We use One Identity Safeguard to manage our privileged accounts.
We use One Identity Safeguard on both physical and virtual appliances.
We use One Identity Safeguard to manage our privileged accounts.
We use One Identity Safeguard on both physical and virtual appliances.
One Identity Safeguard uses a secure remote access feature that does not use a VPN. This is important because it is cheaper and more secure than implementing a VPN for remote access.
People can start using the solution after five days of training.
We don't need to use VPN for remote access.
One Identity Safeguard is slow and not user-friendly.
Managing remote access for privileged users is difficult because it requires a lot of customization.
Current integration with other solutions requires custom API development. I would like to see out-of-the-box integration built into One Identity Safeguard, similar to other solutions.
The deployment affects our privileged users because it takes a long time for them to request privileges, which impacts the SLA.
I have been using One Identity Safeguard for nearly three years.
One Identity Safeguard is unstable. Many bugs affect its performance, particularly when generating bundle batches and performing discovery.
One Identity Safeguard is scalable, but its performance degrades as it is scaled up.
Customer support is a nightmare. They take a long time to respond to tickets, and when they don't understand the issue, they stall by requesting logs.
Negative
I previously used BeyondTrust Endpoint Privilege Management, which is a better solution because it includes recording and remote access out of the box, whereas One Identity Safeguard requires us to integrate each of those components separately. Additionally, each component is a different appliance.
The initial setup is straightforward. The installation takes a couple of hours. One person is required for the deployment.
One Identity Safeguard is expensive and the cost goes up as we scale.
Licensing fees increase as we expand, as does the cost of basic support, which allows us to open tickets. Additionally, we must pay to update outdated appliances.
I would rate One Identity Safeguard three out of ten.
I only recommend One Identity Safeguard for small businesses.
When using One Identity Safeguard, we need to be patient.
We use Safeguard for managing privileged passwords only, using physical appliances.
So far, I haven't seen any type of improvement from using this solution when compared with other products in the identity and access management space. It has been neutral.
I like the discovery functionality and the change password feature through the check-in. I also like the bulk import with the help of templates that come with it out of the box. With the help of these few features, my tasks are made easier.
We also use the Secure Remote Access feature for privileged users. Access is based on group membership and with that membership they connect to the remote machine. It's an easy process to manage.
The main thing that needs improvement is the slowness. Apart from that, the change password check-in feature also needs improvement because it is not working perfectly accurately.
I have been using One Identity Safeguard for the last two and a half years. I work as an implementer and provide support operations to our clients.
It's not a stable solution, but it's not bad. It's neutral in terms of stability.
It's not scalable.
We are not using their Premier Support, but I am okay with the vendor's regular support. But if the product is running on an unsupported version, that is a very negative point. They should support unsupported versions as well so that their customers are not stuck somewhere in between.
Neutral
As an organization, we are using other PAM solutions for other projects, but I'm not sure which other solutions are in use.
The initial setup for Safeguard is straightforward. Because it was deployed a long time ago in our organization, before my tenure, my expertise is based on adding to clusters. If we are going to add clients within a cluster, it depends on the speed, meaning how the network connectivity is between the cluster and the target device.
In terms of the effect of deployment on users, they are provisioned, with the help of group membership, into Safeguard. Once they are assigned to a particular group, they can follow the previous sites. Based on the previous site, they can log in and check out the password of their privileged account.
As for the amount of training needed, it depends on the solution. If the solution is only for privileged passwords, about three weeks' training is required to understand the solution. And if the server for privileges is also integrated with the solution, it will take a month or as much as 45 days.
We have an implementation team and an operations team. Between them, there are a total of five or six people required for this solution to deploy and maintain it.
I'm not aware of the product cost, but if it's going to cost more, first they have to maintain and stabilize the product.
My impression of the form factor of the Safeguard physical appliance is not good and not bad. It's neutral. Similarly, feedback about the usability and functionality is neutral.
My advice, if you have the budget, is to buy other products, like CyberArk Privileged Access Manager or BeyondTrust Endpoint Privilege Management. If you don't have that kind of budget you can use this product.
We use it to link our virtual systems. We have Windows and Linux, and we have some applications. We use One Identity Safeguard to connect to them. We also use Password Vault, and we do session monitoring.
I am one version behind the latest version. I usually wait before doing an update to make sure that there are no problems with the new release.
One Identity Safeguard helps with accountability. We now know which person is accessing which machine. It also helps to make sure that they are secured, and that everyone knows what changes they need.
We have used the transparent mode and non-transparent mode for privileged sessions. The transparent mode is more difficult than the normal mode, but with the help of the documentation, we figured out how to do the necessary configuration and use this mode. Generally, we use the normal mode. We do not use the transparent mode.
We use the Secure Remote Access feature for privileged users. It was very easy to manage remote access for privileged users by using this feature. When our users cannot be physically present at our place, they can access the resources using the Starling account. It is easy.
The Secure Remote Access feature does not make use of a VPN. This is very important for us because there are some problems with using VPN, so it is easier to use something like Starling. We can be sure that our users can access the network even from home and that the sessions are secure.
I have worked with other One Identity solutions. I have used One Identity Defender, One Identity SPP, and One Identity SPS. They worked very well for our users. We also use the authentication service to control the Linux machines with Active Directory accounts. They work well with each other. I have also used Safeguard Remote Access. I tried its features with Safeguard to allow our users to connect to the sessions by using the cloud so that they do not need to log in to the company servers.
One of the most important aspects is that it is very easy to use and install. It is also agentless, so all of the operations happen more smoothly than any other product. Our end-users find it easy. They have a web application. They only need to enter the credentials, and they can access the Safeguard session. They can use it very fast without any problems. Its learning curve is very low.
We can discover Windows and Linux machines, but we would also like to discover databases. It is very important for us. I have heard that in the new version, we can discover databases, but I have not tried it yet, so I am not sure if the new version does it properly or still needs some work.
We would like to have the option of importing assets by using the CSV file. It was available in the earlier versions, but it is not available now.
I have been using this solution for about two years.
It is very stable. They always release new updates if there are any issues. For example, for the Log4j issue that happened a couple of months ago, they released an update to solve the issue and make sure that no user is affected by it. It is based on the Linux machine, so it is very stable.
I did not face any problems. It is very scalable, and it can be used for a small company or a big company without any problems.
Currently, there are about 20 users who are using it.
We have used their regular support, not the premier support. When we have any problems related to it, we open a ticket. They always help us. We might have to provide them with additional things so that they are able to troubleshoot better, but they are always helpful. I would rate their support a 9 out of 10.
Positive
We did not use any other solution.
The initial setup is straightforward. We have two installation types. We have Safeguard for Privileged Passwords and Safeguard for Privileged Sessions. For Safeguard for Privileged Passwords, we just need to import and the whole organization will be done. The process for Safeguard for Privileged Sessions is also simple. There are no problems.
The deployment duration depends on the number of systems, the number of users, and the number of applications. In a small company, it might take about two weeks or three weeks.
The deployment did not affect our privileged users. We just needed some time to get used to it. We were not using any PAM product before, so it took some time to get used to using it. It is more restrictive than the Active Directory system, but it is for the best.
For managing and deploying the solution, I took technical training. It was about five-day training with One Identity. After that, I started its deployment. In case of any problem, we could check several resources. We could check the administration guide or forums. We could also open a support ticket with One Identity. For the end-users, I gave the training, and it took one or two days at the most.
I deployed it myself.
We checked out a couple of solutions, but I was not a part of the selection process.
It is a very easy solution. In case of any problem, you can contact the distributor or the vendor, and they will help you.
I have worked with physical and virtual appliances. We went for virtual appliances because they are easy for us. We have servers in our company, so we have the space and resources to install them.
I would rate One Identity Safeguard a 10 out of 10. I have used it for some time, and I enjoyed working with it.
I work for a bank, and we use Safeguard to manage access to our Internet banking services. We use Safeguard for two things: identity and access management and detection recording. We have our services onboarded on SysTrack doing RDP directly to the servers or station, and we use virtual appliances for collection. The solution covers around 150 users at this organization.
I like Safeguard's snapshot feature that enables us to review the last time an application was opened and by whom. If there are any issues, we can look behind the scenes to see what has been done. We can suspend a user's access or close off a server.
We've had issues managing accounts and access to some data saved on the servers. Accounts are granted a new working certificate daily. We have an account to do it on APIs online and sync it with that. If the path changes at some point or someone changes the password, I don't know if it's from the Active Directory or what.
I have used Safeguard for one year.
Safeguard is stable.
It's scalable, depending on the solution case. I don't know if it's domain-based because it was not restricted. We're gradually moving to the Azure cloud.
One Identity support is okay.
Deploying Safeguard was straightforward.
I rate One Identity Safeguard eight out of 10.
The primary use case for our One Identity Safeguard solution is to optimize security across private accounts, accounts which can be secured upstream and downstream. The solution enables us to implement encryption protocols across channels. It is designed so that depending on the cryptographic case, different policies can be applied in correlation.
I don't think it's improved our organization internally. I've had to suspend workflows and focus my time and attention on creating technical, instructional, documentation regarding user procedures and practices.
The majority of the features offered with this solution are the same as with other similar systems. The most unique and valuable features are the upstream and downstream throughput capacities; the Safeguard platform provides agile integration.
In actuality, all the features are valuable. They're good and user-friendly.
The technical support for this solution needs to be immediate, intuitive, and responsive especially as it refers to supporting ticket submissions and processing.
Furthermore, we've had trouble understanding how certain policy framework applies. I would like to see clearly laid out policies or better support and explanations around policy dynamics.
The stability and downtime of the solution could also be upgraded to include a messaging function which would give users a clear understanding of what's happening without having to navigate to a particular section of the page.
Lastly, I would also like to see the price reduced.
It's very stable. There are about 150 users, mostly administration, currently using this solution in our company. We don't encounter many problems with the system.
I am encountering issues when it comes to the scalability of the solution.
Our experience with technical support has been disappointing. We require more prompt and faster response times. We require answers to our questions right away but we haven't received that level of support.
The initial setup was very easy. We followed the given instruction protocol. We also used white papers when necessary for clarification and better understanding. It only took us one month to implement.
We used an integrator for the deployment. It was a good experience.
Setup cost, pricing and licensing are all very expensive.
We are very pleased with the Safeguard platform feature. You can't find this technology anywhere else.
On a scale from one to ten, one being the worst and ten being the best, I would give this product a nine rating. If the technical support was better I'd give it a 10 out of 10.
The primary use case for our customers is to monitor and audit external vendors, as well as keep track of internal actions when privileged user accounts are being used to access systems internally.
For our customers, it's much easier for them to be in line with audits. A lot of our customers work in the medical field, where it is important for them to keep track of external vendors, e.g., maintaining medical appliances inside of a hospital. This solution gives them real confidence that they can keep their customers safe and their data protected.
There are a variety of protocols that it supports.
The video-like stream and audit capabilities, in combination with its indexing capabilities to search for critical events quickly, are valuable features.
The transparent mode for privileged sessions is really nice because it keeps the integration quite smooth. Also, users don't have to change the way that they currently are used to working.
It is easy to manage. There is a very logical, clear user interface. Also, the integration of scripts is thoughtfully implemented. Overall, it's a nice product to manage.
There are some features which are still missing compared to other competitors. For example, some customers need legacy VPN authentication capabilities.
The automated change of the passwords, which is now integrated, could be improved to be more flexible regarding different systems.
The overall stability has improved quite a bit throughout the years. The appliances run well, both virtual and physical. The product is pretty good, especially compared to other vendors and products.
Because of the nature of the connections being monitored, you can load balance it quite well. It is easy to shift the load from one appliance to another. However, the high availability function of the box itself requires a long time to switch over from one appliance to another. So, there is room for improvement
The technical support is tremendous. For large projects, we have had some challenges, but we were never left alone by the vendor. Also, in one case for a small customer, One Identity assigned one engineer to help with assessing the AD infrastructure of our customers, which was really helpful.
The install and deployment are quite rapid. For a smaller project, sometimes it only takes us about two to three days to implement and get the policies inline. For larger projects, it's actually also not that long for the appliance itself. The product requires a lot of changes on the management side, how vendors work, and how you need to counsel people how to use it, especially in Germany. Then, they are monitored, which is the quite larger portion of it.
For our implementations in Germany, we implement an explicit model most of the time. Therefore, the transparent mode for privileged sessions has not been used that much in my projects.
Look at the entire portfolio, since it has changed so rapidly. The capabilities have improved quite a bit. You need to make sure not to miss out on any features.
The Approval Anywhere for Privileged Passwords is a really good concept, because it enables admins to do other work, be more flexible, and work from home. However, we don't have any real experience with it yet, as we are looking into it at the moment.
We primarily use One Identity Safeguard for Privileged Sessions (SPS) for managing our customers' access to their critical systems.
We are able to demonstrate what has happened on the systems and who did what, when we have to investigate, in regards to audits using evidence.
The transparent mode for privileged sessions is one of the best things for customers, because they don't see the system in-between. Thus, it is transparent for them.
The system is easy to manage, as it is not a system that you will change everything all of a sudden. It evolves most of the time with customer requests.
We have not had a major issues regarding stability once we migrated our users onto the virtual solution. However, for some users, the physical appliance has been a bit buggy.
As of now, we use mainly virtual and have not tested the scalability and high availability, because it is a new thing.
The technical support is good. There has been great improvement to all the knowledge base articles available. Therefore, we are able to find a lot of solutions already when we create support requests.
It takes us a long time to make the people from product management and development to understand our needs, e.g., integrating this product with HSM.
Because we are a service provider, we have to demonstrate that our systems are really tamperproof. We had that experience previously, and now again, with One Identity SPS, as the product fits our needs.
The initial setup is quite simple, not complex. The installation documentation is good, so the installation is okay. You just need to read the documentation, understand how it works, and how it has to be integrated. Once you do your homework, it's quite easy.
We are the integrator for the deployment.
To install and deploy the solution for the customers, we count one day for a workshop with all the people involved: network, business users, IT, support, etc. Then, for the implementation, it can take another one to five days.
It is the life of our customers because it brings a lot of security. So, the return on investment is really on all aspects of compliance, security, and audit.
We implement this solution upon customer request.
Test it and its competitors. You will probably choose SPS.
Both the search functionality and speed have been greatly improved.
We are not using privileged passwords.
We use the on-demand version. We use the solution for monitoring and connection to the customer's server for Windows and Linux.
It's easier to connect to the server and it makes it more secure. We've seen about a 40% improvement in that regard.
The monitoring system is very good.
It has a very nice user interface.
The product is very fast to implement.
We use the solution's transparent mode for privileged sessions.
There is a lack of documentation and many problems with the plugins.
I did run into problems with transparent mode for privileged sessions. We didn't connect correctly to the server. It was an issue we had with the customer's server, not the product itself.
The security of the connection could be improved.
I've been using the solution for one year.
It's not completely stable. Sometimes the newest version does not support an older version.
The solution is not so scalable.
Mabe 20 or so users are leveraging it in our organization. They are admins.
We use regular support. The response times are too long. Sometimes it could take days.
Positive
I previously used CyberArk. I changed companies, and now I work with this product. I find Safeguard to be easier to implement, however, it does lack documentation.
It is fast to implement.
While the process is not technically complex, there was a lack of documentation and we had to figure out how to do it ourselves. The deployment took three weeks. We had two people working on the process.
We have yet to witness an ROI.
The solution is offered at a good price. We pay a monthly fee. I'm not sure of the exact cost we pay.
I'm a product partner.
We are using the latest version of the solution.
I have yet to use the cloud assistant feature, so I can't say much about that aspect of the solution. We also do not use the solution's secure remote access feature for privileged users. We don't have it integrated with DevOps or RPA.
While basic knowledge is important, there isn't much training required to start using the solution.
I'd rate the solution six out of ten.