No more typing reviews! Try our Samantha, our new voice AI agent.

CyberArk IGA Powered by Zilla vs OpenIAM Identity Governance comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Apr 5, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk IGA Powered by Zilla
Ranking in Identity Management (IM)
11th
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
9
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (12th), Identity Governance Administration (IGA) (5th)
OpenIAM Identity Governance
Ranking in Identity Management (IM)
27th
Average Rating
8.0
Reviews Sentiment
7.3
Number of Reviews
1
Ranking in other categories
User Provisioning Software (12th)
 

Mindshare comparison

As of May 2026, in the Identity Management (IM) category, the mindshare of CyberArk IGA Powered by Zilla is 2.0%, up from 1.5% compared to the previous year. The mindshare of OpenIAM Identity Governance is 1.5%, up from 1.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity Management (IM) Mindshare Distribution
ProductMindshare (%)
CyberArk IGA Powered by Zilla2.0%
OpenIAM Identity Governance1.5%
Other96.5%
Identity Management (IM)
 

Featured Reviews

Pavan Ingaleshwar - PeerSpot reviewer
Soc Analyst at ISECURION
Centralized access visibility has improved investigations but the interface still needs simplification
In my experience, the best feature of CyberArk IGA Powered by Zilla is its ability to provide clear visibility into user access and permissions, which helps me quickly identify over-privileged access permissions and suspicious accounts. This platform helps me check user access history, permission details, and role assignments easily. During investigations, it confirms whether user access is legitimate or not, providing clear visibility into permissions, which is what I really appreciate about this tool. Other key features of CyberArk IGA Powered by Zilla include a centralized view of user access, access certifications, review detections of over-privileged accounts, identifying risks, and visibility. Additionally, it assists with login alerts for privilege misuse and suspicious activity. CyberArk IGA Powered by Zilla has positively impacted my organization by improving visibility into user access and reducing the risk of over-privileged accounts, which can affect costs for us and our clients. It has also supported faster investigations, allowing for better control over user permissions, thus impacting my organization positively.
SM
Lead Consultant at a security firm with 51-200 employees
Manages user identities and application access in a centralized way from a single console/portal
OpenIAM provides an Identity and Access Management platform which includes identity and access management (i.e., SSO, Multi-factor Authentication, password synchronization, and RBAC). Below are the features : Lower Cost of Implementation & Total Cost of Ownership: * OpenIAM uses tools, such as Groovy script to implement business rules, Grails to create new UI functionality, Activiti for workflow, PowerShell, etc. It also support web services. So it is important to find skilled technical resources readily and at reasonable cost in comparison to the large vendors, which use proprietary tools for developing custom connector or product customization as per business requirement. * OpenIAM is also based on Open Source technologies (i.e., JBoss, Apache, MySQL, CentOS), so Total Cost of Ownership is very low in comparison to other IAM products. * Compliance with standards simplifies integration. * Subscription-based license model. Ease of Use: OpenIAM offers a single unified Admin console and a single unified self-service portal for customers to use and manage the IAM suite (i.e. Identity Management, Access Management, and Multi-Factor Authentication). Modern Architecture: * Built from the ground up, not through acquisitions and proprietary technology. * SOA architecture * Cloud-enabled Enterprise Grade Product: Even though OpenIAM is based on Open Source technologies, it is: * Built on industry standards * Simplified integration * Uses established industry frameworks

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"CyberArk IGA Powered by Zilla's access reviews, audit report generation, and compliance features are excellent."
"After implementing CyberArk IGA Powered by Zilla, it puts the organization at a very high security level by reducing risk and threats to platforms."
"Using CyberArk IGA Powered by Zilla reduces my investigation time by around thirty to forty percent, especially when verifying user privileges or checking access history."
"CyberArk IGA Powered by Zilla is a very stable product, and I do not see a lot of issues with it most of the time."
"It helps users work from anywhere, regardless of their location or country. Users do not need to be in their office geo-location to access applications or resources, which provides flexibility for accessing applications wherever they are."
"The features of CyberArk IGA Powered by Zilla that I have found the most valuable include credential masking, time-bound access, and using it for the approval of workflows and audit trails for compliance-related tasks."
"When we implemented CyberArk IGA Powered by Zilla, we definitely achieved a lot in terms of security, mitigating business risk across all assets, saving time, and reducing the risk of account compromise and access compromise."
"We had these spreadsheets all over the place, but now we have a library of evidence to consult when needed. Zilla keeps everything in one place. It's not scattered all over anymore."
"Customer support is very good and available in almost all time zones."
 

Cons

"For improvement, I would suggest enhancing the reporting functionality of CyberArk IGA Powered by Zilla, as it could benefit from more customization or advanced filtering for auditing purposes."
"There is still no automated way to de-provision access as a result of a review, but they are getting there in terms of making it unified. They are getting closer to that."
"Maybe this is coming with their AI module, but I would like to see a feature that performs baseline analysis of permissions that may not fit into a role, and it attempts to group them into a role. We've run into problems with applications where someone has not created a role but assigned ad hoc permissions to a user. We still need to do some manual work to identify the group that the user belongs to. It would be amazing to have Zilla streamline that."
"CyberArk IGA Powered by Zilla is a good solution overall, but it could improve the user interface to be more accessible for non-technical users."
"The first thing that can be improved is the central admin console."
"I believe CyberArk IGA Powered by Zilla can be improved by simplifying the workflow and the UI for managing access requests and approvals."
"The primary issue I have experienced with CyberArk IGA Powered by Zilla is related to support."
"Improvement suggestions for CyberArk include addressing the on-premises deployment processes, which require a very skilled engineer to handle because of the complexity of the environments involved."
"OpenIAM should improve the product/API documentation on portal which gives more flexibility to developers for product customization and connector development."
 

Pricing and Cost Advice

"It has been fair because we have been in from the beginning or close to the beginning. I know it is not truly an identity access management system yet, but its price was one of the appealing factors for us to purchase it at the time. It was reasonably priced."
Information not available
report
Use our free recommendation engine to learn which Identity Management (IM) solutions are best for your needs.
892,776 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Security Firm
19%
Financial Services Firm
14%
Retailer
6%
Insurance Company
5%
University
15%
Construction Company
11%
Outsourcing Company
9%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business3
Midsize Enterprise1
Large Enterprise4
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for Zilla Security?
I am not familiar with the pricing and licensing costs, but the setup of CyberArk IGA Powered by Zilla was straightforward since it was cloud-based compared to the previous on-premises tool, SailPo...
What needs improvement with Zilla Security?
For improvement, I would suggest enhancing the reporting functionality of CyberArk IGA Powered by Zilla, as it could benefit from more customization or advanced filtering for auditing purposes. I h...
What is your primary use case for Zilla Security?
CyberArk IGA Powered by Zilla serves as our main tool for access review, certification, and governance of non-human accounts. We handle non-human accounts, which refers to all the RPA bots that use...
Ask a question
Earn 20 points
 

Also Known As

Zilla Security
OpenIAM, OpenIAM IGA
 

Overview

 

Sample Customers

Information Not Available
Citicorp, Deutsche Bank, Morgan Stanley, Marsh and McLennan, SBC Warburg, GE Electric Insurance, Tata Communications, NettBuss, AMSCAN, Time Warner, MultiPlan, Stater Bros., County of Orange - California, TUI Hotels, NV Energy, EMCOR Group, Previred
Find out what your peers are saying about One Identity, Microsoft, SailPoint and others in Identity Management (IM). Updated: April 2026.
892,776 professionals have used our research since 2012.