid out policies or better support and explanations around policy dynamics.
The stability and downtime of the solution could also be upgraded to include a messaging function which would give users a clear understanding of what's happening without having to navigate to a particular section of the page.
Lastly, I would also like to see the price reduced.
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
It's very stable. There are about 150 users, mostly administration, currently using this solution in our company. We don't encounter many problems with the system.
What do I think about the scalability of the solution?
I am encountering issues when it comes to the scalability of the solution.
How are customer service and technical support?
Our experience with technical support has been disappointing. We require more prompt and faster response times. We require answers to our questions right away but we haven't received that level of support.
How was the initial setup?
The initial setup was very easy. We followed the given instruction protocol. We also used white papers when necessary for clarification and better understanding. It only took us one month to implement.
What about the implementation team?
We used an integrator for the deployment. It was a good experience.
What's my experience with pricing, setup cost, and licensing?
Setup cost, pricing and licensing are all very expensive.
What other advice do I have?
We are very pleased with the Safeguard platform feature. You can't find this technology anywhere else.
On a scale from one to ten, one being the worst and ten being the best, I would give this product a nine rating. If the technical support was better I'd give it a 10 out of 10.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Head of Department at a financial services firm with 10,001+ employees
Supports Linux and the scalability is great
Pros and Cons
- "The transparent mode for privileged sessions is a very good solution."
- "On a scale of one to ten, the stability is an eight."
What is most valuable?
One of the most valuable features is that it supports the Linux operating system. Also, the transparent mode for privileged sessions is a very good solution.
What do I think about the stability of the solution?
On a scale of one to ten, the stability is an eight.
What do I think about the scalability of the solution?
The scalability is great.
How are customer service and technical support?
Technical support is great. We use the case platform.
Which solution did I use previously and why did I switch?
We didn't switch from another product. Using this solution has been a great decision in helping with our tasks.
How was the initial setup?
Deployment of the solution took two to three months. Our engineers installed it.
What other advice do I have?
It's a great product for our industry, which is banking.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Security Consultant at Controlware GmbH
There is a very logical, clear user interface, and the integration of scripts is thoughtfully implemented
Pros and Cons
- "It is easy to manage. There is a very logical, clear user interface. Also, the integration of scripts is thoughtfully implemented. Overall, it's a nice product to manage."
- "The technical support is tremendous."
- "The high availability function of the box requires a long time to switch over from one appliance to another."
- "The automated change of the passwords, which is now integrated, could be improved to be more flexible regarding different systems."
What is our primary use case?
The primary use case for our customers is to monitor and audit external vendors, as well as keep track of internal actions when privileged user accounts are being used to access systems internally.
How has it helped my organization?
For our customers, it's much easier for them to be in line with audits. A lot of our customers work in the medical field, where it is important for them to keep track of external vendors, e.g., maintaining medical appliances inside of a hospital. This solution gives them real confidence that they can keep their customers safe and their data protected.
What is most valuable?
There are a variety of protocols that it supports.
The video-like stream and audit capabilities, in combination with its indexing capabilities to search for critical events quickly, are valuable features.
The transparent mode for privileged sessions is really nice because it keeps the integration quite smooth. Also, users don't have to change the way that they currently are used to working.
It is easy to manage. There is a very logical, clear user interface. Also, the integration of scripts is thoughtfully implemented. Overall, it's a nice product to manage.
What needs improvement?
There are some features which are still missing compared to other competitors. For example, some customers need legacy VPN authentication capabilities.
The automated change of the passwords, which is now integrated, could be improved to be more flexible regarding different systems.
What do I think about the stability of the solution?
The overall stability has improved quite a bit throughout the years. The appliances run well, both virtual and physical. The product is pretty good, especially compared to other vendors and products.
What do I think about the scalability of the solution?
Because of the nature of the connections being monitored, you can load balance it quite well. It is easy to shift the load from one appliance to another. However, the high availability function of the box itself requires a long time to switch over from one appliance to another. So, there is room for improvement
How are customer service and technical support?
The technical support is tremendous. For large projects, we have had some challenges, but we were never left alone by the vendor. Also, in one case for a small customer, One Identity assigned one engineer to help with assessing the AD infrastructure of our customers, which was really helpful.
How was the initial setup?
The install and deployment are quite rapid. For a smaller project, sometimes it only takes us about two to three days to implement and get the policies inline. For larger projects, it's actually also not that long for the appliance itself. The product requires a lot of changes on the management side, how vendors work, and how you need to counsel people how to use it, especially in Germany. Then, they are monitored, which is the quite larger portion of it.
For our implementations in Germany, we implement an explicit model most of the time. Therefore, the transparent mode for privileged sessions has not been used that much in my projects.
What other advice do I have?
Look at the entire portfolio, since it has changed so rapidly. The capabilities have improved quite a bit. You need to make sure not to miss out on any features.
The Approval Anywhere for Privileged Passwords is a really good concept, because it enables admins to do other work, be more flexible, and work from home. However, we don't have any real experience with it yet, as we are looking into it at the moment.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner.
Identity & Access Manager at Reist Telecom
We are able to demonstrate what has happened on systems and who did what, but we want to be able to generate CSRs from the interface for certificates
Pros and Cons
- "The transparent mode for privileged sessions is one of the best things for customers, because they don't see the system in-between."
- "The system is easy to manage, as it is not a system that you will change everything all of a sudden. It evolves most of the time with customer requests."
- "For some users, the physical appliance has been a bit buggy."
- "We would like to be able to generate certificate signing requests (CSRs) from the interface for certificates."
What is our primary use case?
We primarily use One Identity Safeguard for Privileged Sessions (SPS) for managing our customers' access to their critical systems.
How has it helped my organization?
We are able to demonstrate what has happened on the systems and who did what, when we have to investigate, in regards to audits using evidence.
What is most valuable?
- Acting as a proxy
- Session encryption
- Flexibility of usage
The transparent mode for privileged sessions is one of the best things for customers, because they don't see the system in-between. Thus, it is transparent for them.
The system is easy to manage, as it is not a system that you will change everything all of a sudden. It evolves most of the time with customer requests.
What needs improvement?
- We have not yet found the solution to be extensible through cloud-delivered services.
- Our external indexers are able to integrate with a hardware security module (HSM), which is good. What we have now requested is the integration of HSM with the SPS solution to be able to not have to manage certificates and the private key outside of any tamperproof system.
- We would like to be able to generate certificate signing requests (CSRs) from the interface for certificates.
- We would like to be able to manage the lifecycle of the archived audit traits. If they are on the box, the cleanup and archiving policies are applied, as soon as they are archived on the external share, this does not apply. We need our customers to not have to manually delete these archives.
- From a web interface perspective, we would like to be able to duplicate connections, so we can reorder them.
What do I think about the stability of the solution?
We have not had a major issues regarding stability once we migrated our users onto the virtual solution. However, for some users, the physical appliance has been a bit buggy.
What do I think about the scalability of the solution?
As of now, we use mainly virtual and have not tested the scalability and high availability, because it is a new thing.
How are customer service and technical support?
The technical support is good. There has been great improvement to all the knowledge base articles available. Therefore, we are able to find a lot of solutions already when we create support requests.
It takes us a long time to make the people from product management and development to understand our needs, e.g., integrating this product with HSM.
Which solution did I use previously and why did I switch?
Because we are a service provider, we have to demonstrate that our systems are really tamperproof. We had that experience previously, and now again, with One Identity SPS, as the product fits our needs.
How was the initial setup?
The initial setup is quite simple, not complex. The installation documentation is good, so the installation is okay. You just need to read the documentation, understand how it works, and how it has to be integrated. Once you do your homework, it's quite easy.
What about the implementation team?
We are the integrator for the deployment.
To install and deploy the solution for the customers, we count one day for a workshop with all the people involved: network, business users, IT, support, etc. Then, for the implementation, it can take another one to five days.
What was our ROI?
It is the life of our customers because it brings a lot of security. So, the return on investment is really on all aspects of compliance, security, and audit.
Which other solutions did I evaluate?
We implement this solution upon customer request.
What other advice do I have?
Test it and its competitors. You will probably choose SPS.
Both the search functionality and speed have been greatly improved.
We are not using privileged passwords.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner.

Buyer's Guide
Download our free One Identity Safeguard Report and get advice and tips from experienced pros
sharing their opinions.
Updated: August 2025
Product Categories
Privileged Access Management (PAM) User Entity Behavior Analytics (UEBA) Non-Human Identity Management (NHIM)Popular Comparisons
CyberArk Privileged Access Manager
IBM Security QRadar
Delinea Secret Server
One Identity Active Roles
BeyondTrust Endpoint Privilege Management
WALLIX Bastion
BeyondTrust Privileged Remote Access
ARCON Privileged Access Management
ManageEngine PAM360
Delinea Privileged Access Service
Proofpoint Insider Threat Management
Symantec Privileged Access Manager
One Identity Privileged Access Suite for Unix
Buyer's Guide
Download our free One Identity Safeguard Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- Why should one choose One Identity Safeguard and One Identity Active Roles for the banking and insurance industry?
- What is One Identity Safeguard's lower-level architecture scheme?
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- How was the 2020 Twitter Hack carried out? Could it have been prevented?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?
- Is BeyondTrust Endpoint Privilege Management really expensive compared to other tools or software?