Nuwan ChathurangaTeam Lead - Network and Security at Connex Information Technologies
Alexander PirogovHead of Department of Technical Means of Protection at BrokerCreditService
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The solution's most valuable features are the graphical user interface and the reporting."
"It has a lot of features. It has file integration monitoring."
"The most valuable features are file activity monitoring and registry activity monitoring."
"The transparent mode for privileged sessions is one of the best things for customers, because they don't see the system in-between."
"The system is easy to manage, as it is not a system that you will change everything all of a sudden. It evolves most of the time with customer requests."
"The transparent mode for privileged sessions is a very good solution."
"It is easy to manage. There is a very logical, clear user interface. Also, the integration of scripts is thoughtfully implemented. Overall, it's a nice product to manage."
"The technical support is tremendous."
"The most unique and valuable features are the upstream and downstream throughput capacities; the Safeguard platform provides agile integration. In actuality, all the features are valuable. They're good, user-friendly."
"The way the solution is installed and deployed is very valuable. They make it very easy."
"The solution's most valuable features are the efficiency and the quality of the recording."
"The search feature needs to be improved."
"It should have better mitigation with other solutions and be tightly integrated with other solutions. It has to be improved."
"It would be helpful if there were more guidance provided for integrating with unsupported devices."
"For some users, the physical appliance has been a bit buggy."
"We would like to be able to generate certificate signing requests (CSRs) from the interface for certificates."
"On a scale of one to ten, the stability is an eight."
"The high availability function of the box requires a long time to switch over from one appliance to another."
"The automated change of the passwords, which is now integrated, could be improved to be more flexible regarding different systems."
"Our experience with technical support has been disappointing. We require more prompt and faster response times. We require answers to our questions right away but we haven't received that level of support."
"I would like to see an adjustment with more enterprise architecture. You can buy multiple appliances but you can not fully separate different functions, so scaling might be a bit more complicated."
"The interface is better now, but it still could be improved a lot. It needs more organization, menus, automatic refresh of information, and Web 2.0."
"Licensing is on a yearly basis. It's not expensive compared to its competitors."
"The pricing is nice when compared to other products in the industry."
"Setup cost, pricing and licensing are all very expensive."
"Our licensing costs are on a yearly basis."
"It was definitely cheaper than the other two products that we evaluated."
"They offer a fair price for a robust solution."
"The full license is expensive but if you plan to use it in a big organization then it is the best option because it is more flexible."
"It is a bit on the pricey side, but you get what you pay for. You don't want to get anything too cheap because then you get cheap stuff and cheap support. That really never helps anybody."
"The pricing is about $80,000 per 100 servers. There are few elective costs."
"We have a yearly license. The cost depends on how much a company wants to invest in technology. In our organization, we believe in modern digitization and automation processes so we found it affordable. One Identity was not that much less than other solutions and it is not a cheap solution. There were number of cheaper solutions. However, it's the most effective, according to our evaluation."
LogRhythm UEBA enables your security team to quickly and effectively detect, respond to, and neutralize both known and unknown threats. Providing evidence-based starting points for investigation, it employs a combination of scenario analytics techniques (e.g., statistical analysis, rate analysis, trend analysis, advanced correlation), and both supervised and unsupervised machine learning (ML).
One Identity Safeguard securely stores, manages, records and analyzes privileged accounts and access. It is an integrated solution that combines a secure hardened password safe and a session management and monitoring solution with threat detection and analytics.
Prevent security breaches and limit damage by putting in place a privileged access management solution. Get a free 45-day trial, or request a demo of One Identity SafeGuard.
LogRhythm Enterprise UEBA is ranked 15th in User Behavior Analytics - UEBA with 3 reviews while One Identity Safeguard is ranked 2nd in User Behavior Analytics - UEBA with 15 reviews. LogRhythm Enterprise UEBA is rated 6.0, while One Identity Safeguard is rated 8.4. The top reviewer of LogRhythm Enterprise UEBA writes "Good file and registry activity monitoring capability, and the support team is helpful". On the other hand, the top reviewer of One Identity Safeguard writes "Improved our security posture by making password changes easy and allowing us to make regular password changes to service accounts". LogRhythm Enterprise UEBA is most compared with Darktrace, Cisco Stealthwatch, Splunk User Behavior Analytics, Trend Micro Deep Discovery Inspector and Vectra AI, whereas One Identity Safeguard is most compared with CyberArk PAS, WALLIX Bastion, Fudo PAM, Thycotic Secret Server and BeyondTrust Privileged Remote Access. See our LogRhythm Enterprise UEBA vs. One Identity Safeguard report.
See our list of best User Behavior Analytics - UEBA vendors.
We monitor all User Behavior Analytics - UEBA reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.