Try our new research platform with insights from 80,000+ expert users

Hitachi ID Privileged Access Manager [EOL] vs One Identity Safeguard comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Hitachi ID Privileged Acces...
Average Rating
7.0
Number of Reviews
1
Ranking in other categories
No ranking in other categories
One Identity Safeguard
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
52
Ranking in other categories
User Entity Behavior Analytics (UEBA) (6th), Privileged Access Management (PAM) (2nd), Non-Human Identity Management (NHIM) (3rd)
 

Featured Reviews

DR
Principal Solutions Architect at a computer software company with 51-200 employees
Responsive support, requires little maintenance, but configuration could be easier
Hitachi ID Privileged Access Manager is cumbersome and it does not operate by itself and relies on other solutions. Overall the way you configure things is a bit awkward compared to other solutions, such as Cyberark and Thycotic. The interface could be more intuitive, some features I expected to be easily accessible I had to search around for them. There needs to be more centralization.
SV
Automation tester at a consultancy with 51-200 employees
Centralized controls have improved privileged access and simplified compliant audit workflows
We use One Identity Safeguard as a central control point for all our privileged access, which helps standardize the access policies across teams and platforms. We also use it for the approval workflows, which are enforced for high-risk systems and add an extra security layer for production access. I have been using it for one and a half years. The best feature I appreciate is the session proxying and recording. It provides transparent session access for admins without exposing the real passwords. Another valuable feature is automated password rotation, which changes the credentials automatically after each use or on a schedule. It reduces the risk of leakage and reuse of passwords. Additionally, the approval workflow and the access request feature add governance with multi-level approvals for sensitive systems. These are the features that I appreciate the most. When we started using the session proxying and recording features, overall, it was a manageable and fairly smooth process for us. However, like most security platform deployments, it had a few learning curves. Session proxying and recording worked with our major systems including Windows, Linux, and network devices with minimal configuration. Some devices and services required slight changes to firewall rules and configuration to ensure the proxy could connect cleanly. Additionally, our admins needed orientation so they understood they were joining a recorded session, particularly for remote or support use. We spent considerable time adjusting the session filtering, retention settings, and naming conventions so recordings were useful and not overwhelming. These are some areas where we encountered challenges.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"If you using IGA or access controls solutions then this solution is a good addon. Once Hitachi ID Privileged Access Manager is set up it does not require a lot of maintenance or attention."
"We have removed shared admin credentials, enforced just-in-time access management, simplified audits with session recording, and reduced manual access work, all thanks to One Identity Safeguard."
"We use the solution’s “transparent mode” feature for privileged sessions. It is very easy because it is only a simple configuration for our users. We don't have to modify our network. We install it, configure it, and it works. So, it is super easy. The rollout for our users is seamless."
"The solution transparently integrates into the infrastructure and users do not notice it. I would give this feature the highest rating."
"The most unique and valuable features are the upstream and downstream throughput capacities; the Safeguard platform provides agile integration. In actuality, all the features are valuable. They're good, user-friendly."
"It is generally easy-to-use and install."
"There is ease of implementation. Compared to other PAM solutions, it is easy to implement and use from an administrator's point of view."
"One Identity Safeguard is stable and provides great performance."
"There are a lot of features, so it's going to sound funny, but one of the most simplistic features, the Favorites feature, is the one we like the best. You do a full run-through of configuration to check out a server and then you can save that whole configuration as a favorite. So the next time you go in, you click on the favorite that you configured and it automatically takes you to the end so you can check the server out that much faster. It saves a lot of time..."
 

Cons

"Hitachi ID Privileged Access Manager is cumbersome and it does not operate by itself and relies on other solutions. Overall the way you configure things is a bit awkward compared to other solutions, such as Cyberark and Thycotic. The interface could be more intuitive, some features I expected to be easily accessible I had to search around for them. There needs to be more centralization."
"The automated change of the passwords, which is now integrated, could be improved to be more flexible regarding different systems."
"One Identity Safeguard can improve by having more integration with multiple devices."
"There is room for improvement in the launch module. They built in a launch button but they don't have effective instructions for configuring it to allow it to launch an RDP session. They're working on that, but the button is in the live product. If they were going to install something that wasn't useful, they should have just disabled it and not rolled it out with the product."
"The GUI has room for improvement because it is confusing and cumbersome."
"One Identity's support is not appropriately structured, and it has a lot of room to improve."
"The user interface and navigation can be improved."
"I just received a question from a customer in regards to a connection with Oracle OID. I tried to integrate Safeguard with the Oracle YAML as well as something else to manage the groups and users from a different system, like AD or LDAP. This one feature could be better. At this moment, the platform system can only use the integration with LDAP or AD. The software for research and development to create a connector to a YAML platform can be very complicated."
"There is a lack of documentation and many problems with the plugins."
 

Pricing and Cost Advice

"The price of the solution is reasonable."
"The pricing depends on our perspective, our budget, and, of course, the competitors we are taking into account."
"It is cheaper than CyberArk. Its price is fair."
"We have a yearly license. The cost depends on how much a company wants to invest in technology. In our organization, we believe in modern digitization and automation processes so we found it affordable. One Identity was not that much less than other solutions and it is not a cheap solution. There were number of cheaper solutions. However, it's the most effective, according to our evaluation."
"As compared to other products, it is reasonable, but the training sessions are too expensive."
"They have comparable pricing. All identity products are essentially priced in a similar way. It's a per-user base."
"Setup cost, pricing and licensing are all very expensive."
"It is a bit on the pricey side, but you get what you pay for. You don't want to get anything too cheap because then you get cheap stuff and cheap support. That really never helps anybody."
"Its subscription cost is too much, and sometimes, it is very difficult to pitch the solution to the management for cost approval. If the cost is reduced a little bit, it would be easier. If its cost was less, many other organizations that currently cannot afford it would be able to use this technology. I'm sure many organizations around the globe are having issues with identity management, and it is a very difficult task for IT to manage privileged accounts."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
881,757 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Computer Software Company
10%
University
8%
Comms Service Provider
7%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business29
Midsize Enterprise17
Large Enterprise19
 

Questions from the Community

Ask a question
Earn 20 points
What is your experience regarding pricing and costs for One Identity Safeguard?
My experience with pricing, setup cost, and licensing has been a good experience overall, as the back and forth with One Identity is something that is acceptable; other tools have options to do thi...
What needs improvement with One Identity Safeguard?
One Identity Safeguard could be improved with a password manager and an identity manager as one big access management system. I believe improvements could be made around integrating with other tools.
What is your primary use case for One Identity Safeguard?
My main use case for One Identity Safeguard is using only one module for privileged session, which we use for admins and contractors. A quick specific example of how my team uses One Identity Safeg...
 

Overview

 

Sample Customers

Information Not Available
Cavium
Find out what your peers are saying about CyberArk, One Identity, Delinea and others in Privileged Access Management (PAM). Updated: January 2026.
881,757 professionals have used our research since 2012.