Try our new research platform with insights from 80,000+ expert users

Hitachi ID Privileged Access Manager [EOL] vs One Identity Safeguard comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Hitachi ID Privileged Acces...
Average Rating
7.0
Number of Reviews
1
Ranking in other categories
No ranking in other categories
One Identity Safeguard
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
52
Ranking in other categories
User Entity Behavior Analytics (UEBA) (6th), Privileged Access Management (PAM) (2nd), Non-Human Identity Management (NHIM) (3rd)
 

Featured Reviews

DR
Principal Solutions Architect at a computer software company with 51-200 employees
Responsive support, requires little maintenance, but configuration could be easier
Hitachi ID Privileged Access Manager is cumbersome and it does not operate by itself and relies on other solutions. Overall the way you configure things is a bit awkward compared to other solutions, such as Cyberark and Thycotic. The interface could be more intuitive, some features I expected to be easily accessible I had to search around for them. There needs to be more centralization.
Vyas Shubham - PeerSpot reviewer
Product Analyst at a consultancy with 51-200 employees
Centralized controls have improved privileged access and simplified compliant audit workflows
We use One Identity Safeguard as a central control point for all our privileged access, which helps standardize the access policies across teams and platforms. We also use it for the approval workflows, which are enforced for high-risk systems and add an extra security layer for production access. I have been using it for one and a half years. The best feature I appreciate is the session proxying and recording. It provides transparent session access for admins without exposing the real passwords. Another valuable feature is automated password rotation, which changes the credentials automatically after each use or on a schedule. It reduces the risk of leakage and reuse of passwords. Additionally, the approval workflow and the access request feature add governance with multi-level approvals for sensitive systems. These are the features that I appreciate the most. When we started using the session proxying and recording features, overall, it was a manageable and fairly smooth process for us. However, like most security platform deployments, it had a few learning curves. Session proxying and recording worked with our major systems including Windows, Linux, and network devices with minimal configuration. Some devices and services required slight changes to firewall rules and configuration to ensure the proxy could connect cleanly. Additionally, our admins needed orientation so they understood they were joining a recorded session, particularly for remote or support use. We spent considerable time adjusting the session filtering, retention settings, and naming conventions so recordings were useful and not overwhelming. These are some areas where we encountered challenges.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"If you using IGA or access controls solutions then this solution is a good addon. Once Hitachi ID Privileged Access Manager is set up it does not require a lot of maintenance or attention."
"Being able to use a proxy server is an advantage."
"I have found the most useful feature of One Identity Safeguard to be Privileged Sessions."
"It has greatly helped improve our security posture. Safeguard has an option where it will reset passwords on service accounts, then go out to those servers where that service account is running as a service and update the password on it. That makes password changes very easy. We can regularly change passwords now and are planning on making it an annual activity, where all the people who own service accounts will go in and make sure all their passwords get changed, updated, and reset."
"It is generally easy-to-use and install."
"The auditing and approval mechanisms are features we did not have before and are greatly appreciated."
"All the features are promising, but we love the reporting feature because we can get each and every report. That's a major compliance requirement. Its reporting is really amazing, and it has made life a lot easier."
"The solution transparently integrates into the infrastructure and users do not notice it. I would give this feature the highest rating."
"We are able to log and get reporting on all privileged activity that is being performed. We like the fact that we can leverage the session recording feature, which is especially valuable when we're dealing with third-party vendors that have to remote into our our boxes and servers to do any work on behalf of the bank. Now, we can record everything they are doing to ensure that they're only doing the changes that were needed. In addition, we use it to leverage knowledge transfer with our internal staff."
 

Cons

"Hitachi ID Privileged Access Manager is cumbersome and it does not operate by itself and relies on other solutions. Overall the way you configure things is a bit awkward compared to other solutions, such as Cyberark and Thycotic. The interface could be more intuitive, some features I expected to be easily accessible I had to search around for them. There needs to be more centralization."
"We would like to have the option of importing assets by using the CSV file. It was available in the earlier versions, but it is not available now."
"We can't review or audit HTTP and HTTPS. This functionality should be added so that we can review and audit HTTP and HTTPS."
"It needs more marketing."
"Some of our users find the functionality a bit complex, and it could be made more user-friendly."
"We sometimes face issues with configuration and things like that, but we manage to solve them."
"One Identity Safeguard can be improved by fixing the documentation, which is very convoluted as of now, and addressing versioning, as some major bugs and issues are not documented well enough in the documentation, along with some patches and fixes."
"The user interface and navigation can be improved."
"Our experience with technical support has been disappointing. We require more prompt and faster response times. We require answers to our questions right away but we haven't received that level of support."
 

Pricing and Cost Advice

"The price of the solution is reasonable."
"Safeguard is cheaper than CyberArk."
"The license is very expensive for us, partly due to inflation and partly because of the exchange rate between the Dollar and the Iranian Rial. We purchased a perpetual license that we've been using up until now, but I believe that we are not going to update it in the future. Instead, we plan to find another third-party to support us with the license, in the sense that we would have access to their license as a shared agreement."
"Our licensing costs are on a yearly basis."
"They have comparable pricing. All identity products are essentially priced in a similar way. It's a per-user base."
"We have a yearly license. The cost depends on how much a company wants to invest in technology. In our organization, we believe in modern digitization and automation processes so we found it affordable. One Identity was not that much less than other solutions and it is not a cheap solution. There were number of cheaper solutions. However, it's the most effective, according to our evaluation."
"We bought their other products, so it was not that expensive. It is one of those where the more you buy, the cheaper it is."
"They offer a fair price for a robust solution."
"It is a bit on the pricey side, but you get what you pay for. You don't want to get anything too cheap because then you get cheap stuff and cheap support. That really never helps anybody."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
881,665 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Computer Software Company
10%
University
8%
Comms Service Provider
7%
Financial Services Firm
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business29
Midsize Enterprise17
Large Enterprise19
 

Questions from the Community

Ask a question
Earn 20 points
What is your experience regarding pricing and costs for One Identity Safeguard?
My experience with pricing, setup cost, and licensing has been a good experience overall, as the back and forth with One Identity is something that is acceptable; other tools have options to do thi...
What needs improvement with One Identity Safeguard?
One Identity Safeguard could be improved with a password manager and an identity manager as one big access management system. I believe improvements could be made around integrating with other tools.
What is your primary use case for One Identity Safeguard?
My main use case for One Identity Safeguard is using only one module for privileged session, which we use for admins and contractors. A quick specific example of how my team uses One Identity Safeg...
 

Overview

 

Sample Customers

Information Not Available
Cavium
Find out what your peers are saying about CyberArk, One Identity, Delinea and others in Privileged Access Management (PAM). Updated: January 2026.
881,665 professionals have used our research since 2012.