One Identity Safeguard Room for Improvement

Cedric Jolivet
Identity & Access Manager at Reist Telecom Gmbh
* We have not yet found the solution to be extensible through cloud-delivered services. * Our external indexers are able to integrate with a hardware security module (HSM), which is good. What we have now requested is the integration of HSM with the SPS solution to be able to not have to manage certificates and the private key outside of any tamperproof system. * We would like to be able to generate certificate signing requests (CSRs) from the interface for certificates. * We would like to be able to manage the lifecycle of the archived audit traits. If they are on the box, the cleanup and archiving policies are applied, as soon as they are archived on the external share, this does not apply. We need our customers to not have to manually delete these archives. * From a web interface perspective, we would like to be able to duplicate connections, so we can reorder them. View full review »
Stephen Fleming-Unger
Security Consultant at Controlware GmbH
There are some features which are still missing compared to other competitors. For example, some customers need legacy VPN authentication capabilities. The automated change of the passwords, which is now integrated, could be improved to be more flexible regarding different systems. View full review »
Sergey Smirkin
Head of Information Security at a financial services firm
The technical support for this solution needs to be immediate, intuitive, and responsive especially as it refers to supporting ticket submissions and processing. Furthermore, we've had trouble understanding how certain policy framework applies. I would like to see clearly laid out policies or better support and explanations around policy dynamics. The stability and downtime of the solution could also be upgraded to include a messaging function which would give users a clear understanding of what's happening without having to navigate to a particular section of the page. Lastly, I would also like to see the price reduced. View full review »
Find out what your peers are saying about One Identity, CyberArk, Centrify and others in Privileged Access Management. Updated: June 2019.
353,345 professionals have used our research since 2012.
IdmArchi90fa
IDM Architect at a tech company with 10,001+ employees
Feature-wise, right now, it has most of the features that we're looking for. It could improve a bit on the management side of things. One example would be when doing an upgrade. We have a highly-available appliance spare, and even though we have two nodes, there's no way to do an upgrade without taking everything completely offline. It would be nice if they could improve that. View full review »
Find out what your peers are saying about One Identity, CyberArk, Centrify and others in Privileged Access Management. Updated: June 2019.
353,345 professionals have used our research since 2012.
Sign Up with Email