Try our new research platform with insights from 80,000+ expert users

CyberArk IGA Powered by Zilla vs SecureAuth Identity Platform comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 4, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk IGA Powered by Zilla
Ranking in Identity Management (IM)
16th
Average Rating
8.6
Reviews Sentiment
7.3
Number of Reviews
3
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (17th)
SecureAuth Identity Platform
Ranking in Identity Management (IM)
31st
Average Rating
5.6
Reviews Sentiment
5.6
Number of Reviews
2
Ranking in other categories
User Provisioning Software (17th), Access Management (21st), Customer Identity and Access Management (CIAM) (14th)
 

Mindshare comparison

As of January 2026, in the Identity Management (IM) category, the mindshare of CyberArk IGA Powered by Zilla is 1.8%, up from 0.7% compared to the previous year. The mindshare of SecureAuth Identity Platform is 1.1%, up from 0.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity Management (IM) Market Share Distribution
ProductMarket Share (%)
CyberArk IGA Powered by Zilla1.8%
SecureAuth Identity Platform1.1%
Other97.1%
Identity Management (IM)
 

Featured Reviews

reviewer2795934 - PeerSpot reviewer
Associate Director at a legal firm with 10,001+ employees
Identity governance has strengthened privileged access controls and supports ongoing compliance
Customization involves making changes to fit customer requirements. Maintenance usually involves sometimes having issues with different connectors, mostly the Active Directory and LDAP connectors. Periodic aggregation of accounts and applications sometimes go through issues with firewalls. Sometimes they do not work, and you need to make sure your connectors are all in sync, especially your LDAP and AD connectors. Sometimes there could be some issues occurring between these two connectors, so there will be maintenance on that side, making sure they are working on a regular basis based on your monitoring plan. Taking backups regularly and periodic backups are essential. Both the support rating and the overall product rating for CyberArk IGA Powered by Zilla is eight out of ten. Eight means they have complete processes in place to help support, they have resources available, and there is a method to contact them and get response quickly. In that regard, eight is appropriate because they reuse some of their main PAM components which is very good, and compared to other products which I ranked around nine, they should be at eight.
it_user710517 - PeerSpot reviewer
Identity and Access Engineer at a tech services company with 1,001-5,000 employees
Valuable features include access request and certification. Application integration, reporting, and certification could be improved.
Valuable features include access request, certification, and password management Provide centralised identity-access management Application integration, reporting, and certification could be improved More than three years The product is only as good as the data you use Moving from v7.x to v8.x…
report
Use our free recommendation engine to learn which Identity Management (IM) solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Security Firm
21%
Financial Services Firm
13%
Retailer
7%
Insurance Company
6%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for Zilla Security?
It has been fair because we have been in from the beginning or close to the beginning. I know it is not truly an identity access management system yet, but its price was one of the appealing factor...
What needs improvement with Zilla Security?
There is still no automated way to de-provision access due to a review completion, but they are getting there in terms of making it unified. Right now it is just a one-way integration, importing us...
What is your primary use case for Zilla Security?
We use the tool for access reviews. It is mainly for our regulatory SOX compliance. That was the main use case, and why we purchased Zilla back at the end of 2021.
Ask a question
Earn 20 points
 

Also Known As

Zilla Security
SecureAuth Identity Governance, Core Access Assurance Suite, Courion Access Assurance Suite
 

Overview

 

Sample Customers

Information Not Available
Alegent Health, Associated Materials, Brookdale Senior Living, NV Energy, Woodforest Bank, Wellspan Health
Find out what your peers are saying about CyberArk IGA Powered by Zilla vs. SecureAuth Identity Platform and other solutions. Updated: December 2025.
881,082 professionals have used our research since 2012.