Try our new research platform with insights from 80,000+ expert users

AWS Identity and Access Management vs CyberArk IGA Powered by Zilla comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 4, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

AWS Identity and Access Man...
Ranking in Identity Management (IM)
8th
Average Rating
9.0
Reviews Sentiment
6.7
Number of Reviews
12
Ranking in other categories
Cloud Resource Access Management (2nd)
CyberArk IGA Powered by Zilla
Ranking in Identity Management (IM)
16th
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
5
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (18th), Identity Governance Administration (IGA) (6th)
 

Mindshare comparison

As of March 2026, in the Identity Management (IM) category, the mindshare of AWS Identity and Access Management is 0.8%, up from 0.2% compared to the previous year. The mindshare of CyberArk IGA Powered by Zilla is 2.3%, up from 1.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity Management (IM) Mindshare Distribution
ProductMindshare (%)
AWS Identity and Access Management0.8%
CyberArk IGA Powered by Zilla2.3%
Other96.9%
Identity Management (IM)
 

Featured Reviews

SumitMundik - PeerSpot reviewer
Lead Admin Systems at a financial services firm with 10,001+ employees
IAM improves cloud security management with hybrid network capabilities and global role access
In AWS Identity and Access Management solutions, CloudFormation tools are used to create templates. Having predefined templates available from the AWS team would be beneficial. Currently, security teams work on policies and scripts for creating generic AWS Identity and Access Management roles. If AWS could provide an option to automatically create templates based on desired access requirements, it would be extremely beneficial, especially for documentation and troubleshooting purposes. Storage gateway creation has limitations, allowing maximum of 50 SMB file shares per gateway. While it is costly to access S3 buckets via AWS Identity and Access Management role through storage gateway, companies invest in this for enhanced data security, particularly in financial sectors where data integrity is crucial. There is an ongoing issue where files are sometimes sent twice to S3 buckets, despite MoveIt logs showing single transmission. As a workaround, Lambda functions are implemented with a five-minute delay before processing files to downstream applications.
EA
Data Engineer at Baker Hughes
Automated access reviews have reduced hidden bot risks and create audit evidence seamlessly
CyberArk IGA Powered by Zilla's access reviews, audit report generation, and compliance features are excellent. It creates audit and compliance evidence easily, which previously required substantial manual effort, but now the process has become very straightforward. The best feature is definitely the AI component, which includes evidence generation for audit and compliance, addressing one of our biggest challenges. We are able to easily gather all the details required by the audit team, and that is one of the best aspects. Additionally, being cloud-based means it is very easy to scale up without much downtime compared to our previous on-premises solution. CyberArk IGA Powered by Zilla has positively impacted our organization by significantly reducing manual effort. We previously had many unnoticed non-human accounts that we could not deactivate due to their large number, but now that timeframe has drastically decreased, which is one of the greatest advantages. The AI-driven access reviews and automatic generation of compliance and audit documents are among the best features.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It also provides MFA, which adds an additional layer of security."
"AWS IAM is useful since it restricts unauthorized use of the AWS console."
"AWS Identity and Access Management allows for creating, modifying, and deleting users or integrating with directories."
"AWS IAM is beneficial as it provides standard access and identity management policies and roles for monitoring and logging."
"The ease of control and the ability to manage group policies and individual policies are valuable features."
"AWS Identity and Access Management has an intuitive user interface that is simple to use."
"From my experience, AWS Identity and Access Management is a strong solution."
"Constructing permissions is easy and very robust; you have a lot of flexibility with IAM permissions, how you can define them, using wildcards, and you can have explicit deny, explicit allow, and different conditions that certain conditions have to be met that this IAM policy will be executed or respected."
"CyberArk IGA Powered by Zilla's access reviews, audit report generation, and compliance features are excellent."
"I enjoy the ease of setup and creation of a review. Being a user of the tool or kind of an admin of the tool, the ease of setup of an access review is valuable."
"We had these spreadsheets all over the place, but now we have a library of evidence to consult when needed. Zilla keeps everything in one place. It's not scattered all over anymore."
"CyberArk IGA Powered by Zilla is a very stable product, and I do not see a lot of issues with it most of the time."
"It helps users work from anywhere, regardless of their location or country. Users do not need to be in their office geo-location to access applications or resources, which provides flexibility for accessing applications wherever they are."
 

Cons

"AWS Identity and Access Management has an intuitive user interface that is simple to use."
"It is sometimes not always clear how to work with it, so this is not necessarily what I appreciate about it, but I think it is a matter of experience because when you have experience, it is quite intuitive."
"I would like to see scalability improvements in AWS Identity and Access Management, such as better integration with existing systems and applications."
"I would like to see scalability improvements in AWS Identity and Access Management, such as better integration with existing systems and applications."
"AWS IAM could be improved by providing a graphical user interface which would simplify permissions management, making it easier for beginners to quickly understand and manage permissions."
"There is an ongoing issue where files are sometimes sent twice to S3 buckets, despite MoveIt logs showing single transmission."
"The user activity tracking in AWS Identity and Access Management should be enhanced to provide detailed descriptions of user activities."
"Currently, AWS Identity and Access Management needs improvement in the prevention of unauthorized access to sensitive data and models."
"For improvement, I would suggest enhancing the reporting functionality of CyberArk IGA Powered by Zilla, as it could benefit from more customization or advanced filtering for auditing purposes."
"The primary issue I have experienced with CyberArk IGA Powered by Zilla is related to support."
"CyberArk IGA Powered by Zilla is lacking in the governance side of identities compared to competitors."
"There is still no automated way to de-provision access as a result of a review, but they are getting there in terms of making it unified. They are getting closer to that."
"Maybe this is coming with their AI module, but I would like to see a feature that performs baseline analysis of permissions that may not fit into a role, and it attempts to group them into a role. We've run into problems with applications where someone has not created a role but assigned ad hoc permissions to a user. We still need to do some manual work to identify the group that the user belongs to. It would be amazing to have Zilla streamline that."
 

Pricing and Cost Advice

Information not available
"It has been fair because we have been in from the beginning or close to the beginning. I know it is not truly an identity access management system yet, but its price was one of the appealing factors for us to purchase it at the time. It was reasonably priced."
report
Use our free recommendation engine to learn which Identity Management (IM) solutions are best for your needs.
884,976 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
25%
Financial Services Firm
14%
Manufacturing Company
11%
Construction Company
7%
Security Firm
20%
Financial Services Firm
13%
Retailer
7%
Insurance Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business9
Midsize Enterprise1
Large Enterprise3
No data available
 

Questions from the Community

What needs improvement with AWS Identity and Access Management?
In AWS Identity and Access Management solutions, CloudFormation tools are used to create templates. Having predefined templates available from the AWS team would be beneficial. Currently, security ...
What is your primary use case for AWS Identity and Access Management?
When attempting to access Windows UNC paths from MoveIt, it will request user ID and access. For instance, if ITS-MoveIt is the local user utilized during installation, that particular user should ...
What advice do you have for others considering AWS Identity and Access Management?
The AWS Identity and Access Management Access Analyzer is not utilized in our implementation. The policy simulator feature is also not being used. Information about the pricing aspect of AWS Identi...
What is your experience regarding pricing and costs for Zilla Security?
It has been fair because we have been in from the beginning or close to the beginning. I know it is not truly an identity access management system yet, but its price was one of the appealing factor...
What needs improvement with Zilla Security?
The challenges I face with the implementation of CyberArk IGA Powered by Zilla involve legacy applications and legacy systems, which sometimes present issues. Additionally, custom-built APIs that a...
What is your primary use case for Zilla Security?
The main use cases for CyberArk IGA Powered by Zilla include onboarding users when they are being recruited, as well as managing the moving and exiting processes. When a user like James moves from ...
 

Also Known As

No data available
Zilla Security
 

Overview

 

Sample Customers

1. Amazon.com2. Adobe3. Accenture4. AT&T5. Bank of America6. Cisco Systems7. Coca-Cola8. Dell Technologies9. Equinix10. GE Healthcare11. Google12. Hewlett Packard Enterprise13. IBM14. Intel15. JPMorgan Chase16. Kroger17. LinkedIn18. Lockheed Martin19. Mastercard20. Microsoft21. Netflix22. Nike23. Oracle24. PayPal25. PwC26. SAP27. Siemens28. Spotify29. Tesla30. Toyota31. Visa32. Walmart33. World Bank
Information Not Available
Find out what your peers are saying about AWS Identity and Access Management vs. CyberArk IGA Powered by Zilla and other solutions. Updated: March 2026.
884,976 professionals have used our research since 2012.