Listing Thumbnail

    Comply

     Info
    Zilla Security solves the #1 security problem organizations face today - preventing identity related data breaches. Zilla enables organizations to establish a security and compliance best practice to eliminate access risk. We've combined comprehensive identity and access governance, and cloud security in a single platform. Zilla monitors and gives you control over all your identity paths to data access. You get least-privilege security with total visibility, ongoing monitoring, and remediation for identity vulnerabilities. Zilla's fully automated, easy-to-use access reviews help you achieve compliance, demonstrate audit readiness, and provide robust evidence of your organization's security measures.
    4.3

    Overview

    Zilla Security delivers an identity security solution focused on comprehensive security and compliance that is automated and easy to use. The platform combines identity governance with cloud security to deliver access visibility, compliance reviews, user lifecycle management, segregation of duties, and policy-based security remediation.

    Zilla's no-code integration with SaaS applications like Salesforce, cloud infrastructure like AWS, and cloud databases like Databricks, is unparalleled. Robotic automation enables the platform to monitor and configure all web-based applications, even those that don't have security APIs.

    Zilla's self-learning, intelligent automation easily handles cloud scale and dramatically reduces the cost of ownership via a simple user experience that enables collaboration between app owners, IT, security teams, and auditors.

    Zilla delivers:

    Extensive library of out-of-the-box app Integrations Fast onboarding of any app - no coding or scripting - including custom and legacy apps without APIs Fully automated access reviews campaigns and compliance assessments for multiple reviewer types Simple user experience for frictionless collaboration between stakeholders Continuous and audit-ready compliance with all the supporting evidence in one place Advanced search and reporting for the compliance audit purposes Complete visibility into who has access to what

    Highlights

    • Automated monitoring and remediation of access - who has access to what and any access risks. Zilla enables organizations to easily monitor all permissions, infrastructure entitlements, and security settings that give users, machines, and APIs access. We deliver insight into critical access risk and then remediate inappropriate access via integration with an organization's ITSM systems for ticketing workflows.
    • Comprehensive integrations with Zilla Universal Sync (ZUS) - we haven't met an app we can't support. Zilla makes it easy to integrate the tools, systems, and platforms organizations use every day. The platform includes robotic automation that enables customers to integrate with all applications, including legacy and homegrown apps, and ones that offer no security APIs or file exports for security data.
    • Simple, automated User Access Reviews (UAR) - go from months to days for reviews and audits. Zilla automates the entire UAR process and delivers an auditable system of record. The platform generates permissions relevant to a campaign, invites reviewers to complete work, and enables administrators to track reviewer progress. Reviewers can maintain, revoke, change, re-assign, or delegate permissions, while campaign administrators have complete control over the review process.

    Details

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (3)

     Info
    Dimension
    Description
    Cost/12 months
    Comply 500/25
    Zilla Security - Comply for 500 Identities and 25 applications
    $45,000.00
    Comply 2500/100
    Zilla Security - Comply for 2500 identities and 100 applications
    $90,000.00
    Comply additional app
    Zilla Security - Comply Additional App
    $1,000.00

    Vendor refund policy

    No refunds are available

    How can we make this page better?

    Tell us how we can improve this page, or report an issue with this product.
    Tell us how we can improve this page, or report an issue with this product.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Vendor resources

    Support

    Vendor support

    The Zilla Customer Support Team is dedicated to providing you with a best-in-class support experience. Our goal is to exceed your expectations and make you successful. Support@ZillaSecurity.com  address

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    25
    In Data Security and Governance

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    1 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    1 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Access Monitoring and Remediation
    Automated monitoring of all permissions, infrastructure entitlements, and security settings with identification of access risks and remediation through ITSM system integration for ticketing workflows.
    Universal Application Integration
    No-code integration capability with SaaS applications, cloud infrastructure, and cloud databases using robotic automation to support legacy applications, custom apps, and systems without security APIs.
    Automated Access Reviews
    Fully automated user access review campaigns with permission generation, reviewer invitation, progress tracking, and capabilities for permission maintenance, revocation, reassignment, and delegation.
    Identity Governance and Lifecycle Management
    Comprehensive identity governance platform combining user lifecycle management, segregation of duties enforcement, and policy-based security remediation across cloud and on-premises environments.
    Compliance Visibility and Reporting
    Advanced search and reporting capabilities providing complete visibility into access permissions, audit-ready compliance documentation, and supporting evidence collection for compliance assessments.
    Application Discovery and Integration
    Integrates with Identity and SSO platforms, financial systems, and direct integrations; includes browser agent and desktop agent capabilities for comprehensive application discovery.
    Access Provisioning and Deprovisioning Automation
    Enables bulk access provisioning and deprovisioning for user lifecycle events including joiners, movers, and leavers through automated workflows.
    Access Review Automation
    Automates access reviews and streamlines access management processes through a centralized interface.
    Identity and Access Governance
    Enforces compliance controls mandated by SOX, HIPAA, and SOC 2 standards to ensure appropriate access rights assignment.
    License and Cost Optimization
    Identifies and eliminates application redundancy and unused licenses to optimize software spending.
    Multi-Cloud and SaaS Identity Integration
    Unifies and visualizes identity and entitlement data across AWS, Azure, GCP, Okta, Active Directory, Snowflake, Oracle, Salesforce, and additional cloud and SaaS platforms.
    Least Privilege Enforcement and Permissions Management
    Enforces least privilege access policies and reduces permissions sprawl across cloud and SaaS environments for both human and non-human identities.
    Non-Human Identity and AI Workload Governance
    Discovers, secures, and governs service accounts, secrets, automations, and AI agents, with capability to control access for AI models and pipelines to ensure only authorized identities can invoke, train, or deploy AI systems.
    Automated Access Reviews and Policy-Driven Governance
    Automates user access reviews and replaces manual processes with policy-driven access governance across cloud and SaaS environments.
    Compliance Reporting and Audit Readiness
    Delivers audit-ready reporting for regulatory requirements including SOX, HIPAA, PCI, and supports alignment with Zero Trust and modern compliance frameworks.

    Security credentials

     Info
    Validated by AWS Marketplace
    FedRAMP
    GDPR
    HIPAA
    ISO/IEC 27001
    PCI DSS
    SOC 2 Type 2
    No security profile
    No security profile
    -
    -
    -
    -

    Contract

     Info
    Standard contract
    No

    Customer reviews

    Ratings and reviews

     Info
    4.3
    11 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    64%
    36%
    0%
    0%
    0%
    2 AWS reviews
    |
    9 external reviews
    External reviews are from PeerSpot .
    AmitRathod

    Automation has transformed access reviews and governance across human and non-human identities

    Reviewed on May 11, 2026
    Review provided by PeerSpot

    What is our primary use case?

    CyberArk IGA Powered by Zilla  includes automated access reviews and certification. We automate compliance campaigns, reducing manual effort by 80%. It provides pre-approvals that can eliminate over non-required entitlements, streamlining onboarding. We also use it for role changes and off-boarding for employees and contractors. Additionally, it provides comprehensive integration for more than 200 to 300 applications, allowing us to manage all users and entitlements within the Salesforce  and Slack applications, as well as managing non-human identities like bots, service accounts, scripts, and workloads, which helps reduce risks in complex hybrid or multi-cloud environments. It is also used for auto-readiness, creating detailed audit trails for compliance reporting, answering questions such as who has done what process or what particular activities have been done for a particular duration. Overall, CyberArk IGA Powered by Zilla  helps us automate user access reviews, provisioning, and de-provisioning for both human and machine identities across hybrid and multi-cloud environments.

    What is most valuable?

    The best feature of CyberArk IGA  Powered by Zilla is its rapid integration and deployment. It has a lot of pre-built integrations for SaaS applications as well as cloud-based and on-premise applications, which allows us significantly faster deployment compared to other legacy IGA  tools. It also focuses on securing and managing non-human identities, bots, service accounts, and APIs, which often pose high security risks. It is used mostly for robotic automation, connecting applications that lack APIs and enabling automated data collection for governance.

    With CyberArk IGA Powered by Zilla, automation impacts our access reviews by allowing us to generate access reviews automatically. It generates entitlement profiles, analyzes access, and suggests approvals or denials based on the service and bot accounts we use. This overall reduces manual effort in access reviews by up to 60%, and it monitors the access reviews for recertification, notifying if a user has not utilized their privileged IDs for an extended period. The AI or automation suggests if this user is no longer using their access, prompting their manager to make a decision whether to approve or deny access.

    Previously, we performed manual work repeatedly, creating one-by-one campaigns and triggering them individually. However, with automation, we now employ a group of people for on-demand recertification, and for all privileged IDs, we use time-based recertification that runs every quarter or every 90 days. This significantly reduces our time by about 40 to 60%, and no manual effort is required for these activities.

    What needs improvement?

    The UI of CyberArk IGA Powered by Zilla is good, but there is room for improvement in the transition from legacy systems. Organizations with highly customized, long-standing legacy IGA tools may face a steep learning curve and complex data migration when moving to this modern AI-driven or cloud-native solution. Another limitation involves integration gaps. While CyberArk IGA Powered by Zilla boasts extensive pre-built connectors, any application not covered requires manual configuration or the deployment of Zilla Universal Sync, which may increase implementation time and could be less effective for legacy applications. However, it can be quite useful for SaaS-based applications, so improvement in customization or configuration for legacy applications is needed.

    There is a considerable dependency on data quality. The effectiveness of AI-driven insights, such as entitlement recommendations for approve, deny, or do nothing actions, is entirely reliant on the quality and accuracy of the data ingested from connected applications. This means data quality should not just depend on application integration but also overall user insights regarding usage, such as login activity or MFA utilization.

    For how long have I used the solution?

    I have been using this newly launched solution, CyberArk IGA Powered by Zilla, since the second quarter of last year in my organization.

    What do I think about the stability of the solution?

    Regarding stability, I recommend it at nine out of ten.

    What do I think about the scalability of the solution?

    For scalability, I would also rate it nine out of ten.

    How are customer service and support?

    I would rate the technical support of CyberArk IGA Powered by Zilla an eight out of ten, considering its time frame and the number of applications it handles.

    How was the initial setup?

    Implementing CyberArk IGA Powered by Zilla presented challenges as it is a new tool, requiring a steep learning curve initially. However, I found it to be easy to use after I acquired the necessary skills in six months, leading to an overall moderate experience.

    What's my experience with pricing, setup cost, and licensing?

    In terms of pricing for CyberArk IGA Powered by Zilla, I find it moderate compared to SailPoint, but it is cheaper than Okta Identity Governance.

    In terms of maintenance, there is an annual maintenance cost (AMC) package to consider. Daily management of API-related services, customer-related services, and deployment-related services is also necessary, which clients need to purchase.

    Which other solutions did I evaluate?

    When comparing CyberArk IGA Powered by Zilla to other solutions such as Okta, it is known for its cloud-first approach and managing modern SaaS applications, while SailPoint is a leader in IGA. Entra ID is a newer competitor in this space. If comparing CyberArk IGA Powered by Zilla primarily with SailPoint IQ, I recommend CyberArk IGA Powered by Zilla if a client wants to rapidly govern SaaS applications, employs a lot of AI for automating access reviews, and prefers a modern low-touch SaaS platform. If a client has a large enterprise with complex legacy applications needing extensive customization and governance, then they should choose SailPoint IQ.

    What other advice do I have?

    My advice for others looking into CyberArk IGA Powered by Zilla is that if a client has a complex number of legacy applications, they should opt for SailPoint or Okta. However, if they prefer to use AI for automating access reviews or want a low-touch SaaS platform for rapid SaaS adoption, they should go for CyberArk IGA Powered by Zilla. I would rate my overall experience with CyberArk IGA Powered by Zilla a nine out of ten.

    Evans Vasavan

    Identity governance has automated lifecycle management and strengthens compliance workflows

    Reviewed on May 11, 2026
    Review from a verified AWS customer

    What is our primary use case?

    My main use case for CyberArk IGA Powered by Zilla  is that it provides the platform which helps to improve our governance and the provisioning technology, and it also strengthens my identity lifecycle and compliance portfolio.

    A specific example of how I use CyberArk IGA Powered by Zilla  in my daily work is that it has the identity governance modernization which helps to improve my organization, provides user automation, and assists significantly with compliance and audit, least privilege enforcement policies, and automates the joiner or leaver process of particular employees.

    What is most valuable?

    CyberArk IGA  Powered by Zilla offers best features including AI-driven identity governance, automated provisioning and de-provisioning, access review and compliance, cloud-native architecture, and lifecycle management, particularly identity lifecycle management.

    The cloud-native architecture and automated provisioning features of CyberArk IGA  Powered by Zilla help me a lot, especially to the HR department, when any employee comes into our organization or leaves; it automatically provides the proper access to them depending upon their designation and name, and it also automates the necessary credential management when employees leave.

    CyberArk IGA Powered by Zilla has positively impacted my organization through the collection of audit evidence, the compliance workflow, and user access reviews, which helps me significantly.

    What needs improvement?

    There are no additional improvements needed at this time.

    For how long have I used the solution?

    I have been working in my current field for two years.

    What do I think about the stability of the solution?

    CyberArk IGA Powered by Zilla is stable.

    What do I think about the scalability of the solution?

    For the scalability of CyberArk IGA Powered by Zilla, I would rate it a nine.

    How are customer service and support?

    I would say the customer support for CyberArk IGA Powered by Zilla is responsive.

    I would rate the customer support a nine.

    Which solution did I use previously and why did I switch?

    I don't have clarity on previous solutions because I came in two years ago, and at that time CyberArk IGA Powered by Zilla was being deployed; as far as I know, there was no software present prior.

    We directly went for CyberArk IGA Powered by Zilla.

    How was the initial setup?

    It took me within three days to deploy CyberArk IGA Powered by Zilla from setup to initial go-live by deploying the base policies, and later on, we modified according to our needs.

    The deployment was significantly quicker compared to past solutions.

    What about the implementation team?

    An example of how automation with CyberArk IGA Powered by Zilla reduced time or effort for my team is that whenever a user is onboarding, it automatically chooses their role and applies the policies-based automation within a fraction of seconds, eliminating the need for manual intervention.

    My team spends significantly less time on access reviews and evidence collection compared to before.

    What was our ROI?

    CyberArk IGA Powered by Zilla has helped me a lot and constitutes a return on investment as well, but I cannot provide more details because I am from the technical department.

    What's my experience with pricing, setup cost, and licensing?

    The pricing, setup cost, and licensing were taken care of by the administration, so I do not have information about those details.

    Which other solutions did I evaluate?

    I did not purchase CyberArk IGA Powered by Zilla through the AWS Marketplace .

    CyberArk IGA Powered by Zilla is from a different vendor.

    What other advice do I have?

    So far, everything is working well for me, and anything on the roadmap is definitely always welcome.

    There is nothing to advise about CyberArk IGA Powered by Zilla; if you are aware of this particular solution, you have to check it out.

    I would rate this review a ten.

    Sanchit Makkar

    AI-driven identity governance has automated access reviews and optimizes role management

    Reviewed on May 08, 2026
    Review provided by PeerSpot

    What is our primary use case?

    CyberArk IGA Powered by Zilla  is being used for a modern AI-powered platform designed to automate identity compliance and lifecycle management.

    CyberArk IGA Powered by Zilla  is being used to automatically discover and maintain roles, which helps in replacing the tedious manual process for defining permissions for the users that are accessing the end applications.

    CyberArk IGA  Powered by Zilla is being used for discovering and maintaining job-appropriate permission for the end-user, which helps in reducing the access review effort up to 80% by automated workflows. This helps in understanding the requirement of the user and the administrator through an AI-driven platform, and it really helps to keep the access part well organized.

    The pricing and the setup cost depend on the usage. It depends on what kind of a subscription and a support model has been requested initially. The Zilla-powered module entry level may cost up to $45,000 per year, depending on how many applications and the user access is needed.

    What is most valuable?

    CyberArk IGA  Powered by Zilla generates a comprehensive report for timestamp and discussion logs automatically, which is very helpful in terms of checking what access has been given to the end-user. It has an AI-driven role management, which uses Zilla AI profile to automatically discover and maintain role. It also helps in automated access reviews.

    The automated access review feature is valuable because it really reduces the time and the effort required for compliance review by up to 80% through automated workflows and pre-approval process which are built-in to this platform, and which are very helpful for the bigger enterprise having a lot of administrators and the end-users for the consuming of application.

    CyberArk IGA Powered by Zilla offers integration with over 1,000 applications, which covers a very wide range of applications which are being used in large enterprise businesses. The possibility to onboard your user application to this platform is on the higher side.

    CyberArk IGA Powered by Zilla has provided continuous visibility in our access review model, by a feature called Identity Map that unifies the view of all entitlement for both humans and non-humans identities like bots or services accounts.

    In our organization, we have both a human-based user as well as functional accounts, which uses API-based access for communicating to the application. This platform was able to help us keeping the Identity Map segregated for both kinds of users and give us the deep insight of how users are interacting with the application, and the roles were being managed by CyberArk IGA Powered by Zilla itself. It was secure as well as precise for what end-user can access.

    Deployment with the help of professional services was pretty fast and productive.

    CyberArk IGA Powered by Zilla has improved the accuracy and overridden the manual effort of giving the access to the end-user depending on their needs. The AI-driven role management is very helpful in discovering and maintaining the role, which helps to replace the tedious manual process of defining the permissions for an end-user.

    What needs improvement?

    There is an initial complexity being a new product in the market. There is a steep learning curve. One has to be very well-versed about the CyberArk IGA Powered by Zilla capabilities, the PAM role capabilities for giving a permission and access to the end-user. There is a higher cost model for the initial setup as compared to the other ecosystem lock tools like Google Cloud  or Azure  Cloud identity. There is a need of a bit of some maturity in some advanced-level use cases, depending on the business requirement.

    As it is a comparatively new product in the market, careful consideration should be given when deciding about use cases and reaching out to the customer support team to check out the product compatibility and the integration with the end application that you may have in your environment before making a buying decision.

    For how long have I used the solution?

    CyberArk IGA Powered by Zilla has been in use for the last one and a half years.

    What do I think about the stability of the solution?

    CyberArk IGA Powered by Zilla is a stable solution.

    What do I think about the scalability of the solution?

    As it is a SaaS product, it is highly scalable and can be deployed in a multi-hybrid cloud environment. Based on the needs of an end business, this can be scaled vertically as well as horizontally in terms of deployment.

    How are customer service and support?

    Customer support is pretty good. They were able to help with the deployment and the rollout of the product on time.

    Which solution did I use previously and why did I switch?

    No different solution has been used before. CyberArk IGA Powered by Zilla was the first and foremost product that was reviewed and implemented.

    How was the initial setup?

    When deploying CyberArk IGA Powered by Zilla, it was built for cloud and hybrid environment, and it claims that the deployment speed is up to five times faster than the traditional IGA solution. Overall, this is a very great product if it is used wisely.

    What about the implementation team?

    Professional  services were engaged for design and the rollout, which typically takes around three to four months depending on the business case. It took around six months to fully deploy CyberArk IGA Powered by Zilla and the identity access management to our organization.

    What was our ROI?

    Return of investment has been seen in fewer employee count needed to manage the access and role, which can be a very tedious task in a huge enterprise business.

    What's my experience with pricing, setup cost, and licensing?

    The pricing and the setup cost depend on the usage. It depends on what kind of a subscription and a support model has been requested initially. The Zilla-powered module entry level may cost up to $45,000 per year, depending on how many applications and the user access is needed.

    Which other solutions did I evaluate?

    Google's Identity provider services were evaluated by the team.

    What other advice do I have?

    CyberArk IGA Powered by Zilla is a very satisfactory product overall. It was a great interaction. CyberArk IGA Powered by Zilla is a very new and advanced way of giving the access to an end-user by AI-powered automation, which uses an AI profile to automatically discover and maintain job-appropriate permissions, which is a very helpful and powerful module in an enterprise business. The overall review rating for this product is 10 out of 10.

    Arkajit Das

    Secured privileged access and improved compliance while workflows and UI still need refinement

    Reviewed on Apr 22, 2026
    Review provided by PeerSpot

    What is our primary use case?

    The usual use cases for CyberArk IGA Powered by Zilla  that my customers work with include monitoring access, recording it, and session control, as we primarily operate in the health tech and fintech domain.

    When a vendor logs into CyberArk IGA Powered by Zilla, they generally request access for confidential target systems, and we configure the secret proxy for this purpose.

    What is most valuable?

    The features of CyberArk IGA Powered by Zilla that I have found the most valuable include credential masking, time-bound access, and using it for the approval of workflows and audit trails for compliance-related tasks.

    I find these features valuable primarily because they help reduce the risk of credential exposure, which is crucial for compliance in healthcare systems and SOC or ISO-related contexts. The elimination of shared passwords is another significant benefit.

    An example of how automation reduced time and effort for my customers is that we work with health tech systems where vendors request secure remote access to privileged systems without exposing credentials. This helps enable controlled access while monitoring or recording sessions for security and compliance.

    What needs improvement?

    I believe CyberArk IGA Powered by Zilla can be improved by simplifying the workflow and the UI for managing access requests and approvals. Additionally, reducing the complexity of onboarding and configurations would enhance better efficiency.

    For how long have I used the solution?

    I am using CyberArk CyberArk IGA Powered by Zilla  for almost three years now.

    What do I think about the stability of the solution?

    CyberArk IGA Powered by Zilla is quite stable, with no experience of data breaches or leakage. The network and security performance are efficient. I would rate this aspect around eight to eight point five.

    What do I think about the scalability of the solution?

    In terms of measurable improvements in deployment, reviews, or provisioning from CyberArk IGA Powered by Zilla, I notice it works well for scalability as it supports distributed environments and integrates with cloud platforms, making it useful for hybrid and cloud setups.

    However, some complexity and improvement need to be addressed.

    When assessing the stability and reliability, I would rate the scalability and reliability around eight. I say this about scalability and stability because it aligns well with enterprise-level systems yet can feel complex with the workflow and requires understanding to navigate configurations effectively.

    How are customer service and support?

    I do not communicate often with the technical support of CyberArk IGA Powered by Zilla unless absolutely necessary.

    However, issues arise occasionally that may slow down operations. Support is user-centric and generally helpful.

    I would rate the technical support around seven or seven point five. The points deducted for the technical support primarily relate to turnaround time, which varies depending on licensing.

    Optimizing this could significantly enhance the user experience, but overall the support team is friendly and tries to assist effectively.

    How was the initial setup?

    I participated in the initial setup of CyberArk IGA Powered by Zilla.

    The initial setup process is highly customizable.

    When integrating for a fintech industry and applying similar models to health tech, we use primary components like the Digital Vault, Password Vault, and PVWA, along with configuring target systems such as servers and databases.

    Technical documentation simplifies this process significantly.

    What's my experience with pricing, setup cost, and licensing?

    I am aware of the pricing and licensing of CyberArk IGA Powered by Zilla. It is neither very cheap nor overly costly compared to other security service providers. Opting for multi-year subscriptions can be more economical.

    What other advice do I have?

    I have seen measurable improvements in reviews and provisioning.

    Specifically, in provisioning, it provides just-in-time access and a role-based architecture that helps in configuring access restrictions based on user roles, such as preventing registered nurses from accessing systems meant for doctors.

    I would rate CyberArk IGA Powered by Zilla at seven point five overall.

    Vivek_Jaiswal

    Identity governance has strengthened security and now simplifies privileged access reviews

    Reviewed on Apr 08, 2026
    Review provided by PeerSpot

    What is our primary use case?

    There are many use cases for CyberArk IGA Powered by Zilla  in my organization. My main use case focuses on identity and access management and governance, emphasizing the identities and identity governance.

    I do not have anything else to add about my main use case with CyberArk IGA  Powered by Zilla.

    What is most valuable?

    CyberArk IGA  Powered by Zilla basically provides the identity and access management solution. It provides a system admin as well as the system admin user admins, provides all privileged users, and it manages across all the privileged users. It also provides security, password management, and access to the other applications.

    I rely day-to-day on privileged access management as well as protection against the cyber threat from the system admins and provided securities. I think it is very secure in terms of the identity management and access management. It provides governance and focus against the password management.

    CyberArk IGA Powered by Zilla provided a great layer of security in terms of the identity management and access management.

    This has really helped us in terms of providing security. When we implemented CyberArk IGA Powered by Zilla, we definitely achieved a lot in terms of security, mitigating business risk across all assets, saving time, and reducing the risk of account compromise and access compromise.

    Through automation, the management of identity and user management, as well as system management, has reduced time and effort for my team.

    A seventy to eighty percent improvement has definitely been seen in deployment, reviews, or provisioning since using CyberArk IGA Powered by Zilla.

    My team spends significantly less time on access reviews and evidence collection now compared to before; it has changed quite a bit.

    What needs improvement?

    The first thing that can be improved is the central admin console. Additionally, there is a need for more access for customizations. It is lacking a bit in governance science for the identities compared to competitors, so more risk management and governance policies would be beneficial.

    The central admin console can be improved, as well as more access to customizations.

    I would suggest enhancing the reporting functionality of CyberArk IGA Powered by Zilla. It could definitely benefit from more customization and advanced filtering for auditing purposes.

    For how long have I used the solution?

    I have been using CyberArk IGA Powered by Zilla  for a couple of years.

    What do I think about the stability of the solution?

    CyberArk IGA Powered by Zilla is stable.

    What do I think about the scalability of the solution?

    CyberArk IGA Powered by Zilla's scalability depends upon the good architect who has performed the implementation correctly. It is quite scalable, and we can definitely scale up or scale down.

    How are customer service and support?

    The type of support agreement and contract we have is really good. They provide excellent support in terms of lab, discussion forum, and good documentation that covers most issues. The quality of the support is very good.

    I would rate customer support a nine on a scale of one to ten.

    Which solution did I use previously and why did I switch?

    We used Saviynt and SailPoint previously, both of which are very good as well.

    The switch from those solutions to CyberArk IGA Powered by Zilla was primarily due to the automation of processes and compliance, the streamlining of identity governance and administration, and enhancing security and efficiency.

    How was the initial setup?

    CyberArk IGA Powered by Zilla did not take much time to deploy. It requires some additional support from the admin team and the project implementation, so at least two to three people were involved, and it took a couple of weeks to fix the issues.

    The deployment of CyberArk IGA Powered by Zilla was fast.

    What was our ROI?

    There is a lot of time saved in terms of employees, as well as in terms of price and security, with many things improved.

    What's my experience with pricing, setup cost, and licensing?

    For the pricing, I worked with the vendor.

    No challenges were faced in the pricing and setup cost. With the help of vendor support, we were able to get pricing and licensing sorted with the account manager.

    Which other solutions did I evaluate?

    Before choosing CyberArk IGA Powered by Zilla, we evaluated other options which included SailPoint Identity, Microsoft Entra ID , Okta, Omada identity solutions, Saviynt, One Identity, and JumpCloud .

    What other advice do I have?

    CyberArk IGA Powered by Zilla is a really good solution. Others should definitely go for it. I would rate this solution a nine out of ten.

    View all reviews