Try our new research platform with insights from 80,000+ expert users

CyberArk IGA Powered by Zilla vs EVOLVEUM midPoint comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 4, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk IGA Powered by Zilla
Ranking in Identity Management (IM)
16th
Average Rating
8.6
Reviews Sentiment
7.3
Number of Reviews
3
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (17th)
EVOLVEUM midPoint
Ranking in Identity Management (IM)
14th
Average Rating
8.0
Reviews Sentiment
7.4
Number of Reviews
3
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of January 2026, in the Identity Management (IM) category, the mindshare of CyberArk IGA Powered by Zilla is 1.8%, up from 0.7% compared to the previous year. The mindshare of EVOLVEUM midPoint is 2.2%, down from 2.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity Management (IM) Market Share Distribution
ProductMarket Share (%)
EVOLVEUM midPoint2.2%
CyberArk IGA Powered by Zilla1.8%
Other96.0%
Identity Management (IM)
 

Featured Reviews

reviewer2795934 - PeerSpot reviewer
Associate Director at a legal firm with 10,001+ employees
Identity governance has strengthened privileged access controls and supports ongoing compliance
Customization involves making changes to fit customer requirements. Maintenance usually involves sometimes having issues with different connectors, mostly the Active Directory and LDAP connectors. Periodic aggregation of accounts and applications sometimes go through issues with firewalls. Sometimes they do not work, and you need to make sure your connectors are all in sync, especially your LDAP and AD connectors. Sometimes there could be some issues occurring between these two connectors, so there will be maintenance on that side, making sure they are working on a regular basis based on your monitoring plan. Taking backups regularly and periodic backups are essential. Both the support rating and the overall product rating for CyberArk IGA Powered by Zilla is eight out of ten. Eight means they have complete processes in place to help support, they have resources available, and there is a method to contact them and get response quickly. In that regard, eight is appropriate because they reuse some of their main PAM components which is very good, and compared to other products which I ranked around nine, they should be at eight.
Ondrej Balun - PeerSpot reviewer
IAM Expert Group Lead at Ventum
An open-source solution that helps in IAM
Our customers leverage the product as a central component in their identity field management. The process involves connecting it to target systems through connectors. It also helps us in role-based access control implementation. Users are granted access based on predefined roles associated with their positions, organizational hierarchy, or job titles. Instead of direct assignments, users automatically receive roles upon entering the company, aligning with their assignments. The core feature of EVOLVEUM midPoint that I find most valuable is provisioning. Users, including myself, can submit requests that need designated individuals' approval. Additionally, the recertification feature is crucial for regularly reviewing and confirming the appropriateness of user access rights. I find recertifications valuable because they align with clear regulatory requirements for companies to perform them at least once yearly. Using the product, I can initiate a recertification campaign by selecting users and the applications to be recertified. I define the individuals responsible for approving or rejecting access. The goal is to ensure compliance with regulatory standards. The tool's flexibility in handling identity types and tickets has brought notable benefits. It provides full flexibility to extend attributes or the schema for users and organizations. Its audit and reporting capabilities have significantly enhanced our customer's compliance and security posture. Management's regular need for reports, such as the number of users in the application and identifying users with critical access, is addressed. The solution allows easy configuration of reports directly from the front end. Additionally, the ability to schedule and automate report execution, followed by automatic distribution to support or responsible personnel, streamlines the process.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I enjoy the ease of setup and creation of a review. Being a user of the tool or kind of an admin of the tool, the ease of setup of an access review is valuable."
"We had these spreadsheets all over the place, but now we have a library of evidence to consult when needed. Zilla keeps everything in one place. It's not scattered all over anymore."
"CyberArk IGA Powered by Zilla is a very stable product, and I do not see a lot of issues with it most of the time."
"Our customers leverage the product as a central component in their identity field management. The process involves connecting it to target systems through connectors. It also helps us in role-based access control implementation."
"The basic setup is straightforward and takes minutes to complete."
"I like that it's open-source, and it's working. It has nice features, and it looks like it's easy to maintain."
 

Cons

"There is still no automated way to de-provision access as a result of a review, but they are getting there in terms of making it unified. They are getting closer to that."
"Maybe this is coming with their AI module, but I would like to see a feature that performs baseline analysis of permissions that may not fit into a role, and it attempts to group them into a role. We've run into problems with applications where someone has not created a role but assigned ad hoc permissions to a user. We still need to do some manual work to identify the group that the user belongs to. It would be amazing to have Zilla streamline that."
"CyberArk IGA Powered by Zilla is lacking in the governance side of identities compared to competitors."
"I think that the product is missing some of the identity governance functions—for example, the legal stuff and GDPR, and so on. But I think they are currently working on it."
"One area where I see room for improvement in EVOLVEUM midPoint is enhancing the user interface for configuration. Currently, a significant portion of the configuration involves technical, XML-based settings requiring a higher level of technical expertise."
"The support isn't ideal - because the product is open-source, it relies on your own ability to make it work unless you pay for support at a high hourly rate."
 

Pricing and Cost Advice

"It has been fair because we have been in from the beginning or close to the beginning. I know it is not truly an identity access management system yet, but its price was one of the appealing factors for us to purchase it at the time. It was reasonably priced."
"We're EVOLVEUM partners, and I tried it without a license."
"Licensing is defined by the number of users."
"The product is free to use, but a cost is associated if you opt for official product support. Additionally, there is an option for a platform subscription, which entails professional services provided by the vendor."
report
Use our free recommendation engine to learn which Identity Management (IM) solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Security Firm
21%
Financial Services Firm
13%
Retailer
7%
Insurance Company
6%
University
15%
Government
10%
Retailer
8%
Computer Software Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for Zilla Security?
It has been fair because we have been in from the beginning or close to the beginning. I know it is not truly an identity access management system yet, but its price was one of the appealing factor...
What needs improvement with Zilla Security?
There is still no automated way to de-provision access due to a review completion, but they are getting there in terms of making it unified. Right now it is just a one-way integration, importing us...
What is your primary use case for Zilla Security?
We use the tool for access reviews. It is mainly for our regulatory SOX compliance. That was the main use case, and why we purchased Zilla back at the end of 2021.
What do you like most about EVOLVEUM midPoint?
Our customers leverage the product as a central component in their identity field management. The process involves connecting it to target systems through connectors. It also helps us in role-based...
What is your experience regarding pricing and costs for EVOLVEUM midPoint?
The product is free to use, but a cost is associated if you opt for official product support. Additionally, there is an option for a platform subscription, which entails professional services provi...
What needs improvement with EVOLVEUM midPoint?
One area where I see room for improvement in EVOLVEUM midPoint is enhancing the user interface for configuration. Currently, a significant portion of the configuration involves technical, XML-based...
 

Also Known As

Zilla Security
No data available
 

Overview

 

Sample Customers

Information Not Available
European Commisson, University of Illinois, First United Bank & Trust, Deutsche Telekom, Vodafone, Avast
Find out what your peers are saying about CyberArk IGA Powered by Zilla vs. EVOLVEUM midPoint and other solutions. Updated: December 2025.
881,082 professionals have used our research since 2012.