Try our new research platform with insights from 80,000+ expert users

CyberArk IGA Powered by Zilla vs OpenText Identity Governance comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 4, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk IGA Powered by Zilla
Ranking in Identity Management (IM)
16th
Average Rating
8.6
Reviews Sentiment
7.3
Number of Reviews
3
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (17th)
OpenText Identity Governance
Ranking in Identity Management (IM)
28th
Average Rating
8.0
Reviews Sentiment
7.3
Number of Reviews
9
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of January 2026, in the Identity Management (IM) category, the mindshare of CyberArk IGA Powered by Zilla is 1.8%, up from 0.7% compared to the previous year. The mindshare of OpenText Identity Governance is 1.2%, up from 0.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity Management (IM) Market Share Distribution
ProductMarket Share (%)
CyberArk IGA Powered by Zilla1.8%
OpenText Identity Governance1.2%
Other97.0%
Identity Management (IM)
 

Featured Reviews

reviewer2795934 - PeerSpot reviewer
Associate Director at a legal firm with 10,001+ employees
Identity governance has strengthened privileged access controls and supports ongoing compliance
Customization involves making changes to fit customer requirements. Maintenance usually involves sometimes having issues with different connectors, mostly the Active Directory and LDAP connectors. Periodic aggregation of accounts and applications sometimes go through issues with firewalls. Sometimes they do not work, and you need to make sure your connectors are all in sync, especially your LDAP and AD connectors. Sometimes there could be some issues occurring between these two connectors, so there will be maintenance on that side, making sure they are working on a regular basis based on your monitoring plan. Taking backups regularly and periodic backups are essential. Both the support rating and the overall product rating for CyberArk IGA Powered by Zilla is eight out of ten. Eight means they have complete processes in place to help support, they have resources available, and there is a method to contact them and get response quickly. In that regard, eight is appropriate because they reuse some of their main PAM components which is very good, and compared to other products which I ranked around nine, they should be at eight.
GA
IAM Specialist at a tech services company with 11-50 employees
Helps to run reports and verify user access but improvement is needed in integration
You can run reports and verify the access each user has. There is a process that runs automatically for access review. It sends an email to the manager and provides a task for the manager to review the users and access. The manager can approve or reject, and then it goes to the application owner for further review. This feature is especially important in large customer environments, as manual review can be challenging. The product allows you to check if a user has two accesses that should not be granted simultaneously. There's an approval process for this scenario. Primarily, it provides information for governance data.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I enjoy the ease of setup and creation of a review. Being a user of the tool or kind of an admin of the tool, the ease of setup of an access review is valuable."
"We had these spreadsheets all over the place, but now we have a library of evidence to consult when needed. Zilla keeps everything in one place. It's not scattered all over anymore."
"CyberArk IGA Powered by Zilla is a very stable product, and I do not see a lot of issues with it most of the time."
"I really like the separation of the duties. It is the most ambitious model in the server because you have to create all the different rules, especially business rules. You have to check with the client and set different policies and rules, and then, you to have refine them. You will notice what is bad in the company and where the real problem is."
"When doing a review you can either make manual or automatic fulfillment to immediately apply the manager's decision to the system, like removing or adding new permissions to the user account."
"NetIQ Identity Governance has improved the security of my company."
"This solution has been around for a long time. It has had lots of successful deployments and releases."
"I like the queries and find the catalog to be comparatively powerful."
"All three functionalities, access certification, the configuration of duties, and role mining - especially role mining - are very advanced compared with the competition."
"We’re very satisfied with technical support. Usually we get people with the right knowledge who understand the solution very well."
"You can run reports and verify the access each user has. There is a process that runs automatically for access review. It sends an email to the manager and provides a task for the manager to review the users and access. The manager can approve or reject, and then it goes to the application owner for further review. This feature is especially important in large customer environments, as manual review can be challenging."
 

Cons

"CyberArk IGA Powered by Zilla is lacking in the governance side of identities compared to competitors."
"Maybe this is coming with their AI module, but I would like to see a feature that performs baseline analysis of permissions that may not fit into a role, and it attempts to group them into a role. We've run into problems with applications where someone has not created a role but assigned ad hoc permissions to a user. We still need to do some manual work to identify the group that the user belongs to. It would be amazing to have Zilla streamline that."
"There is still no automated way to de-provision access as a result of a review, but they are getting there in terms of making it unified. They are getting closer to that."
"With NetIQ, you have to install two or more products. It would be better if we could install one product and have one server and one dashboard."
"NetIQ Identity Governance is not flexible. Sometimes, filtering information to provide users with options, such as selecting the application to which they want to request access, can be challenging. It needs to improve application integration as well."
"The product could use more advanced features related to Identity Intelligence."
"We need more connectors to cloud applications like AWS."
"The solution should provide more connectors in future releases. The solution also should offer more monitoring."
"Technical support is horrible."
"They haven't really evolved the product to the cloud, so they don't have a cloud solution."
"The initial setup has room for improvement."
 

Pricing and Cost Advice

"It has been fair because we have been in from the beginning or close to the beginning. I know it is not truly an identity access management system yet, but its price was one of the appealing factors for us to purchase it at the time. It was reasonably priced."
"It's expensive relative to the cloud solutions that are out there."
"I give the cost a nine out of ten."
"In terms of pricing, the tool seems a bit cheaper compared to other SaaS solutions."
report
Use our free recommendation engine to learn which Identity Management (IM) solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Security Firm
21%
Financial Services Firm
13%
Retailer
7%
Insurance Company
6%
Comms Service Provider
16%
Real Estate/Law Firm
11%
Computer Software Company
9%
Educational Organization
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business9
 

Questions from the Community

What is your experience regarding pricing and costs for Zilla Security?
It has been fair because we have been in from the beginning or close to the beginning. I know it is not truly an identity access management system yet, but its price was one of the appealing factor...
What needs improvement with Zilla Security?
There is still no automated way to de-provision access due to a review completion, but they are getting there in terms of making it unified. Right now it is just a one-way integration, importing us...
What is your primary use case for Zilla Security?
We use the tool for access reviews. It is mainly for our regulatory SOX compliance. That was the main use case, and why we purchased Zilla back at the end of 2021.
What do you like most about NetIQ Identity Governance?
You can run reports and verify the access each user has. There is a process that runs automatically for access review. It sends an email to the manager and provides a task for the manager to review...
What needs improvement with NetIQ Identity Governance?
NetIQ Identity Governance is not flexible. Sometimes, filtering information to provide users with options, such as selecting the application to which they want to request access, can be challenging...
What advice do you have for others considering NetIQ Identity Governance?
The solution is worth using because of its flexibility, especially in integrating applications. However, the time required for integration varies based on the quality of documentation provided for ...
 

Also Known As

Zilla Security
NetIQ Access Governance Suite, Novell Access Governance Suite
 

Overview

 

Sample Customers

Information Not Available
Western & Southern Financial Group
Find out what your peers are saying about CyberArk IGA Powered by Zilla vs. OpenText Identity Governance and other solutions. Updated: December 2025.
881,082 professionals have used our research since 2012.