One Identity Safeguard Reviews

Filter by:Reset all filters
industry
Filter Unavailable
Company Size
Filter Unavailable
Job Level
Filter Unavailable
rating
Filter Unavailable
Carlos Mata
Consultant
System Consultant with 1,001-5,000 employees
Jun 07 2018

What do you think of One Identity Safeguard?

Primary Use Case: Privileged management.  • Improvements to My Organization: Administrators can administrate the privileged accounts. It is a safer way to monitor the administrators. • Valuable Features: Its hardware and compliance. • Use of Solution: More than five years. • Stability Issues: Stability is very good. • Scalability Issues: Scalability is very good. • Customer Service and Technical Support: The customer service and technical support are very good. • Initial Setup: The initial setup is very easy. • Other Solutions Considered: I compared different solutions, like Oracle. • Other Advice: It is a good solution, but it needs more marketing. Most important criteria when selecting a vendor: The support How long the product has been...

Articles

User Assessments By Topic About One Identity Safeguard

Find out what your peers are saying about Quest Software, Centrify, Ping Identity and others in Identity and Access Management (IAM).
291,379 professionals have used our research since 2012.

One Identity Safeguard Questions

One Identity Safeguard Projects By Members

One Identity Safeguard Consultants

What is One Identity Safeguard?

One Identity Safeguard provides a single architecture for privileged access management that is delivered on a secure hardened appliance. This architecture greatly simplifies deployment and management, and accelerates the time to value. Safeguard enables you leverage a unified policy engine and management tools to securely grant access to privileged passwords and sessions. The Safeguard appliance is built specifically for use with the Safeguard software, which is preinstalled and ready for immediate use. The appliance is hardened to ensure the system is secured at the hardware, operating system and software levels. This approach protects the privileged management software from attacks while also simplifying deployment and management.

One Identity Safeguard customers

Cavium

BUYER'S GUIDE
Not sure which Identity and Access Management (IAM) solution is right for you?

Download our free Identity and Access Management (IAM) Report and find out what your peers are saying about Quest Software, Centrify, Ping Identity, and more!

Sign Up with Email