2022-06-03T12:37:00Z

Why should one choose One Identity Safeguard and One Identity Active Roles for the banking and insurance industry?

Hi,

I work as a Senior Consultant & Business Analyst at a Financial Services firm (1000+ employees).

I would like to know some customers in Europe (possibly, Italy) who have chosen One Identity (specifically, One Identity Safeguard or One Identity Active Roles). 

What are the costs associated with this solution? Would it be the best solution for the banking and insurance world, in your opinion?

Thanks and best regards!

---

Original text:

Clienti banking ed insurance ad oggi attivi e perchè dovrebbero sceglierla?

mi piacerebbe conoscere i nomi dei clienti in Italia ed in Europa che hanno scelto one identity e quanto questa soluzione sia la soluzione migliore nel mondo banking ed insurance?

grazie e cordiali saluti

Danilo Di Francesco - PeerSpot reviewer
Senior Consultant & Business Analyst at TIM
  • 1
  • 55
1
PeerSpot user
1 Answer
Jason Moody - PeerSpot reviewer
Product Marketing Manager at One Identity
Vendor
2023-02-27T16:23:08Z
Feb 27, 2023

Hi and thank you so much for the question. Here is a quick answer that I hope helps to understand the product and the integration. Active Roles is specially designed to remove the need for wide-spread permissions in AD and Safeguard for Privileged Passwords is designed to store privileged credentials. When they work together, layers of security are multiplied building on top of each other. This is very important in the banking industry as cybersecurity experts say that 90% of data breaches occur on account of phishing and 90% of employees have too much access. Instead of granting always on privilege, Active Roles manages the access when an account is not in use. When the account is checked out by a user, the process includes validating that the account can be checked out, an audit of the user, and how long the account is checked out. Once the user is done and checks the account back in Safeguard for Privilege Passwords changes the password so that the pass the hash attacks are mitigated. Thanks, and I hope this helps. 

Product comparison that may be of interest to you
Related Questions
Basov Mikhail - PeerSpot reviewer
System Engineer at USSC
Aug 17, 2023
Hello community,  I am a System Engineer at a medium-sized financial services firm. Can you please share One Identity Safeguard's lower-level architecture scheme? Thank you for your help.
See 1 answer
Anne Cubarrubia - PeerSpot reviewer
Editor at PeerSpot
Aug 17, 2023
One Identity Safeguard's lower-level architecture scheme is a three-tier architecture made up of the following layers: The Presentation layer presents data and is responsible for user interaction. It includes the web interface, client applications, and APIs. The Application layer is for business logic and data processing. It includes the Safeguard server, database, and other applications. The Infrastructure layer provides the underlying infrastructure for the other layers. It includes the operating system, hardware, and networking components. The three-tier architecture is a common design pattern for enterprise software applications. It provides a separation of concerns between the different layers, which makes the application more scalable, reliable, and secure.
AG
Associate VP & Cyber Security Specialist at Union Bank of California
Aug 14, 2023
Hello community,  I am the Associate VP and Cyber Security Specialist at a large bank. I am researching PAM tools. These are our requirements for the PAM tool needed: - Privileged Access Governance and Administrative - Privileged Accounts Discovery and Management - Privileged Credentials Management - Privileged Session Management - Privileged Access Logging, Reporting, and Audit - Privi...
See 2 answers
Nurlan Temirbulatov - PeerSpot reviewer
Sales Engineer at Remediant
Dec 7, 2022
Hello Avinash, it all depends on the timeline and urgency of the project. If you need to deploy a PAM tool that focuses on standing privileges, stopping lateral movement, and incorporating Zero Standing Privileges as part of Zero Trust, then please consider looking at Remediant. I've worked for BeyondTrust and have gone up against the other big players such as Delinea, Centrify, CyberArk, and HashiCorp. They more or less all offer similar solutions, but looking at your current requirements, Remediant really excels in delivering a simple, yet very effective tool in a matter of days and weeks, not months and years. 
DN
IT Manager at CAS Trading House
Aug 14, 2023
Based on your extensive list of requirements, CyberArk Privileged Access Manager appears to align well with your needs due to its comprehensive feature set, strong security controls, integration capabilities, and advanced analytics for privileged access. However, it's important to conduct in-depth evaluations, demos, and discussions with each vendor to ensure that the chosen tool meets all your specific needs and integrates seamlessly into your existing infrastructure. However, I recommend visiting the official website of Broadcom (the company that acquired Symantec's enterprise security business) or contacting their sales representatives to get the most up-to-date information about their PAM solutions, including any rebranding or changes that may have occurred. When evaluating any PAM solution, it's essential to consider factors such as security, integration capabilities, ease of use, vendor support, scalability, and alignment with your organization's specific needs and compliance requirements. It's also a good practice to request demonstrations, proofs of concept, and references from vendors to ensure that the solution meets your expectations. Remember to involve key stakeholders, such as IT, security, compliance, and management teams, in the decision-making process to ensure alignment with organizational goals and requirements.
Related Articles
NC
Content Manager at PeerSpot (formerly IT Central Station)
May 12, 2022
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias. Our users have ranked these solutions according to their valuable features, and discuss which features they like most and why. You can read user reviews for the Top User Behavior Analytics - UEBA Tools...
NC
Content Manager at PeerSpot (formerly IT Central Station)
Apr 18, 2022
Top 5 Privileged Access Management (PAM) Tools PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias. Our users have ranked these solutions according to their valuable features, and discuss which features they like most and why. You can read user reviews ...
Product Comparisons
Related Articles
NC
Content Manager at PeerSpot (formerly IT Central Station)
May 12, 2022
Top 7 User Behavior Analytics (UEBA) Tools 2022
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to...
NC
Content Manager at PeerSpot (formerly IT Central Station)
Apr 18, 2022
Top 5 Privileged Access Management (PAM) Tools 2022
Top 5 Privileged Access Management (PAM) Tools PeerSpot’s crowdsourced user review platform help...