No more typing reviews! Try our Samantha, our new voice AI agent.

CyberArk IGA Powered by Zilla vs CyberArk Identity comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Apr 5, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
5.0
Many users find CyberArk Identity valuable for saving time, enhancing security, fostering efficiency, and yielding beneficial returns.
Sentiment score
5.2
CyberArk IGA with Zilla boosts efficiency, enhances security, reduces manual checks by 40%, and potentially saves $75,000.
I have seen over 30% return on investment due to the improvement in operational efficiencies through automation, which enhances productivity.
Private Wealth Advisor at Arima Fund Limited
Any deployment takes time to mature, and CyberArk IGA Powered by Zilla does provide benefits immediately in terms of quick adoption of finding out the privileged access identities by running through their crawler.
Associate Director at a legal firm with 10,001+ employees
I heard from the automation CoE team that we were able to save approximately $75,000 from that specific area.
Data Engineer at Baker Hughes
CyberArk IGA Powered by Zilla has helped me a lot and constitutes a return on investment as well.
Security Engineer at GlobeSecure Technologies Pvt Ltd
 

Customer Service

Sentiment score
6.4
CyberArk Identity's customer service is generally effective but faces criticism for response delays and expertise inconsistencies.
Sentiment score
7.4
CyberArk IGA's customer service is praised for promptness and resources, with varying response times based on contract agreements.
They resolved the problem immediately after I reported it, on the same day, within one hour.
Access Management Analyst at Telefónica
They respond immediately when requests are raised, and they are always available for priority one tickets.
Lead Identity Engineer at a tech vendor with 501-1,000 employees
I received prompt responses and support, which I would rate as very good.
Cybersecurity Delivery Analyst at Accenture
The type of support agreement or contract you have with them determines the level of support provided.
Associate Director at a legal firm with 10,001+ employees
When I send a request, they respond, but getting an actual time slot to work with the customer to resolve the issue sometimes delays.
Presales Engineer at DGIT
As soon as we create a ticket, they reach out quickly and provide immediate solutions.
Data Engineer at Baker Hughes
 

Scalability Issues

Sentiment score
7.4
CyberArk Identity is praised for its scalability, accommodating diverse company sizes and ease of license expansion.
Sentiment score
7.3
CyberArk IGA by Zilla scales for hybrid environments, needs skilled setup for optimal AI-driven governance, and supports varied applications.
We can use it on different phones and computers, demonstrating its scalability.
Program associate at IMAGINE HER
When delving deep into the concepts, there is a lot to address and learn, especially when facing real-time scenarios.
Cybersecurity Delivery Analyst at Accenture
You can scale it out pretty easily, and you can implement it very small.
Cloud Specialist at Perini Beheer
For larger environments using CyberArk IGA Powered by Zilla, scalability depends on the integration environment being implemented and the skill set behind it.
Head Of IT at NetPulse Limited
It is quite scalable, and we can definitely scale up or scale down.
Cyber Security Senior Specialist at a tech vendor with 10,001+ employees
CyberArk IGA Powered by Zilla works well for scalability as it supports distributed environments and integrates with cloud platforms, making it useful for hybrid and cloud setups.
CTO at fraoula
 

Stability Issues

Sentiment score
8.0
CyberArk Identity is highly praised for its reliable stability, quick issue resolution, and effective performance, despite network connectivity challenges.
Sentiment score
8.4
CyberArk IGA Powered by Zilla is stable, efficient, with minimal issues and proactive communication, maintaining high user satisfaction.
We no longer have our data infiltrated by unauthorized persons, and tracking actions within the system has become very easy.
Private Wealth Advisor at Arima Fund Limited
When you have it in the cloud, you have CyberArk every time you need it.
Access Management Analyst at Telefónica
With a stable network, due to the redundant data centers across the globe, it is a lot easier to use as a SaaS solution.
Senior Cyber Security Specialist Architect at a outsourcing company with 11-50 employees
As long as you are maintaining the patches and upgrades in time, the vault, which is the main central component, is very good.
Associate Director at a legal firm with 10,001+ employees
CyberArk IGA Powered by Zilla is quite stable, with no experience of data breaches or leakage.
CTO at fraoula
 

Room For Improvement

CyberArk Identity requires user interface improvements, better integration, enhanced documentation, and easier deployment for improved adoption and operations.
CyberArk IGA requires UI improvements, enhanced integration, and workflow efficiency to better serve non-technical users and streamline processes.
It would be helpful if they released a generalized document for processes such as migration.
Cybersecurity Delivery Analyst at Accenture
Integration or deployment is extremely difficult for CyberArk Identity.
Head of IT at Skutin Solutions
There's a need to enhance network performance.
Senior Technology Manager at a outsourcing company with 501-1,000 employees
Integrating CyberArk IGA Powered by Zilla with banking applications such as T24 is very tough to accomplish.
Presales Engineer at DGIT
I would suggest enhancing the reporting functionality of CyberArk IGA Powered by Zilla, as it could benefit from more customization or advanced filtering for auditing purposes.
Data Engineer at Baker Hughes
It is lacking a bit in governance science for the identities compared to competitors, so more risk management and governance policies would be beneficial.
Cyber Security Senior Specialist at a tech vendor with 10,001+ employees
 

Setup Cost

CyberArk Identity pricing is high but justified for enterprises with discounts and flexible licensing to balance costs.
CyberArk IGA is seen as reasonably priced, offering cost savings and flexibility compared to traditional on-premises tools.
Regarding pricing, it can be quite a lot for small companies.
Access Management Analyst at Telefónica
The pricing is acceptable.
Program associate at IMAGINE HER
If I am not going fully cloud, there are additional resources I will need to purchase, such as spinning more VMs or acquiring an HSM device to encrypt the vault.
Head of IT at Skutin Solutions
My experience with the licensing cost shows that CyberArk is never reasonable on pricing.
Head Of IT at NetPulse Limited
Opting for multi-year subscriptions can be more economical.
CTO at fraoula
I am not familiar with the pricing and licensing costs, but the setup of CyberArk IGA Powered by Zilla was straightforward since it was cloud-based compared to the previous on-premises tool, SailPoint.
Data Engineer at Baker Hughes
 

Valuable Features

CyberArk Identity enhances security and efficiency through integrations, password management, user monitoring, and comprehensive compliance and risk analysis tools.
CyberArk IGA by Zilla boosts security with identity management, credential protection, and AI-driven compliance, simplifying auditing and access control.
It impacts zero trust security strategies. It prevents lateral movements in the organization.
Head of IT at Skutin Solutions
The two-factor authentication is very important, but the fact that every account is being regenerated every time we use it is the most important security feature for us.
Cloud Specialist at Perini Beheer
It is the most powerful access management system.
Access Management Analyst at Telefónica
The best feature is definitely the AI component, which includes evidence generation for audit and compliance, addressing one of our biggest challenges.
Data Engineer at Baker Hughes
The functionalities of CyberArk PAM include monitoring of activities, which are recorded live for auditing purposes, and it integrates into almost every environment seamlessly.
Head Of IT at NetPulse Limited
We definitely achieved a lot in terms of security, mitigating business risk across all assets, saving time, and reducing the risk of account compromise and access compromise.
Cyber Security Senior Specialist at a tech vendor with 10,001+ employees
 

Categories and Ranking

CyberArk Identity
Ranking in Identity Management (IM)
8th
Average Rating
8.2
Reviews Sentiment
6.7
Number of Reviews
29
Ranking in other categories
Authentication Systems (9th), Authorization Software (3rd), Enterprise Password Managers (9th), User Entity Behavior Analytics (UEBA) (9th), Access Management (7th), Active Directory Management (6th), Cloud Resource Access Management (3rd), Customer Identity and Access Management (CIAM) (7th)
CyberArk IGA Powered by Zilla
Ranking in Identity Management (IM)
11th
Average Rating
8.6
Reviews Sentiment
7.1
Number of Reviews
10
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (12th), Identity Governance Administration (IGA) (5th)
 

Mindshare comparison

As of May 2026, in the Identity Management (IM) category, the mindshare of CyberArk Identity is 2.2%, down from 2.6% compared to the previous year. The mindshare of CyberArk IGA Powered by Zilla is 2.0%, up from 1.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity Management (IM) Mindshare Distribution
ProductMindshare (%)
CyberArk Identity2.2%
CyberArk IGA Powered by Zilla2.0%
Other95.8%
Identity Management (IM)
 

Featured Reviews

Hariharan Thangasamy - PeerSpot reviewer
Cybersecurity Delivery Analyst at Accenture
Has strengthened privileged access control and improved audit visibility through session monitoring and password rotation
On the identity product side, it is awesome. However, they can improve in the documentation parts. For example, if there is a migration process, I can see the maximum customers are moving from self-hosted to on-premises or from on-premises to the cloud. It would be helpful if they released a generalized document for processes such as migration. A clear overview document would assist us in understanding more about the tool, configurations, and automations to enhance our security. Regarding the initial setup of CyberArk Identity, I faced some challenges. At some points, I could not find proper documentation for deploying, enhancing, or integrating with other components. I could not find the proper documentation in the community portal.
AmitRathod - PeerSpot reviewer
Senior Analyst at Toll Holdings Limited
Automation has transformed access reviews and governance across human and non-human identities
The UI of CyberArk IGA Powered by Zilla is good, but there is room for improvement in the transition from legacy systems. Organizations with highly customized, long-standing legacy IGA tools may face a steep learning curve and complex data migration when moving to this modern AI-driven or cloud-native solution. Another limitation involves integration gaps. While CyberArk IGA Powered by Zilla boasts extensive pre-built connectors, any application not covered requires manual configuration or the deployment of Zilla Universal Sync, which may increase implementation time and could be less effective for legacy applications. However, it can be quite useful for SaaS-based applications, so improvement in customization or configuration for legacy applications is needed. There is a considerable dependency on data quality. The effectiveness of AI-driven insights, such as entitlement recommendations for approve, deny, or do nothing actions, is entirely reliant on the quality and accuracy of the data ingested from connected applications. This means data quality should not just depend on application integration but also overall user insights regarding usage, such as login activity or MFA utilization.
report
Use our free recommendation engine to learn which Identity Management (IM) solutions are best for your needs.
893,311 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Manufacturing Company
10%
Computer Software Company
8%
Construction Company
6%
Security Firm
19%
Financial Services Firm
14%
Retailer
6%
Insurance Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business20
Midsize Enterprise4
Large Enterprise10
By reviewers
Company SizeCount
Small Business3
Midsize Enterprise1
Large Enterprise7
 

Questions from the Community

What is your experience regarding pricing and costs for CyberArk Identity?
I am not certain about CyberArk Identity's exact pricing model. For comparison, Okta was around five dollars per user. CyberArk Identity offers good discounts to some clients, which influences thei...
What needs improvement with CyberArk Identity?
We do not specifically use the password vaulting feature of CyberArk Identity. The centralized user dashboard of CyberArk Identity has not been that important for us. If it would be possible to sha...
What is your primary use case for CyberArk Identity?
It's not being purchased through AWS, but we're using CyberArk Identity as a SaaS solution. I think it's running on AWS, but we bought it directly from CyberArk.
What is your experience regarding pricing and costs for Zilla Security?
I am not familiar with the pricing and licensing costs, but the setup of CyberArk IGA Powered by Zilla was straightforward since it was cloud-based compared to the previous on-premises tool, SailPo...
What needs improvement with Zilla Security?
For improvement, I would suggest enhancing the reporting functionality of CyberArk IGA Powered by Zilla, as it could benefit from more customization or advanced filtering for auditing purposes. I h...
What is your primary use case for Zilla Security?
CyberArk IGA Powered by Zilla serves as our main tool for access review, certification, and governance of non-human accounts. We handle non-human accounts, which refers to all the RPA bots that use...
 

Also Known As

Idaptive
Zilla Security
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Information Not Available
Find out what your peers are saying about CyberArk IGA Powered by Zilla vs. CyberArk Identity and other solutions. Updated: April 2026.
893,311 professionals have used our research since 2012.