---
description: Review of SecureONE Software: system overview, features, price and cost information. Get free demos and compare to similar programs on Software Advice Ireland.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: SecureONE | Reviews, Pricing & Demos - SoftwareAdvice IE
---

Breadcrumb: [Home](/) > [Endpoint Detection and Response Software](/directory/3977/edr/software) > [SecureONE](/software/337919/secureone)

# SecureONE

Canonical: https://www.softwareadvice.ie/software/337919/secureone

> SecureONE is a tool designed for privileged access management. It helps manage user access across departments, branches, and hierarchies. IT administrators can access an overview of system statuses, active sessions, and user identities with the Lightweight Directory Access Protocol (LDAP) mechanism. They can stop lateral movement, prevent ransomware, provide endpoint security, set up security orchestration, and draft remediation strategies. &#10;&#10;Users can also find and remove instances of access sprawl from the system. SecureONE lets them set up two-factor authentication to prevent data leakage or exploitation and restrict access based on roles or attributes. They can also grant on-demand access using Just-in-Time (JIT) methods or enable Zero Standing Privilege (ZSP). &#10;&#10;SecureONE provides security information and deploys event management methodology. IT administrators can scan servers or desktops to perform compliance audits. Multi-factor authentication mandates enable security and breach detection across multiple networks. Security orchestration, automation, and response make threat identification and remedial strategies in line with the National Institute of Standards and Technology's requirements.
> 
> Verdict: Rated **5.0/5** by 1 users. Top-rated for **Likelihood to recommend**.

-----

## Quick Stats & Ratings

| Metric | Rating | Detail |
| **Overall** | **5.0/5** | 1 Reviews |
| Ease of Use | 5.0/5 | Based on overall reviews |
| Customer Support | 5.0/5 | Based on overall reviews |
| Value for Money | 5.0/5 | Based on overall reviews |
| Features | 5.0/5 | Based on overall reviews |
| Recommendation percentage | 100% | (10/10 Likelihood to recommend) |

## About the vendor

- **Company**: Remediant
- **Location**: San Francisco, US
- **Founded**: 2015

## Commercial Context

- **Starting Price**: US$50.00
- **Pricing model**:  (Free Trial)
- **Pricing Details**: Contact Remediant for pricing information
- **Target Audience**: 2–10, 11–50, 51–200, 201–500, 501–1,000, 1,001–5,000, 5,001–10,000, 10,000+
- **Deployment & Platforms**: Cloud, SaaS, Web-based, Mac (Desktop), Windows (Desktop), Linux (Desktop)
- **Supported Languages**: English
- **Available Countries**: Albania, Andorra, Austria, Belarus, Belgium, Bosnia & Herzegovina, Bulgaria, Canada, Croatia, Cyprus, Czechia, Denmark, Estonia, Faroe Islands, Finland, France, Germany, Gibraltar, Greece, Greenland and 33 more

## Features

- API
- Access Controls/Permissions
- Access Management
- Active Directory Integration
- Activity Dashboard
- Audit Management
- Audit Trail
- Authentication
- Compliance Management
- Credential Management
- Dashboard
- Endpoint Management
- Firewalls
- Incident Management
- Least Privilege
- Multi-Factor Authentication
- Password Management
- Policy Management
- Privileged Account Management
- Real-Time Monitoring

## Integrations (5 total)

- Axonius
- Carbon Black EDR
- SailPoint
- ServiceNow
- Splunk Enterprise

## Support Options

- Email/Help Desk
- Phone Support
- 24/7 (Live rep)

## Category

- [Endpoint Detection and Response Software](https://www.softwareadvice.ie/directory/3977/edr/software)

## Related Categories

- [Endpoint Detection and Response Software](https://www.softwareadvice.ie/directory/3977/edr/software)
- [Network Security Software](https://www.softwareadvice.ie/directory/4170/network-security/software)
- [Network Monitoring Tools](https://www.softwareadvice.ie/directory/4307/network-monitoring/software)
- [Privileged Access Management Software](https://www.softwareadvice.ie/directory/4241/privileged-access-management/software)
- [Identity Management Software](https://www.softwareadvice.ie/directory/4549/identity-management/software)

## Alternatives

1. [Secomea](https://www.softwareadvice.ie/software/440313/secomea) — 4.7/5 (19 reviews)
2. [Perimeter 81](https://www.softwareadvice.ie/software/230245/perimeter-81) — 4.8/5 (80 reviews)
3. [NordLayer](https://www.softwareadvice.ie/software/336763/nordvpn-teams) — 4.6/5 (33 reviews)
4. [Cisco Duo](https://www.softwareadvice.ie/software/430527/duo-security) — 4.7/5 (548 reviews)
5. [GoodAccess](https://www.softwareadvice.ie/software/186523/goodaccess) — 4.9/5 (103 reviews)

## Reviews

### "SecureONE delivers on the promise" — 5.0/5

> **Jason** | *19 September 2018* | Wholesale | Recommendation rating: 10.0/10
> 
> **Pros**: Ease of implementation and management - containerized deploy dramatically simplifies updates and reduces downtime&#10;Quick time to value - within an hour, we had systems scanned and privileges identified; raised awareness to issues we were not fully aware of&#10;Reduced human error risk - admins are explicit in their actions and are not inadvertently making changes to systems
> 
> **Cons**: At the time of our implementation, we were not leveraging an API for automating credential management for services and unattended processes. This is still an outstanding item and will require some application development time.
> 
> Our ultimate goal is to increase our visibility and ensure every administrative session is re-authenticated beyond a shadow of a doubt. SecureONE provides the increased assurance we need and has done so at a fraction of the cost and complexity of competing solutions.

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.ie/software/337919/secureone)

## This page is available in the following languages

| Locale | URL |
| en | <https://www.softwareadvice.com/network-monitoring/secureone-profile/> |
| en-AU | <https://www.softwareadvice.com.au/software/337919/secureone> |
| en-GB | <https://www.softwareadvice.co.uk/software/337919/secureone> |
| en-IE | <https://www.softwareadvice.ie/software/337919/secureone> |
| en-NZ | <https://www.softwareadvice.co.nz/software/337919/secureone> |

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice Ireland","address":{"@type":"PostalAddress","addressLocality":"Dublin","addressRegion":"D","postalCode":"D02 NP94","streetAddress":"2 Park Place, 3rd Floor, Hatch St Dublin, D02 NP94 Ireland"},"description":"We've helped more than 500000 buyers to find the right software.","email":"info@softwareadvice.ie","url":"https://www.softwareadvice.ie/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@id":"https://www.softwareadvice.ie/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"SecureONE","description":"SecureONE is a tool designed for privileged access management. It helps manage user access across departments, branches, and hierarchies. IT administrators can access an overview of system statuses, active sessions, and user identities with the Lightweight Directory Access Protocol (LDAP) mechanism. They can stop lateral movement, prevent ransomware, provide endpoint security, set up security orchestration, and draft remediation strategies. \n\nUsers can also find and remove instances of access sprawl from the system. SecureONE lets them set up two-factor authentication to prevent data leakage or exploitation and restrict access based on roles or attributes. They can also grant on-demand access using Just-in-Time (JIT) methods or enable Zero Standing Privilege (ZSP). \n\nSecureONE provides security information and deploys event management methodology. IT administrators can scan servers or desktops to perform compliance audits. Multi-factor authentication mandates enable security and breach detection across multiple networks. Security orchestration, automation, and response make threat identification and remedial strategies in line with the National Institute of Standards and Technology's requirements.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductScreenshot/c43b0a77-bb5d-4440-81ef-e0aeb4bc894c.jpeg","url":"https://www.softwareadvice.ie/software/337919/secureone","@id":"https://www.softwareadvice.ie/software/337919/secureone#software","@type":"SoftwareApplication","publisher":{"@id":"https://www.softwareadvice.ie/#organization"},"applicationCategory":"BusinessApplication","aggregateRating":{"@type":"AggregateRating","ratingValue":5.0,"bestRating":5,"ratingCount":1},"offers":{"price":"50","@type":"Offer","priceCurrency":"USD"},"operatingSystem":"Cloud, Apple, Windows, Linux"},{"@id":"https://www.softwareadvice.ie/software/337919/secureone#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Endpoint Detection and Response Software","position":2,"item":"/directory/3977/edr/software","@type":"ListItem"},{"name":"SecureONE","position":3,"item":"/software/337919/secureone","@type":"ListItem"}]}]}
</script>
