

Oracle Identity Governance and CyberArk IGA Powered by Zilla are competitors in the identity governance and administration category. CyberArk IGA appears to have an edge with its enhanced features, a point often considered worth its pricing.
Features:Oracle Identity Governance provides a comprehensive suite for lifecycle management and audit readiness, supporting seamless business operations. It offers broad integration capabilities, adding flexibility to various environments, and maintains a focus on audit compliance. CyberArk IGA features advanced identity analytics that deliver insights for proactive management. Its robust access request system supports efficient user provisioning, complemented by precise identity analytics to enhance security measures.
Ease of Deployment and Customer Service:Oracle Identity Governance's deployment process can be complex but is backed by strong support channels that aid in problem resolution. CyberArk’s deployment is streamlined, making it suitable for smaller teams, and offers personalized support to ensure effective use.
Pricing and ROI:Oracle offers competitive pricing and achieves a balanced ROI through its extensive capabilities, appealing to organizations prioritizing features with reasonable costs. CyberArk, despite higher initial costs, offers superior ROI attributed to its strong analytics and user-friendly functionalities, favoring enterprises that prioritize advanced features and operational efficiency.
| Product | Market Share (%) |
|---|---|
| CyberArk IGA Powered by Zilla | 1.8% |
| Oracle Identity Governance | 2.1% |
| Other | 96.1% |
| Company Size | Count |
|---|---|
| Small Business | 22 |
| Midsize Enterprise | 11 |
| Large Enterprise | 46 |
CyberArk IGA Powered by Zilla is designed to streamline identity governance and administration by automating access controls and compliance processes, enhancing security and efficiency.
Known for its robust capabilities, CyberArk IGA Powered by Zilla offers comprehensive identity governance that simplifies policy enforcement and compliance management. It enables organizations to efficiently manage user access, reducing risks and ensuring secure operations. By leveraging automation, it minimizes manual tasks and enhances productivity.
What are the key features?CyberArk IGA Powered by Zilla is implemented across industries such as finance and healthcare, where regulatory compliance and data protection are critical. It helps organizations enhance their security postures while ensuring compliance with industry standards.
Oracle Identity Governance (OIG) is a very versatile and robust enterprise identity management solution that offers functional and business performance competence by supplying centralized administration and total automation of identity and client provisioning events throughout the organization and user applications. Oracle Identity Governance monitors the complete identity and role process to satisfy rapidly changing business and complex compliance regulations and quickly delivers critical reporting and compliance capabilities.
Oracle Identity Governance is designed to easily identify which users have approved access to specific applications and other resources. It does this by using processes such as segregation of duties (SOD), role-based access control (RBAC), certifications, and access requests.
Oracle Identity Governance Features
Reviews from Real Users
“The one thing that stands out was the automatic sign-out when an employee goes on vacation. Identity Governance can monitor when an employee goes on vacation and returns. We use this feature to automatically disable all the employee's accounts when they go on vacation, and they're automatically enabled when they come back. We can also automatically delete the employee's accounts when they're dismissed. Oracle has a model that gives you precise reports. It's called Crystal, and it's similar to JasperReports, so we can derive reports from this database. “ - Fabio L., Partner at a tech services company.
“We are using Oracle Identity Manager for the management of the identity cycle. We have a human resources system as a source, and we have some custom-made applications as a destination of the changes in the identities. - A PeerSpot user who is a Project Manager at a government “
We monitor all Identity Management (IM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.