One Identity Privileged Access Suite for Unix Initial Setup

Hicham Barnoussi - PeerSpot reviewer
Managing Partner at Smpl ID

The setup process depends on the environment of the customer. It's not dependent on the solution. For customers with normal use cases and scenarios, it's a straightforward implementation, but for a customer with more than one environment, they may have BeyondTrust in one environment and Safeguard in another one. When they want to consolidate later, there may be complications. It depends on the devices and assets they would like to have under their PAM solution.

The standard time for implementation is four weeks. I rate the setup an eight out of ten. There needs to be a dedicated resource for maintenance.

View full review »
YP
Sysadmin unix at a renewables & environment company with 10,001+ employees

The initial setup was straightforward.

View full review »
EY
Solution Architect at a tech services company with 51-200 employees

This solution is easy to install, although depending on how much customization is required it can take longer to configure.

The average time for deployment is approximately five days.

View full review »
Buyer's Guide
Privileged Access Management (PAM)
March 2024
Find out what your peers are saying about One Identity, ManageEngine, WALLIX and others in Privileged Access Management (PAM). Updated: March 2024.
765,234 professionals have used our research since 2012.