One Identity Safeguard vs. UserLock

One Identity Safeguard is ranked 9th in Privileged Access Management with 1 review vs UserLock which is ranked 20th in Identity and Access Management (IAM) with 1 review. The top reviewer of One Identity Safeguard writes "The initial setup is very easy". The top reviewer of UserLock writes "Detecting and responding to security threats by blocking the user is a valuable feature". One Identity Safeguard is most compared with CyberArk Privileged Access Security. UserLock is most compared with NextLabs Authorization Management, Araxid and OpenIAM.
Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about CyberArk, CA Technologies, BeyondTrust and others in Privileged Access Management.
309,940 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
The initial setup is very easy.The customer service and technical support are very good.

Read more »

Detecting and responding to security threats by blocking the user is a valuable feature.

Read more »

Cons
It needs more marketing.

Read more »

Productivity monitoring could be improved.

Read more »

report
Use our free recommendation engine to learn which Privileged Access Management solutions are best for your needs.
309,940 professionals have used our research since 2012.
Ranking
Views
105
Comparisons
49
Reviews
1
Followers
6
Avg. Rating
9.0
Views
1,064
Comparisons
281
Reviews
1
Followers
244
Avg. Rating
10.0
Top Comparisons
Compared 33% of the time.
Compared 31% of the time.
Learn
One Identity
Video Not Available
IS Decisions
Overview

One Identity Safeguard provides a single architecture for privileged access management that is delivered on a secure hardened appliance. This architecture greatly simplifies deployment and management, and accelerates the time to value. Safeguard enables you leverage a unified policy engine and management tools to securely grant access to privileged passwords and sessions. The Safeguard appliance is built specifically for use with the Safeguard software, which is preinstalled and ready for immediate use. The appliance is hardened to ensure the system is secured at the hardware, operating system and software levels. This approach protects the privileged management software from attacks while also simplifying deployment and management.

Protect, detect and react to all user's access to Microsoft Windows Server-based Networks. UserLock offers stronger security for Windows user logins, without impeding end users or frustrating IT teams. Harden your defense against unauthorized network access and compromised credentials. Access Control & Protection: Set and enforce non-intrusive, context-aware access controls that define network access conditions for all users. Detection & Response: Real-time monitoring and risk detection Tools immediately alert you to suspicious logon activity so you can take action quickly - crucially before that activity becomes a serious problem. Auditing & Reporting: Record, centralize and audit all network logon events, across the whole network for comprehensive reports and detailed insights.
Offer
Learn more about One Identity Safeguard
Learn more about UserLock
Sample Customers
CaviumBarclays, US Department of Justice, National Bank of Kuwait, Turkish Aerospace, New York Albany School District, Regtransfers, University of Kent, Camden City School District, Oklahoma City Public Schools, Bank of Cyprus, Detran-PE: Pernambuco State Traffic Department
Find out what your peers are saying about CyberArk, CA Technologies, BeyondTrust and others in Privileged Access Management.
309,940 professionals have used our research since 2012.
We monitor all Privileged Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email