One Identity Safeguard vs. TSFactory RecordTS

As of June 2019, One Identity Safeguard is ranked 5th in Privileged Access Management with 6 reviews vs TSFactory RecordTS which is ranked 3rd in User Activity Monitoring with 1 review. The top reviewer of One Identity Safeguard writes "We are able to demonstrate what has happened on systems and who did what, but we want to be able to generate CSRs from the interface for certificates". The top reviewer of TSFactory RecordTS writes "Utilize support for installation. They are quick to respond, and quick at getting to the bottom of issues". One Identity Safeguard is most compared with CyberArk PAS, ObserveIT and CA Privileged Access Manager. TSFactory RecordTS is most compared with Ekran System, ObserveIT and CyberArk PAS.
Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about CyberArk, CA Technologies, ARCON and others in Privileged Access Management. Updated: May 2019.
347,244 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
The most unique and valuable features are the upstream and downstream throughput capacities; the Safeguard platform provides agile integration. In actuality, all the features are valuable. They're good, user-friendly.The transparent mode for privileged sessions is a very good solution.It is easy to manage. There is a very logical, clear user interface. Also, the integration of scripts is thoughtfully implemented. Overall, it's a nice product to manage.The technical support is tremendous.The transparent mode for privileged sessions is one of the best thing for customers, because they don't see the system in-between.The system is easy to manage, as it is not a system that you will change everything all of a sudden. It evolves most of the time with customer requests.The extensible framework for authentication is one of the most valuable features. We use an MFA plug-in and a lot of different factors, depending on what the business use-cases are. And of course, the auditing functionality is also valuable.The initial setup is very easy.

Read more »

We have used the Remote Desktop Protocol (RDP) and Citrix session recording features, and have found them to be extremely valuable.

Read more »

Cons
Our experience with technical support has been disappointing. We require more prompt and faster response times. We require answers to our questions right away but we haven't received that level of support.On a scale of one to ten, the stability is an eight.The high availability function of the box requires a long time to switch over from one appliance to another.The automated change of the passwords, which is now integrated, could be improved to be more flexible regarding different systems.For some users, the physical appliance has been a bit buggy.We would like to be able to generate certificate signing requests (CSRs) from the interface for certificates.Even though we have two nodes, there's no way to do an upgrade without taking everything completely offline. It would be nice if they could improve that.It needs more marketing.

Read more »

A built in utility that alerts when connections are made, either via RDP or ICA.

Read more »

Pricing and Cost Advice
Setup cost, pricing and licensing are all very expensive.

Read more »

We went with subscription licensing. It paid off big time for us as we installed the V.3, and just received V.4 without paying for the upgrade.

Read more »

report
Use our free recommendation engine to learn which Privileged Access Management solutions are best for your needs.
347,244 professionals have used our research since 2012.
Ranking
Views
4,357
Comparisons
1,177
Reviews
7
Average Words per Review
411
Avg. Rating
8.1
3rd
Views
562
Comparisons
218
Reviews
1
Average Words per Review
539
Avg. Rating
9.0
Top Comparisons
Compared 19% of the time.
Compared 51% of the time.
Compared 31% of the time.
Compared 18% of the time.
Learn
One Identity
TSFactory
Video Not Available
Overview

One Identity Safeguard securely stores, manages, records and analyzes privileged accounts and access. It is an integrated solution that combines a secure hardened password safe and a session management and monitoring solution with threat detection and analytics.

Security and Compliancy Assistance

Recording sessions allows you to monitor access to files or programs that contain sensitive or confidential information; for example financial data, customer information, or personnel records. This information can be used to confirm you are meeting compliancy and security requirements.

Built for the Cloud and Virtualized Environments

From the ground up, RecordTS was designed to work in hosted environments, making it a tightly integrated solution to monitor remote access to your cloud infrastructure. RecordTS works well with VMware, Hyper-V, XenServer and other virtual hosting environments built on Windows Server and Workstation virtual machines.

High Reliability Architecture

In the event your network or database become unstable, your session data will be buffered and stored locally until stability can be restored. There are internal mechanisms (drain mode) to accommodate controlled, graceful system reboots as well as support for session reliability and quick start so users are not left waiting to reconnect to their active sessions.

Enterprise Design for Scalability

Whether you are recording one machine or ten thousand, RecordTS can handle the job. With its robust distributed, centrally managed architecture, deploying session recording to a large infrastructure is as simple as 1-2-3.

Offer
Learn more about One Identity Safeguard
Learn more about TSFactory RecordTS
Sample Customers
CaviumBASF, Cerner, Covance, Credit Suisse, Fiserv, GE Healthcare, ING, International Culinary Center, Mitsubishi, Shell, Siemens, Swift, Spectrum, Tyson
Find out what your peers are saying about CyberArk, CA Technologies, ARCON and others in Privileged Access Management. Updated: May 2019.
347,244 professionals have used our research since 2012.
We monitor all Privileged Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email