We use Safeguard for privileged sessions. It's primarily used as a solution for accessing our production environments.
IDM Architect at a tech company with 10,001+ employees
Extensible authentication framework enables use-case-dependent MFA
Pros and Cons
- "The extensible framework for authentication is one of the most valuable features. We use an MFA plug-in and a lot of different factors, depending on what the business use-cases are. And of course, the auditing functionality is also valuable."
- "Even though we have two nodes, there's no way to do an upgrade without taking everything completely offline. It would be nice if they could improve that."
What is our primary use case?
How has it helped my organization?
We were able to take an environment where we had several hosts managed by different people and consolidate that into a single, centrally managed solution.
What is most valuable?
The extensible framework for authentication is one of the most valuable features. We use an MFA plug-in and a lot of different factors, depending on what the business use-cases are. And of course, the auditing functionality is also valuable.
We have also found the solution to be extensible through cloud-delivered services. It's worked out well. The SPS instances we use are located on-premise, but we can still utilize them to access resources in the cloud. That's not a problem. We haven't deployed any SPS itself in the cloud, but it works fine for our cloud environments.
What needs improvement?
Feature-wise, right now, it has most of the features that we're looking for. It could improve a bit on the management side of things. One example would be when doing an upgrade. We have a highly-available appliance spare, and even though we have two nodes, there's no way to do an upgrade without taking everything completely offline. It would be nice if they could improve that.
Buyer's Guide
One Identity Safeguard
May 2025

Learn what your peers think about One Identity Safeguard. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
857,028 professionals have used our research since 2012.
What do I think about the stability of the solution?
The product has generally been stable. We have had some issues, mainly due to the types of traffic. Our end-users are doing different things through SSH tunnels that were not expected on the appliance. We've been working with support to resolve that.
What do I think about the scalability of the solution?
The product is scalable.
How are customer service and support?
Tech support has been great. They've been responsive and knowledgeable, so we've been happy with them.
How was the initial setup?
It took us about three or four weeks for the initial setup and deploy. Part of that was developing a plug-in for the multi-factor authentication. We were able to do it in a way that wasn't disruptive, with our current infrastructure. At their discretion, the end-users were allowed to move over, one-by-one. After we deployed it, it took about two months for all of the users to actually migrate over to using it.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

System Consultant at a tech services company with 1,001-5,000 employees
The initial setup is very easy
Pros and Cons
- "The initial setup is very easy."
- "The customer service and technical support are very good."
- "It needs more marketing."
What is our primary use case?
Privileged management.
How has it helped my organization?
Administrators can administrate the privileged accounts. It is a safer way to monitor the administrators.
What is most valuable?
Its hardware and compliance.
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
Stability is very good.
What do I think about the scalability of the solution?
Scalability is very good.
How are customer service and technical support?
The customer service and technical support are very good.
How was the initial setup?
The initial setup is very easy.
Which other solutions did I evaluate?
I compared different solutions, like Oracle.
What other advice do I have?
It is a good solution, but it needs more marketing.
Most important criteria when selecting a vendor:
- The support
- How long the product has been in the market.
Disclosure: My company has a business relationship with this vendor other than being a customer: Quest partner.
Buyer's Guide
One Identity Safeguard
May 2025

Learn what your peers think about One Identity Safeguard. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
857,028 professionals have used our research since 2012.
IT Security Engineer
Flexible modes can be integrated into the customer infrastructure and it supports multiple security officers.
What is most valuable?
Flexible modes are easily integrated into the customer infrastructure. It's easy to find needed information and the indexer does a good job.
Secure replays: Balabit SCB supports multiple security officers (something like senior and junior officer), who can encrypt upstream, and downstream flows, with different SSL certificates. For example, one officer can see replays, and another officer can only see replays by pressing on a key.
How has it helped my organization?
When I worked in a bank, it greatly facilitated the control admins and reduced the length of investigations.
What needs improvement?
With release 4f4a, I am pleased with the changes. The developers have spent a lot of time optimizing the interface for the convenience of users and it’s functional. Now, I think the best way to improve it will be to optimize the software, because the software begins to consume more resources (physical).
For how long have I used the solution?
I have been using Shell Control Box for more than two years.
What do I think about the stability of the solution?
By the new releases, I see that it uses some more resources, but this time it's not affected anything.
What do I think about the scalability of the solution?
We have not had any scalability issues.
How are customer service and technical support?
I rate technical support 5/5. They are quick and informative.
Which solution did I use previously and why did I switch?
I tested many another products, but there was an issue about productivity, which was critical to our choice.
How was the initial setup?
Initial setup was easy. There was step-by-step preinstalled software, which took two minutes.
What's my experience with pricing, setup cost, and licensing?
I think it's individual by owner and product.
Which other solutions did I evaluate?
What other advice do I have?
Develop product functional and implementation methods.
Disclosure: My company has a business relationship with this vendor other than being a customer: We sell BalaBit products.
Chief Technology Officer & Solution Architect at a tech services company with 51-200 employees
I like the support for many protocols, full OCR indexing and non-agent approach.
What is most valuable?
- Fully transparent for users.
- Supports many protocols.
- Full OCR indexing: You can find anything that happened in sessions, including commands, programs opened, etc. Without OCR, you would only be able to find who did which sessions, but not the content of the sessions or what admins have been doing.
- Non-agent approach: A very important feature that is able to monitor access to devices which are not computers, such as switches, firewalls, or any device which uses SSH, TELNET, HTTPS. You are able to monitor access to the Internet by web browser, because SCB can work as a HTTP/S proxy.
How has it helped my organization?
Our customers use it to provide full privileged-access monitoring for external users/administrators, so they are fully compliant and still have easy access to external user’s activity.
What needs improvement?
VMware PCoIP protocol support: Many customers are switching from normal computers/environment to VDI infrastructure and some of them are switching to VMware Horizon that uses PCoIP protocol, which is not supported right now.
Central management for more SCB boxes: If you have many boxes in a customer infrastructure (right now we have one customer of this kind in POC and they will need eight boxes) with the same configuration/purpose, you have to do everything 8x. I know this feature is on the roadmap, but nobody knows when it will be available.
For how long have I used the solution?
I’ve been using Balabit for six years.
What do I think about the stability of the solution?
We have not had stability issues.
What do I think about the scalability of the solution?
We have not had scalability issues.
How are customer service and technical support?
I give technical support a 4.5/5.
Which solution did I use previously and why did I switch?
We did not use any previous solutions.
How was the initial setup?
It was super easy to deploy, not complicated, and did not have the hidden Capex that competitors do!
What's my experience with pricing, setup cost, and licensing?
It’s an easy license model; you can choose virtual or hardware appliances.
Which other solutions did I evaluate?
We evaluated ObserveIT and CyberArk.
What other advice do I have?
Try more functions and use them! It’s a very powerful product; much more complex than all other competitors. But, almost all companies use it on less than 30% of their infrastructure.
Disclosure: My company has a business relationship with this vendor other than being a customer: We are Diamond Partner, but my own experience with Balabit and their SCB predates our company.
PreSales Engineer at a tech vendor with 201-500 employees
It offers four-eye and gateway authentication with a real-time audit capability.
What is most valuable?
Monitoring and controls privileged access to remote server/appliances for RDP/SSH/HTTP/ICA/VNC protocols
Four-eye authentication and gateway authentication with real-time audit capability
Credential storage and user mapping policies
Inband destination selection with DNS resolve/mapping internal resources
Detailed audit search capability into proprietary video stream for all protocols supported with keylog functions
How has it helped my organization?
- Improved security
- Detailed audits for support/maintenance activities done by admin/technician and third-party engineers
- Drastically reduced unauthorized and improper use of systems and servers
What needs improvement?
The only improvement would be to manage more concurrent sessions.
For how long have I used the solution?
I have been using it for four years.
What do I think about the stability of the solution?
I have not encountered any stability issues.
What do I think about the scalability of the solution?
I have encountered scalability issues. The system needs to be properly analysed before putting it into production. Supported protocols have different needs in terms of computing power, and this directly impacts the number of concurrent sessions that can be managed.
How are customer service and technical support?
Customer Service:
absolutely perfect
Technical Support:Technical support is 10/10, absolutely.
Which solution did I use previously and why did I switch?
I did not previously use a different solution.
How was the initial setup?
The initial setup is straightforward, but you need to have a pre-defined plan, know how to implement authentication or the authentication store if used, and also how to do network integration.
What's my experience with pricing, setup cost, and licensing?
I don't know about pricing, but licensing is based on concurrent session through SCB.
Which other solutions did I evaluate?
Before choosing this product, I did not evaluate other options.
Disclosure: My company has a business relationship with this vendor other than being a customer: i'm working as system integrator, for Balabit products in Italy.

Buyer's Guide
Download our free One Identity Safeguard Report and get advice and tips from experienced pros
sharing their opinions.
Updated: May 2025
Product Categories
Privileged Access Management (PAM) User Entity Behavior Analytics (UEBA) Non-Human Identity Management (NHIM)Popular Comparisons
CyberArk Privileged Access Manager
IBM Security QRadar
Delinea Secret Server
CyberArk Endpoint Privilege Manager
BeyondTrust Endpoint Privilege Management
WALLIX Bastion
BeyondTrust Privileged Remote Access
ARCON Privileged Access Management
ManageEngine PAM360
Delinea Privileged Access Service
Proofpoint Insider Threat Management
Symantec Privileged Access Manager
Buyer's Guide
Download our free One Identity Safeguard Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- Why should one choose One Identity Safeguard and One Identity Active Roles for the banking and insurance industry?
- What is One Identity Safeguard's lower-level architecture scheme?
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- How was the 2020 Twitter Hack carried out? How could it have been prevented?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?
- Is BeyondTrust Endpoint Privilege Management really expensive compared to other tools or software?