We performed a comparison between Delinea Privileged Access Service and One Identity Safeguard based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable feature is the author's discovery of assets."
"The most valuable feature of Delinea Privileged Access Service is we can use the server as a jump host. It is simple to manage the accounts on the system."
"This is a cloud-based application, which makes it very easy to deploy."
"The solution is flexible."
"The vault and auditing capabilities are the most valuable feature because they include multiple reports that allow us to create our own reports."
"The reporting is excellent."
"The privileged account management feature is what I like most."
"Delinea Privileged Access Service's UI part was very user-friendly for secure credential storage and management."
"The transparent mode for privileged sessions is one of the best things for customers, because they don't see the system in-between."
"The identity discovery is good, and the performance is pretty good value."
"The extensible framework for authentication is one of the most valuable features. We use an MFA plug-in and a lot of different factors, depending on what the business use-cases are. And of course, the auditing functionality is also valuable."
"It has greatly helped improve our security posture. Safeguard has an option where it will reset passwords on service accounts, then go out to those servers where that service account is running as a service and update the password on it. That makes password changes very easy. We can regularly change passwords now and are planning on making it an annual activity, where all the people who own service accounts will go in and make sure all their passwords get changed, updated, and reset."
"We use the solution’s Approval Anywhere feature which enables us to add an extra layer of security for critical passwords without adding time-consuming approval processes. By using this platform, if someone goes on a vacation, out of office, or needs urgent/planned leave, then our setup will select the functions tied to that person and automatically delegate them to the next person. That person can start performing that duty based on their access. No sharing of passwords is required."
"The whole product solves the privileged access management challenge for our company. We have a secure tunnel, a secure session manager, and automatic logging of sessions, which is good for forensic purposes. We have a rich level of logs and can trace what happened on which machine and see who did what."
"I like the discovery functionality and the change password feature through the check-in. I also like the bulk import with the help of templates that come with it out of the box. With the help of these few features, my tasks are made easier."
"It offers high availability and enables end users to deploy the solution with 99.999 percent uptime, which is crucial in an enterprise environment with a large number of endpoints."
"The pricing and presence could be improved."
"It is difficult to integrate the product with other IT systems."
"The integration with sync could be improved."
"There needs to be a notification when a password is near expiration."
"Enhancing the solution by incorporating additional features to make it comprehensive would be beneficial. It would be more convenient to have a complete package solution that consolidates all the features in one place, making it easier to manage. Currently, I am required to access two separate servers for reports, which could be avoided if all the necessary features were available in a single location. This would be highly advantageous for managing everything effectively."
"This solution needs better integration with third-party solutions because their ability to support other tools is very weak."
"The initial setup is a bit complex."
"Although the interface is intuitive, it could be a little more user-friendly."
"We would like to have the option of importing assets by using the CSV file. It was available in the earlier versions, but it is not available now."
"Monitoring of the platform should be easier and more functional so that you can have a clear picture of the running service."
"The multilanguage functionality does not support the Arabic language, even though this solution is deployed in an Arabic region."
"We have issues using Safeguard to connect to and record from the cloud. Currently, they don't have a mechanism to record this type of connection."
"We would like to be able to generate certificate signing requests (CSRs) from the interface for certificates."
"The GUI has room for improvement because it is confusing and cumbersome."
"The product uses a lot of resources in current sessions."
"We can't review or audit HTTP and HTTPS. This functionality should be added so that we can review and audit HTTP and HTTPS."
More Delinea Privileged Access Service Pricing and Cost Advice →
Delinea Privileged Access Service is ranked 12th in Privileged Access Management (PAM) with 10 reviews while One Identity Safeguard is ranked 5th in Privileged Access Management (PAM) with 38 reviews. Delinea Privileged Access Service is rated 8.0, while One Identity Safeguard is rated 8.2. The top reviewer of Delinea Privileged Access Service writes "Very cost-effective and provides secure access to environments". On the other hand, the top reviewer of One Identity Safeguard writes "Provides us with centralized storage of secrets and credentials, and visibility into the use of privileged access". Delinea Privileged Access Service is most compared with Azure Key Vault, Microsoft Purview Privileged Access Management, Delinea Secret Server and SAP Identity Management, whereas One Identity Safeguard is most compared with CyberArk Privileged Access Manager, WALLIX Bastion, Delinea Secret Server, BeyondTrust Privileged Remote Access and IBM Security QRadar. See our Delinea Privileged Access Service vs. One Identity Safeguard report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.