Hillstone I-Series Server Breach Detection System vs One Identity Safeguard comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Hillstone I-Series Server Breach Detection System and One Identity Safeguard based on real PeerSpot user reviews.

Find out what your peers are saying about IBM, Splunk, Rapid7 and others in User Entity Behavior Analytics (UEBA).
To learn more, read our detailed User Entity Behavior Analytics (UEBA) Report (Updated: April 2024).
768,578 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The most valuable features of the Hillstone I-Series Server Breach Detection System are the AI detection and monitoring of common threats.""One or two people can maintain and support the solution. The maintenance is not difficult."

More Hillstone I-Series Server Breach Detection System Pros →

"We are able to log and get reporting on all privileged activity that is being performed. We like the fact that we can leverage the session recording feature, which is especially valuable when we're dealing with third-party vendors that have to remote into our our boxes and servers to do any work on behalf of the bank. Now, we can record everything they are doing to ensure that they're only doing the changes that were needed. In addition, we use it to leverage knowledge transfer with our internal staff.""The identity discovery is good, and the performance is pretty good value.""It's one of the best products we've seen. When you start looking at the functionality and use cases and usability of the product, it's straightforward. They designed this product with the end-user in mind, and they also had the sysadmin who is supporting the product in mind. They really did a nice job. Overall, it's a nice product to work with.""The transparent mode for privileged sessions is one of the best things for customers, because they don't see the system in-between.""It offers high availability and enables end users to deploy the solution with 99.999 percent uptime, which is crucial in an enterprise environment with a large number of endpoints.""Safeguard can define and update processes and procedures into the security framework of a company, including mobile. It allows us to change the policies and configurations on a mass scale in regards to security.""All the features are promising, but we love the reporting feature because we can get each and every report. That's a major compliance requirement. Its reporting is really amazing, and it has made life a lot easier.""I have found One Identity Safeguard to be stable."

More One Identity Safeguard Pros →

Cons
"Hillstone I-Series Server Breach Detection System can improve by having more anti-spam features that will hopefully eliminate all of the other threats.""The UI dashboard view needs to be improved because it is ugly. If it was more modern it would be better. Additionally, better integration with other databases would be good."

More Hillstone I-Series Server Breach Detection System Cons →

"We would like to have the option of importing assets by using the CSV file. It was available in the earlier versions, but it is not available now.""Some of our users find the functionality a bit complex, and it could be made more user-friendly.""We have issues using Safeguard to connect to and record from the cloud. Currently, they don't have a mechanism to record this type of connection.""Even though we have two nodes, there's no way to do an upgrade without taking everything completely offline. It would be nice if they could improve that.""The product uses a lot of resources in current sessions.""Transparent mode was too cumbersome, so I don't foresee us being able to use it. On paper when we were initially talking about it, it was definitely going to be the preferred method until we realized the burden it would be on our network guys. Then, we had to step back and reevaluate what we wanted to do. That's when we changed our approach to use the RD Gateway feature.""The deployment affects our privileged users because it takes a long time for them to request privileges, which impacts the SLA.""Our experience with technical support has been disappointing. We require more prompt and faster response times. We require answers to our questions right away but we haven't received that level of support."

More One Identity Safeguard Cons →

Pricing and Cost Advice
  • "The price of the solution is good. It is less expensive than the other solutions in the market. There are not any additional features or hidden costs."
  • More Hillstone I-Series Server Breach Detection System Pricing and Cost Advice →

  • "Setup cost, pricing and licensing are all very expensive."
  • "Our licensing costs are on a yearly basis."
  • "It was definitely cheaper than the other two products that we evaluated."
  • "They offer a fair price for a robust solution."
  • "The full license is expensive but if you plan to use it in a big organization then it is the best option because it is more flexible."
  • "It is a bit on the pricey side, but you get what you pay for. You don't want to get anything too cheap because then you get cheap stuff and cheap support. That really never helps anybody."
  • "The pricing is about $80,000 per 100 servers. There are few elective costs."
  • "We have a yearly license. The cost depends on how much a company wants to invest in technology. In our organization, we believe in modern digitization and automation processes so we found it affordable. One Identity was not that much less than other solutions and it is not a cheap solution. There were number of cheaper solutions. However, it's the most effective, according to our evaluation."
  • More One Identity Safeguard Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which User Entity Behavior Analytics (UEBA) solutions are best for your needs.
    768,578 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The most valuable features of the Hillstone I-Series Server Breach Detection System are the AI detection and monitoring of common threats.
    Top Answer:The UI dashboard view needs to be improved because it is ugly. If it was more modern it would be better. Additionally, better integration with other databases would be good.
    Top Answer:We are using Hillstone I-Series Server Breach Detection System to look for threats in our network, such as barriers and malicious software.
    Top Answer:The identity discovery is good, and the performance is pretty good value.
    Top Answer:They have comparable pricing. All identity products are essentially priced in a similar way. It's a per-user base. Usually, they start at one price, and when you start pricing the competition, you… more »
    Top Answer:Something for One Identity to look at is having integration guidelines for how to logically group accounts. This is always something you need people to do. It would be especially helpful when you have… more »
    Ranking
    Views
    62
    Comparisons
    53
    Reviews
    1
    Average Words per Review
    433
    Rating
    7.0
    Views
    381
    Comparisons
    160
    Reviews
    14
    Average Words per Review
    950
    Rating
    7.7
    Comparisons
    Also Known As
    Hillstone sBDS
    Learn More
    Overview

    The Hillstone Server Breach Detection System (sBDS) adopts multiple threat detection technologies that include both traditional signature-based technology as well as large-scale threat intelligent data modeling and user behavioral analytics modeling, which provides an ideal solution to detect unknown or 0-day threat attacks, to protect high-value, critical servers and their sensitive data from being leaked or stolen. Together with deep threat hunting analysis capabilities and visibility, Hillstone sBDS provides security admins the effective means to detect IOCs (Indicators of Compromise) events, restore the threat attack kill chain and provide extensive visibility into threat intelligence analysis and mitigations.

    One Identity Safeguard is an integrated system that combines a secure, toughened password safe and a session management and monitoring solution with threat detection and analytics into one integrated solution. It stores, manages, records, and analyzes privileged access in a secure manner.

    One Identity Safeguard Features

    One Identity Safeguard has many valuable key features. Some of the most useful ones include:

    • Policy-based release control: Seek access and approve privileged passwords and sessions using a secure online browser that supports mobile devices. Depending on your organization's policies, requests can be authorized immediately or require dual/multiple approvals. You can set One Identity Safeguard to match your personalized needs, whether your policies consider the requestor's identity and level of access, the time and day of the request attempt, and/or the specific resource requested. You can also enter reason codes and/or connect to ticketing systems.

    • Vault for personal passwords: In a free personal password vault, every one of your employees can keep and generate random passwords for non-federated business accounts. This allows your company to use a sanctioned tool to securely share and retrieve passwords, giving you much-needed security and visibility into your company's accounts.

    • Auditing, recording, and replaying entire sessions: All session activity is collected, indexed, and kept in tamper-proof audit trails that can be viewed like a video and searched like a database, down to the keystrokes, mouse movements, and windows viewed. Security teams can search across sessions for certain events and play the recording from the exact point where the search criterion happened. For forensics and compliance purposes, audit trails are encrypted, time-stamped, and cryptographically signed.

    • Approval in any location: Approve or refuse requests from anywhere, using One Identity Starling Two-Factor Authentication, without having to connect to a VPN.
    • Instantly on: Safeguard for Privileged Sessions can be implemented in a transparent manner, with no changes to user workflows required. Safeguard, when acting as a proxy gateway, can act as a network router, unseen to both the user and the server. Admins can continue to use their normal client programs and access target servers and systems without disrupting their everyday routine.

    • Biometrics of user behavior: Even when performing identical operations like typing or moving a mouse, each person has his or her own unique pattern of behavior. These behavioral characteristics are examined by the Safeguard algorithms. Keystroke dynamics and mouse movement analysis aid in the detection of security breaches while also acting as a continuous biometric authentication system.

    • Favorites: Right from the login screen, quickly access the passwords you use the most. You can combine many password requests into a single favorite, allowing you to log into all of your accounts with a single click.

    • Discovery options: With host, directory, and network-discovery options, you can quickly find privileged accounts or systems on your network.

    Reviews from Real Users

    One Identity Safeguard stands out among its competitors for a number of reasons. Two major ones are its stability and its connection control. PeerSpot users take note of the advantages of these features in their reviews:

    One PeerSpot reviewer, a Software Solutions Architect at a computer software company, writes, “I have found the most useful feature of One Identity Safeguard to be Privileged Sessions. One Identity Safeguard is a stable solution.” He adds, “I rate One Identity Safeguard a nine out of ten.”

    Walid S., Networking and Security Engineer at a tech services company, mentions of the solution, “We deployed it into our company for controlling a client's behavior in our data center. It is very useful to control their connections, such as RDP.”

    Sample Customers
    Norbert Wiener University, Regional Government of the Amazon
    Cavium
    Top Industries
    No Data Available
    REVIEWERS
    Financial Services Firm40%
    Healthcare Company15%
    Manufacturing Company10%
    University5%
    VISITORS READING REVIEWS
    Computer Software Company20%
    Financial Services Firm12%
    Manufacturing Company7%
    Government7%
    Company Size
    No Data Available
    REVIEWERS
    Small Business36%
    Midsize Enterprise24%
    Large Enterprise40%
    VISITORS READING REVIEWS
    Small Business25%
    Midsize Enterprise19%
    Large Enterprise56%
    Buyer's Guide
    User Entity Behavior Analytics (UEBA)
    April 2024
    Find out what your peers are saying about IBM, Splunk, Rapid7 and others in User Entity Behavior Analytics (UEBA). Updated: April 2024.
    768,578 professionals have used our research since 2012.

    Hillstone I-Series Server Breach Detection System is ranked 22nd in User Entity Behavior Analytics (UEBA) with 2 reviews while One Identity Safeguard is ranked 6th in User Entity Behavior Analytics (UEBA) with 38 reviews. Hillstone I-Series Server Breach Detection System is rated 7.0, while One Identity Safeguard is rated 8.2. The top reviewer of Hillstone I-Series Server Breach Detection System writes "Beneficial AI detection, helpful support, but modern UI needed". On the other hand, the top reviewer of One Identity Safeguard writes "Provides us with centralized storage of secrets and credentials, and visibility into the use of privileged access". Hillstone I-Series Server Breach Detection System is most compared with Fortinet FortiWeb, whereas One Identity Safeguard is most compared with CyberArk Privileged Access Manager, WALLIX Bastion, Delinea Secret Server, BeyondTrust Privileged Remote Access and Fudo PAM.

    See our list of best User Entity Behavior Analytics (UEBA) vendors.

    We monitor all User Entity Behavior Analytics (UEBA) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.