Join the 1500 companies using G2 Track to manage SaaS spend, usage, contracts & compliance.

One Identity

3.8
(2)

One Identity offers identity and access management solutions.

Work for One Identity?

Learning about One Identity?

We can help you find the solution that fits you best.

One Identity Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Filter Reviews
Ratings
Company Size
User Role
Industry
Showing 2 One Identity reviews
LinkedIn Connections
One Identity review by Administrator in Computer Networking
Administrator in Computer Networking
Validated Reviewer
Review Source
content

"Effective Administration"

What do you like best?

Simple to use. It helps me manage users and devices without any roadblocks, and it works great when I have to access accounts through our VPN.

What do you dislike?

Some error issues could have a better explanation, or even just more streamlined guidelines to avoid potential errors.

Recommendations to others considering the product

I think that One Identity goes beyond a lot of the capabilities of other Active Directory software like Microsoft and Azure. I don't think that I have been limited in any way while using over the past 5+ years.

What business problems are you solving with the product? What benefits have you realized?

The biggest problem is just being able to setup and manage user accounts, especially remotely. Most of our users are half the country away, and Active Roles helps me when there are lock out issues, or when new users need to be added, or when I need to adjust user qualifications. Another big component for me is to set up various email groups for specific staff sets.

Sign in to G2 to see what your connections have to say about One Identity
One Identity review by User in Entertainment
User in Entertainment
Validated Reviewer
Review Source
content

"It's effective, if too simplistic"

What do you like best?

I like that everything is clearly labeled, and you don't have to hunt to find what you're looking for.

What do you dislike?

The set up is too... I don't know, bland? If you're not given a tutorial, it's hard to figure out what you're supposed to be using. It's not beginner-friendly.

Recommendations to others considering the product

I think it's worth the go. Useful. Effective.

What business problems are you solving with the product? What benefits have you realized?

It helps me stay organized, which is nice.

What Other IT Security solution do you use?

Thanks for letting us know!

There are not enough reviews of One Identity for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Darktrace Logo
Darktrace
4.1
(24)
The enterprise immune system
2
Esker on Demand Logo
Esker on Demand
4.6
(16)
Esker on Demand is a cloud-based document process and information exchange service that enables companies to automate the processing and exchange of crucial business documents it include rapid project go live, increased profitability, pay only for what you use, and low risk.
3
Apple Support Number Logo
Apple Support Number
4.4
(14)
Apple Support Number offers Apple customer service for MacBook, iPad, iPhone and iTunes.
4
Prey Logo
Prey
4.6
(8)
Prey is an Anti-Theft and management application that helps you keep track and secure your laptop, phone and tablet.
5
Outlook Password Recovery Logo
Outlook Password Recovery
3.7
(7)
Outlook Password Recovery software is a software that can to reset forgotten Outlook PST password, support to recover longer and multilingual password and unlock protected PST file within seconds and get data from protected PST file without any data defeat.
6
Palo Alto Networks URL Filtering PAN-DB Logo
Palo Alto Networks URL Filtering PAN-DB
4.8
(6)
The majority of attacks and exposure to malicious content occurs during the normal course of web browsing activities, which requires the ability to allow safe, secure web access for all users. URL Filtering with PAN-DB automatically prevents attacks that leverage the web as an attack vector, including phishing links in emails, phishing sites, HTTP-based command and control, malicious sites and pages that carry exploit kits.
7
Palo Alto Networks Wildfire Logo
Palo Alto Networks Wildfire
4.1
(6)
WildFire cloud-based threat analysis service is the industrys most advanced analysis and prevention engine for highly evasive zero-day exploits and malware. The cloud-based service employs a unique multi-technique approach combining dynamic and static analysis, innovative machine learning techniques, and a groundbreaking bare metal analysis environment to detect and prevent even the most evasive threats.
8
Stellar Phoenix Mac Data Recovery Logo
Stellar Phoenix Mac Data Recovery
4.4
(4)
This is a rescue application which retrieves deleted data from a Mac hard drive. A number of storage devices it can support ranges from SSDs, USB, external hard drives, Time Machine and password protected media. Compatible with macOS Sierra 10.12.
9
Rocket Servergraph Logo
Rocket Servergraph
5.0
(3)
Rocket Servergraph reduces the cost and complexity of monitoring/reporting of backup environment across heterogeneous platforms and applications.
10
AWS Security Hub Logo
AWS Security Hub
3.7
(4)
AWS Security Hub gives you a comprehensive view of your high-priority security alerts and compliance status across AWS accounts.
Show more
Kate from G2

Learning about One Identity?

I can help.
* We monitor all One Identity reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.