One Identity Safeguard Pros and Cons

One Identity Safeguard Pros

Cedric Jolivet
Identity & Access Manager at Reist Telecom Gmbh
The transparent mode for privileged sessions is one of the best thing for customers, because they don't see the system in-between.
The system is easy to manage, as it is not a system that you will change everything all of a sudden. It evolves most of the time with customer requests.
View full review »
Stephen Fleming-Unger
Security Consultant at Controlware GmbH
It is easy to manage. There is a very logical, clear user interface. Also, the integration of scripts is thoughtfully implemented. Overall, it's a nice product to manage.
The technical support is tremendous.
View full review »
Sergey Smirkin
Head of Information Security at a financial services firm
The most unique and valuable features are the upstream and downstream throughput capacities; the Safeguard platform provides agile integration. In actuality, all the features are valuable. They're good, user-friendly.
View full review »
Find out what your peers are saying about CyberArk, CA Technologies, ARCON and others in Privileged Access Management. Updated: May 2019.
347,894 professionals have used our research since 2012.
IdmArchi90fa
IDM Architect at a tech company with 10,001+ employees
The extensible framework for authentication is one of the most valuable features. We use an MFA plug-in and a lot of different factors, depending on what the business use-cases are. And of course, the auditing functionality is also valuable.
View full review »
HeadOfDed6dc
Head of Department at a financial services firm with 10,001+ employees
The transparent mode for privileged sessions is a very good solution.
View full review »
Carlos Mata
System Consultant with 1,001-5,000 employees
The initial setup is very easy.
The customer service and technical support are very good.
View full review »

One Identity Safeguard Cons

Cedric Jolivet
Identity & Access Manager at Reist Telecom Gmbh
For some users, the physical appliance has been a bit buggy.
We would like to be able to generate certificate signing requests (CSRs) from the interface for certificates.
View full review »
Stephen Fleming-Unger
Security Consultant at Controlware GmbH
The high availability function of the box requires a long time to switch over from one appliance to another.
The automated change of the passwords, which is now integrated, could be improved to be more flexible regarding different systems.
View full review »
Sergey Smirkin
Head of Information Security at a financial services firm
Our experience with technical support has been disappointing. We require more prompt and faster response times. We require answers to our questions right away but we haven't received that level of support.
View full review »
Find out what your peers are saying about CyberArk, CA Technologies, ARCON and others in Privileged Access Management. Updated: May 2019.
347,894 professionals have used our research since 2012.
IdmArchi90fa
IDM Architect at a tech company with 10,001+ employees
Even though we have two nodes, there's no way to do an upgrade without taking everything completely offline. It would be nice if they could improve that.
View full review »
HeadOfDed6dc
Head of Department at a financial services firm with 10,001+ employees
On a scale of one to ten, the stability is an eight.
View full review »
Carlos Mata
System Consultant with 1,001-5,000 employees
It needs more marketing.
View full review »
Find out what your peers are saying about CyberArk, CA Technologies, ARCON and others in Privileged Access Management. Updated: May 2019.
347,894 professionals have used our research since 2012.

Sign Up with Email