Try our new research platform with insights from 80,000+ expert users

AWS Identity and Access Management vs CyberArk IGA Powered by Zilla comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 4, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

AWS Identity and Access Man...
Ranking in Identity Management (IM)
7th
Average Rating
9.0
Reviews Sentiment
6.7
Number of Reviews
12
Ranking in other categories
Cloud Resource Access Management (4th)
CyberArk IGA Powered by Zilla
Ranking in Identity Management (IM)
16th
Average Rating
8.6
Reviews Sentiment
7.3
Number of Reviews
3
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (17th)
 

Mindshare comparison

As of January 2026, in the Identity Management (IM) category, the mindshare of AWS Identity and Access Management is 0.5%, up from 0.1% compared to the previous year. The mindshare of CyberArk IGA Powered by Zilla is 1.8%, up from 0.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity Management (IM) Market Share Distribution
ProductMarket Share (%)
AWS Identity and Access Management0.5%
CyberArk IGA Powered by Zilla1.8%
Other97.7%
Identity Management (IM)
 

Featured Reviews

SumitMundik - PeerSpot reviewer
Lead Admin Systems at a financial services firm with 10,001+ employees
IAM improves cloud security management with hybrid network capabilities and global role access
In AWS Identity and Access Management solutions, CloudFormation tools are used to create templates. Having predefined templates available from the AWS team would be beneficial. Currently, security teams work on policies and scripts for creating generic AWS Identity and Access Management roles. If AWS could provide an option to automatically create templates based on desired access requirements, it would be extremely beneficial, especially for documentation and troubleshooting purposes. Storage gateway creation has limitations, allowing maximum of 50 SMB file shares per gateway. While it is costly to access S3 buckets via AWS Identity and Access Management role through storage gateway, companies invest in this for enhanced data security, particularly in financial sectors where data integrity is crucial. There is an ongoing issue where files are sometimes sent twice to S3 buckets, despite MoveIt logs showing single transmission. As a workaround, Lambda functions are implemented with a five-minute delay before processing files to downstream applications.
reviewer2795934 - PeerSpot reviewer
Associate Director at a legal firm with 10,001+ employees
Identity governance has strengthened privileged access controls and supports ongoing compliance
Customization involves making changes to fit customer requirements. Maintenance usually involves sometimes having issues with different connectors, mostly the Active Directory and LDAP connectors. Periodic aggregation of accounts and applications sometimes go through issues with firewalls. Sometimes they do not work, and you need to make sure your connectors are all in sync, especially your LDAP and AD connectors. Sometimes there could be some issues occurring between these two connectors, so there will be maintenance on that side, making sure they are working on a regular basis based on your monitoring plan. Taking backups regularly and periodic backups are essential. Both the support rating and the overall product rating for CyberArk IGA Powered by Zilla is eight out of ten. Eight means they have complete processes in place to help support, they have resources available, and there is a method to contact them and get response quickly. In that regard, eight is appropriate because they reuse some of their main PAM components which is very good, and compared to other products which I ranked around nine, they should be at eight.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"AWS IAM is useful since it restricts unauthorized use of the AWS console."
"IAM is highly helpful for monitoring and privilege management."
"AWS Identity and Access Management has an intuitive user interface that is simple to use."
"AWS Identity and Access Management has an intuitive user interface that is simple to use."
"From my experience, AWS Identity and Access Management is a strong solution."
"I rate AWS Identity and Access Management ten out of ten."
"The most beneficial aspect of AWS Identity and Access Management is the ability to manage security."
"A significant advantage is that unlike access keys and secret keys that require regular changes every 30-90 days based on organizational policy, AWS Identity and Access Management roles, once set up, do not require periodic changes."
"I enjoy the ease of setup and creation of a review. Being a user of the tool or kind of an admin of the tool, the ease of setup of an access review is valuable."
"CyberArk IGA Powered by Zilla is a very stable product, and I do not see a lot of issues with it most of the time."
"We had these spreadsheets all over the place, but now we have a library of evidence to consult when needed. Zilla keeps everything in one place. It's not scattered all over anymore."
 

Cons

"The user activity tracking in AWS Identity and Access Management should be enhanced to provide detailed descriptions of user activities."
"There is an ongoing issue where files are sometimes sent twice to S3 buckets, despite MoveIt logs showing single transmission."
"Currently, the IAM solution does not allow one user to create multiple access and secret keys, which can be distributed in a diverse manner. This feature would be beneficial."
"There could be improvements in making the command line interface options clearer regarding the purpose of each selection."
"Currently, AWS Identity and Access Management needs improvement in the prevention of unauthorized access to sensitive data and models."
"The documentation and policies could be more straightforward."
"I would like to see scalability improvements in AWS Identity and Access Management, such as better integration with existing systems and applications."
"I would like to see scalability improvements in AWS Identity and Access Management, such as better integration with existing systems and applications."
"Maybe this is coming with their AI module, but I would like to see a feature that performs baseline analysis of permissions that may not fit into a role, and it attempts to group them into a role. We've run into problems with applications where someone has not created a role but assigned ad hoc permissions to a user. We still need to do some manual work to identify the group that the user belongs to. It would be amazing to have Zilla streamline that."
"CyberArk IGA Powered by Zilla is lacking in the governance side of identities compared to competitors."
"There is still no automated way to de-provision access as a result of a review, but they are getting there in terms of making it unified. They are getting closer to that."
 

Pricing and Cost Advice

Information not available
"It has been fair because we have been in from the beginning or close to the beginning. I know it is not truly an identity access management system yet, but its price was one of the appealing factors for us to purchase it at the time. It was reasonably priced."
report
Use our free recommendation engine to learn which Identity Management (IM) solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Security Firm
21%
Financial Services Firm
13%
Retailer
7%
Insurance Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business9
Midsize Enterprise1
Large Enterprise3
No data available
 

Questions from the Community

What needs improvement with AWS Identity and Access Management?
In AWS Identity and Access Management solutions, CloudFormation tools are used to create templates. Having predefined templates available from the AWS team would be beneficial. Currently, security ...
What is your primary use case for AWS Identity and Access Management?
When attempting to access Windows UNC paths from MoveIt, it will request user ID and access. For instance, if ITS-MoveIt is the local user utilized during installation, that particular user should ...
What advice do you have for others considering AWS Identity and Access Management?
The AWS Identity and Access Management Access Analyzer is not utilized in our implementation. The policy simulator feature is also not being used. Information about the pricing aspect of AWS Identi...
What is your experience regarding pricing and costs for Zilla Security?
It has been fair because we have been in from the beginning or close to the beginning. I know it is not truly an identity access management system yet, but its price was one of the appealing factor...
What needs improvement with Zilla Security?
There is still no automated way to de-provision access due to a review completion, but they are getting there in terms of making it unified. Right now it is just a one-way integration, importing us...
What is your primary use case for Zilla Security?
We use the tool for access reviews. It is mainly for our regulatory SOX compliance. That was the main use case, and why we purchased Zilla back at the end of 2021.
 

Also Known As

No data available
Zilla Security
 

Overview

 

Sample Customers

1. Amazon.com2. Adobe3. Accenture4. AT&T5. Bank of America6. Cisco Systems7. Coca-Cola8. Dell Technologies9. Equinix10. GE Healthcare11. Google12. Hewlett Packard Enterprise13. IBM14. Intel15. JPMorgan Chase16. Kroger17. LinkedIn18. Lockheed Martin19. Mastercard20. Microsoft21. Netflix22. Nike23. Oracle24. PayPal25. PwC26. SAP27. Siemens28. Spotify29. Tesla30. Toyota31. Visa32. Walmart33. World Bank
Information Not Available
Find out what your peers are saying about AWS Identity and Access Management vs. CyberArk IGA Powered by Zilla and other solutions. Updated: December 2025.
881,082 professionals have used our research since 2012.