

Entrust Identity Enterprise and CyberArk IGA Powered by Zilla are identity management solutions competing in the enterprise sector. Entrust stands out with pricing flexibility and robust support, whereas CyberArk offers advanced functionalities and a comprehensive feature set.
Features: Entrust Identity Enterprise provides strong authentication, authorization services, and excellent support for various deployment environments. CyberArk IGA Powered by Zilla offers advanced identity governance, comprehensive audit features, and policy automation, which is ideal for complex environments requiring detailed access controls.
Room for Improvement: Entrust could improve by expanding its advanced features and providing more extensive customization options. Enhancements in audit capabilities and automation would benefit its offering. CyberArk could improve in terms of pricing and initial deployment complexity. Making its user interface more intuitive and reducing the steep learning curve would enhance its user experience.
Ease of Deployment and Customer Service: Entrust Identity Enterprise is noted for its straightforward deployment and responsive customer service, making it accessible for businesses. CyberArk IGA Powered by Zilla offers specialized support but presents a more intricate deployment model tailored for large, distributed enterprises, requiring deeper understanding and customization.
Pricing and ROI: Entrust Identity Enterprise offers more affordable setup costs with faster ROI, ideal for budget-conscious businesses. In contrast, CyberArk IGA Powered by Zilla involves higher upfront costs but promises substantial ROI through advanced governance features, better suited for organizations prioritizing long-term strategic value.
| Product | Mindshare (%) |
|---|---|
| CyberArk IGA Powered by Zilla | 1.5% |
| Entrust Identity Enterprise | 1.2% |
| Other | 97.3% |


| Company Size | Count |
|---|---|
| Small Business | 3 |
| Midsize Enterprise | 1 |
| Large Enterprise | 7 |
| Company Size | Count |
|---|---|
| Small Business | 5 |
| Midsize Enterprise | 1 |
| Large Enterprise | 2 |
CyberArk IGA Powered by Zilla is designed to streamline identity governance and administration by automating access controls and compliance processes, enhancing security and efficiency.
Known for its robust capabilities, CyberArk IGA Powered by Zilla offers comprehensive identity governance that simplifies policy enforcement and compliance management. It enables organizations to efficiently manage user access, reducing risks and ensuring secure operations. By leveraging automation, it minimizes manual tasks and enhances productivity.
What are the key features?
Which benefits or ROI should users consider?
CyberArk IGA Powered by Zilla is implemented across industries such as finance and healthcare, where regulatory compliance and data protection are critical. It helps organizations enhance their security postures while ensuring compliance with industry standards.
Entrust Identity Enterprise is recognized for its ease of use, reliability, and advanced authentication options, aligning with CISA zero trust guidelines and offering strong support for both mobile and desktop environments.
Entrust Identity Enterprise provides a comprehensive identity management system, facilitating seamless authentication across banking, government, and enterprise industries. The platform offers robust security with its risk engine and extensive API support, ensuring smooth version transitions. While its cloud version boasts intuitive usability and prompt updates, the on-premises version requires enhancements for feature parity and pricing adjustments. Integration challenges with platforms like Azure, AWS, and GCP are noted, particularly with virtual machine desktop setups.
What are the key features of Entrust Identity Enterprise?Entrust Identity Enterprise is widely implemented in the banking, government, and large enterprise sectors. Organizations leverage it for secure access to online banking, cloud portals, and VPNs using multifactor authentication methods. It monitors external user access and mitigates threats from compromised credentials, supporting both internal and external customer authentication.
We monitor all Identity and Access Management as a Service (IDaaS) (IAMaaS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.