PRIVILEGED ACCESS MANAGEMENT
One Identity Privileged Access Management
One Identity Privileged Access Management (PAM) solutions mitigate security risks and enable compliance. Now available as a SaaS-delivered or traditional on-prem offering. You can secure, control, monitor, analyze and govern privileged access across multiple environments and platforms. Complete flexibility to provide the full credential when necessary or limit access to Zero Trust and least-privileged operating models.

Privileged session management
Control, monitor and record privileged sessions of administrators, remote vendors and other high-risk users. Sessions recording are indexed to simplify and accelerate searching for events. Automated reports enable you to easily meet your auditing and compliance requirements.
Privileged password vault
Automate, control and secure the process of granting privileged credentials with role-based access management and automated workflows. Plus, you can manage passwords from anywhere with nearly any device.


Privileged threat analytics
Analyze privileged session recordings to identify your high-risk privileged users. Monitor questionable behaviors and other anomalies so that you can discover internal and external threats and make immediate actions to prevent breaches.
Least privileged access
Protect your organization and prevent security breaches by providing just the right amount of access to administrators so that they can perform their duties. Implement a least-privilege security approach with granular delegation of administrative access on UNIX and Windows servers and desktops.


UNIX identity consolidation
Remove the stand-alone authentication and authorization requirement of native UNIX in favor of a more secure, single-identity/point-of-management functionality available through Active Directory (AD). Using the One Identity AD bridge solution, you can extend the unified authentication and authorization of Active Directory to UNIX, Linux, and Mac systems.
Privileged access governance
Integrate Identity Manager with Safeguard to extend its governance capabilities, including unified policies, automated and business-driven attestation, and enterprise provisioning. Users can request, provision and attest to privileged- and general-user access within Identity Manager thus achieving a unified governance approach for all employees, regardless of their role and level of access.

ONE IDENTITY PRIVILEGED ACCESS MANAGEMENT
Featured products
- All
- Privileged session management
- Privileged password vault
- Privileged threat analytics
- Least privileged access
- Unix identity consolidation
- Privileged access governance
Activity Roles
Secure and automate the administration, access and provisioning of users and groups for AD/AzureAD
Activity Roles On Demand
Secure and automate the administration, access and provisioning of users and groups for AD/AzureAD delivered in a SaaS model
Identity Manager
Govern and secure user access to data and enterprise apps to reduce risk and satisfy compliance
Safeguard
Securely store, manage, record and analyze privileged access
Safeguard Authentication Services
Leverage AD bridging to unify policy-based management across Unix, Linux, and Mac systems
Safeguard for Privileged Analytics
Track and visualize privileged-credential data and identify anomalies or bad behavior
Safeguard for Privileged Passwords
Manage and protect privileged credentials with password vaulting
Safeguard for Privileged Sessions
Record and monitor privileged sessions to stop security threats in real time
Safeguard for Sudo
Extend functionality of sudo with this secure and efficient root access policy management solution
Safeguard On Demand
Secure privileged accounts and enable Zero Trust for just-in-time access in a SaaS model
Safeguard Remote Access
Securely connect remote privileged users to critical resources without VPN
Privilege Manager for Windows
Control and secure the admin accounts on Windows systems
Identity Manager On Demand
Govern user access to data and enterprise apps to strengthen security compliance in a SaaS model