CyberArk IGA Powered by Zilla includes automated access reviews and certification. We automate compliance campaigns, reducing manual effort by 80%. It provides pre-approvals that can eliminate over non-required entitlements, streamlining onboarding. We also use it for role changes and off-boarding for employees and contractors. Additionally, it provides comprehensive integration for more than 200 to 300 applications, allowing us to manage all users and entitlements within the Salesforce and Slack applications, as well as managing non-human identities like bots, service accounts, scripts, and workloads, which helps reduce risks in complex hybrid or multi-cloud environments. It is also used for auto-readiness, creating detailed audit trails for compliance reporting, answering questions such as who has done what process or what particular activities have been done for a particular duration. Overall, CyberArk IGA Powered by Zilla helps us automate user access reviews, provisioning, and de-provisioning for both human and machine identities across hybrid and multi-cloud environments.
Comply
Zilla SecurityExternal reviews
External reviews are not included in the AWS star rating for the product.
Automation has transformed access reviews and governance across human and non-human identities
What is our primary use case?
What is most valuable?
The best feature of CyberArk IGA Powered by Zilla is its rapid integration and deployment. It has a lot of pre-built integrations for SaaS applications as well as cloud-based and on-premise applications, which allows us significantly faster deployment compared to other legacy IGA tools. It also focuses on securing and managing non-human identities, bots, service accounts, and APIs, which often pose high security risks. It is used mostly for robotic automation, connecting applications that lack APIs and enabling automated data collection for governance.
With CyberArk IGA Powered by Zilla, automation impacts our access reviews by allowing us to generate access reviews automatically. It generates entitlement profiles, analyzes access, and suggests approvals or denials based on the service and bot accounts we use. This overall reduces manual effort in access reviews by up to 60%, and it monitors the access reviews for recertification, notifying if a user has not utilized their privileged IDs for an extended period. The AI or automation suggests if this user is no longer using their access, prompting their manager to make a decision whether to approve or deny access.
Previously, we performed manual work repeatedly, creating one-by-one campaigns and triggering them individually. However, with automation, we now employ a group of people for on-demand recertification, and for all privileged IDs, we use time-based recertification that runs every quarter or every 90 days. This significantly reduces our time by about 40 to 60%, and no manual effort is required for these activities.
What needs improvement?
The UI of CyberArk IGA Powered by Zilla is good, but there is room for improvement in the transition from legacy systems. Organizations with highly customized, long-standing legacy IGA tools may face a steep learning curve and complex data migration when moving to this modern AI-driven or cloud-native solution. Another limitation involves integration gaps. While CyberArk IGA Powered by Zilla boasts extensive pre-built connectors, any application not covered requires manual configuration or the deployment of Zilla Universal Sync, which may increase implementation time and could be less effective for legacy applications. However, it can be quite useful for SaaS-based applications, so improvement in customization or configuration for legacy applications is needed.
There is a considerable dependency on data quality. The effectiveness of AI-driven insights, such as entitlement recommendations for approve, deny, or do nothing actions, is entirely reliant on the quality and accuracy of the data ingested from connected applications. This means data quality should not just depend on application integration but also overall user insights regarding usage, such as login activity or MFA utilization.
For how long have I used the solution?
I have been using this newly launched solution, CyberArk IGA Powered by Zilla, since the second quarter of last year in my organization.
What do I think about the stability of the solution?
Regarding stability, I recommend it at nine out of ten.
What do I think about the scalability of the solution?
For scalability, I would also rate it nine out of ten.
How are customer service and support?
I would rate the technical support of CyberArk IGA Powered by Zilla an eight out of ten, considering its time frame and the number of applications it handles.
How was the initial setup?
Implementing CyberArk IGA Powered by Zilla presented challenges as it is a new tool, requiring a steep learning curve initially. However, I found it to be easy to use after I acquired the necessary skills in six months, leading to an overall moderate experience.
What's my experience with pricing, setup cost, and licensing?
In terms of pricing for CyberArk IGA Powered by Zilla, I find it moderate compared to SailPoint, but it is cheaper than Okta Identity Governance.
In terms of maintenance, there is an annual maintenance cost (AMC) package to consider. Daily management of API-related services, customer-related services, and deployment-related services is also necessary, which clients need to purchase.
Which other solutions did I evaluate?
When comparing CyberArk IGA Powered by Zilla to other solutions such as Okta, it is known for its cloud-first approach and managing modern SaaS applications, while SailPoint is a leader in IGA. Entra ID is a newer competitor in this space. If comparing CyberArk IGA Powered by Zilla primarily with SailPoint IQ, I recommend CyberArk IGA Powered by Zilla if a client wants to rapidly govern SaaS applications, employs a lot of AI for automating access reviews, and prefers a modern low-touch SaaS platform. If a client has a large enterprise with complex legacy applications needing extensive customization and governance, then they should choose SailPoint IQ.
What other advice do I have?
My advice for others looking into CyberArk IGA Powered by Zilla is that if a client has a complex number of legacy applications, they should opt for SailPoint or Okta. However, if they prefer to use AI for automating access reviews or want a low-touch SaaS platform for rapid SaaS adoption, they should go for CyberArk IGA Powered by Zilla. I would rate my overall experience with CyberArk IGA Powered by Zilla a nine out of ten.
Identity governance has automated lifecycle management and strengthens compliance workflows
What is our primary use case?
My main use case for CyberArk IGA Powered by Zilla is that it provides the platform which helps to improve our governance and the provisioning technology, and it also strengthens my identity lifecycle and compliance portfolio.
A specific example of how I use CyberArk IGA Powered by Zilla in my daily work is that it has the identity governance modernization which helps to improve my organization, provides user automation, and assists significantly with compliance and audit, least privilege enforcement policies, and automates the joiner or leaver process of particular employees.
What is most valuable?
CyberArk IGA Powered by Zilla offers best features including AI-driven identity governance, automated provisioning and de-provisioning, access review and compliance, cloud-native architecture, and lifecycle management, particularly identity lifecycle management.
The cloud-native architecture and automated provisioning features of CyberArk IGA Powered by Zilla help me a lot, especially to the HR department, when any employee comes into our organization or leaves; it automatically provides the proper access to them depending upon their designation and name, and it also automates the necessary credential management when employees leave.
CyberArk IGA Powered by Zilla has positively impacted my organization through the collection of audit evidence, the compliance workflow, and user access reviews, which helps me significantly.
What needs improvement?
There are no additional improvements needed at this time.
For how long have I used the solution?
I have been working in my current field for two years.
What do I think about the stability of the solution?
CyberArk IGA Powered by Zilla is stable.
What do I think about the scalability of the solution?
For the scalability of CyberArk IGA Powered by Zilla, I would rate it a nine.
How are customer service and support?
I would say the customer support for CyberArk IGA Powered by Zilla is responsive.
I would rate the customer support a nine.
Which solution did I use previously and why did I switch?
I don't have clarity on previous solutions because I came in two years ago, and at that time CyberArk IGA Powered by Zilla was being deployed; as far as I know, there was no software present prior.
We directly went for CyberArk IGA Powered by Zilla.
How was the initial setup?
It took me within three days to deploy CyberArk IGA Powered by Zilla from setup to initial go-live by deploying the base policies, and later on, we modified according to our needs.
The deployment was significantly quicker compared to past solutions.
What about the implementation team?
An example of how automation with CyberArk IGA Powered by Zilla reduced time or effort for my team is that whenever a user is onboarding, it automatically chooses their role and applies the policies-based automation within a fraction of seconds, eliminating the need for manual intervention.
My team spends significantly less time on access reviews and evidence collection compared to before.
What was our ROI?
CyberArk IGA Powered by Zilla has helped me a lot and constitutes a return on investment as well, but I cannot provide more details because I am from the technical department.
What's my experience with pricing, setup cost, and licensing?
The pricing, setup cost, and licensing were taken care of by the administration, so I do not have information about those details.
Which other solutions did I evaluate?
I did not purchase CyberArk IGA Powered by Zilla through the AWS Marketplace.
CyberArk IGA Powered by Zilla is from a different vendor.
What other advice do I have?
So far, everything is working well for me, and anything on the roadmap is definitely always welcome.
There is nothing to advise about CyberArk IGA Powered by Zilla; if you are aware of this particular solution, you have to check it out.
I would rate this review a ten.
Automated lifecycle governance has reduced manual access work and strengthens audit readiness
What is our primary use case?
I use CyberArk IGA Powered by Zilla for identifying lifecycle management activities, including Joiner, Mover, and Leaver across the enterprise environments through the JML process. We handle RBAC policies, so we perform the provisioning and de-provisioning for Active Directory, VPN, and enterprise applications based on RBAC policies. We also handle modification requests on a role basis, including department changes, while ensuring the latest privilege compliance requirements. We manage support access governance activities, including access reviews through certification campaigns, audit compliance validations, and monitoring provisioning workflows. In case of any access assignment failures, we handle them. These are the day-to-day activities on CyberArk IGA Powered by Zilla.
What is most valuable?
CyberArk IGA Powered by Zilla significantly reduces manual access management efforts due to day-to-day activities. RBAC and role mining actually reduce manual access management efforts significantly. RBAC is the best feature, and it provides AI capabilities. The second feature I value most is identifying lifecycle management for joiner, mover, and leaver scenarios.
CyberArk IGA Powered by Zilla has one feature that provides strong access reviews, compliance reports, automation, and audit readiness with centralized governance. Centralized governance means we can handle everything at one point, making it a very strong feature. This is integrated with another feature such as SaaS integrations for strong security posture and faster provisioning with reduced operational overhead. These are the four features I value most, and with all my three years of experience, I use and appreciate these four features most.
The impact of automation on my access reviews is that it automates the provisioning and de-provisioning. If I were to perform manual tasks such as provisioning and de-provisioning without automation, it would require a lot of time to handle. With this automation, we easily accomplish provisioning or de-provisioning. We simply get the Active Directory users and create the VPNs, cloud, and enterprise applications without any manual intervention. AI-driven role management and RBAC automation significantly reduce service tickets. Without automation, I would need to handle tickets, which involve a lot of manual work and requires additional manual employees. Without automation, this leads to approval delays and manual access assignment efforts. Automated access reviews provide simple audit reports, and by complying with the report, it improves audit readiness while reducing operational workload for IT and security teams.
What needs improvement?
There is room for improvement in CyberArk IGA Powered by Zilla mainly related to automation complexity. Skilled people are required to handle these tasks. For upgrades, the complexity of infrastructure needs to be considered, and upgrading is complex. If I am using some versions and want to upgrade to the next version, the infrastructure complexity requires skilled people to understand it. Additionally, training is often required for users handling the system. These areas require improvement. While automation eases many processes, the overall complexity of the infrastructure should be simplified as much as possible.
For how long have I used the solution?
I have been using CyberArk IGA Powered by Zilla for about three years.
What do I think about the stability of the solution?
I rate the stability of CyberArk IGA Powered by Zilla as very high, around nine to ten. Stability is good, with minimal downtime in enterprise environments. Minimal downtime is a key factor, and many users report strong performance in identifying governance and access management operations. Stability-wise, it operates well with minimal downtime. I strongly recommend it for great stability. In terms of platform performance with connectors, patches, and integrations, it is well maintained, especially in hybrid environments such as AD, cloud, and on-premise. Occasionally, there are issues with legacy integrations and upgrades, leading to less stability in those contexts, but overall, it performs well.
What do I think about the scalability of the solution?
I have approximately two hundred users in DH, plus more than one hundred fifty to one hundred eighty in North America. On-site, over three hundred people use it, and offshore, around four hundred fifty to five hundred eighty are using it. The total number of users is almost less than one thousand.
How are customer service and support?
I rate the technical support as very good, giving it an eight to nine. When I open a ticket, they initially ask some questions. While filling out the ticket details, I provide a brief description. They analyze it, engage with the context, and assign the ticket to the appropriate engineer. Once assigned, they schedule a call with me. Whenever I encounter issues with application deployment, role-based deployment, or infrastructure complexity, solutions are provided within two to three days. If there is an issue that cannot be resolved immediately, they actively work on it and usually provide a solution within five days. Recently, they resolved an issue in three days. Most of the time, they manage to provide a solution within two to three days, making their support highly rated and effective.
What was our ROI?
CyberArk IGA Powered by Zilla saves me almost twenty to forty percent of my time in reducing all kinds of tasks. Earlier, I had to see many things and set the RBAC rules. With this JML process, it is very easy. In a total of eight hours of shift hours, it reduces about two hours of my time. So it is almost a twenty to thirty percent time saving.
What other advice do I have?
CyberArk IGA Powered by Zilla offers lifecycle management and role-based access. There are no features in the past that compare to CyberArk PAM. Here, I can easily manage access if any user joins, moves to another department, or leaves the organization, as it automatically provisions and de-provisions access based on onboarding or role changes or employment exit. In contrast, other products involve manual tasks and require synchronization with Active Directory, which also presents many problems. Automated provisioning of Active Directory accounts, VPN access, SaaS application access, and group memberships reduces manual IT work and service tickets. This kind of automated provisioning and de-provisioning stands out as one of the best features. Compared to other products, CyberArk IGA Powered by Zilla offers unique features and is mostly secure and automated. I strongly recommend this product due to its eighty percent less impact on access reviews, which is useful for audits, compliance, and security governance. For example, audits in IT are very important, and using automation allows me to simply provide the necessary audit reports.
I highly recommend CyberArk IGA Powered by Zilla for enterprises looking to automate processes, especially for joiners, movers, and leavers. It improves compliance and strengthens access governance, making it easy to handle automation. It reduces manual tasks such as ticketing. Companies should ensure proper planning for integrations with Active Directory, cloud-based applications, or HR systems to achieve maximum automation benefits. I strongly recommend this product, as the platform is enterprise-grade and feature-rich. Having experienced IAM and IGA administrators for proper implementation is crucial, which reinforces my strong recommendation for CyberArk IGA Powered by Zilla.
I have three different setups for CyberArk IGA Powered by Zilla. In the Asia-Pac region, I am using cloud-based solutions, while in North America, I mostly utilize on-premises deployment.
CyberArk IGA Powered by Zilla requires centralized management, which is somewhat easier and a bit complex sometimes. If skilled people are not available, it can become complex for issues such as generating audit reports. When less skilled personnel handle it, it can be challenging. At times, it is very easy to manage; for instance, once I understand RBAC, lifecycle management, audit reports, and the security features of SaaS applications such as Salesforce and Office 365, it is very useful. For my case, it is easy, but there are instances where it has moderate complexity.
I give CyberArk IGA Powered by Zilla a review rating of ten out of ten.
AI-driven identity governance has automated access reviews and optimizes role management
What is our primary use case?
CyberArk IGA Powered by Zilla is being used for a modern AI-powered platform designed to automate identity compliance and lifecycle management.
CyberArk IGA Powered by Zilla is being used to automatically discover and maintain roles, which helps in replacing the tedious manual process for defining permissions for the users that are accessing the end applications.
CyberArk IGA Powered by Zilla is being used for discovering and maintaining job-appropriate permission for the end-user, which helps in reducing the access review effort up to 80% by automated workflows. This helps in understanding the requirement of the user and the administrator through an AI-driven platform, and it really helps to keep the access part well organized.
The pricing and the setup cost depend on the usage. It depends on what kind of a subscription and a support model has been requested initially. The Zilla-powered module entry level may cost up to $45,000 per year, depending on how many applications and the user access is needed.
What is most valuable?
CyberArk IGA Powered by Zilla generates a comprehensive report for timestamp and discussion logs automatically, which is very helpful in terms of checking what access has been given to the end-user. It has an AI-driven role management, which uses Zilla AI profile to automatically discover and maintain role. It also helps in automated access reviews.
The automated access review feature is valuable because it really reduces the time and the effort required for compliance review by up to 80% through automated workflows and pre-approval process which are built-in to this platform, and which are very helpful for the bigger enterprise having a lot of administrators and the end-users for the consuming of application.
CyberArk IGA Powered by Zilla offers integration with over 1,000 applications, which covers a very wide range of applications which are being used in large enterprise businesses. The possibility to onboard your user application to this platform is on the higher side.
CyberArk IGA Powered by Zilla has provided continuous visibility in our access review model, by a feature called Identity Map that unifies the view of all entitlement for both humans and non-humans identities like bots or services accounts.
In our organization, we have both a human-based user as well as functional accounts, which uses API-based access for communicating to the application. This platform was able to help us keeping the Identity Map segregated for both kinds of users and give us the deep insight of how users are interacting with the application, and the roles were being managed by CyberArk IGA Powered by Zilla itself. It was secure as well as precise for what end-user can access.
Deployment with the help of professional services was pretty fast and productive.
CyberArk IGA Powered by Zilla has improved the accuracy and overridden the manual effort of giving the access to the end-user depending on their needs. The AI-driven role management is very helpful in discovering and maintaining the role, which helps to replace the tedious manual process of defining the permissions for an end-user.
What needs improvement?
There is an initial complexity being a new product in the market. There is a steep learning curve. One has to be very well-versed about the CyberArk IGA Powered by Zilla capabilities, the PAM role capabilities for giving a permission and access to the end-user. There is a higher cost model for the initial setup as compared to the other ecosystem lock tools like Google Cloud or Azure Cloud identity. There is a need of a bit of some maturity in some advanced-level use cases, depending on the business requirement.
As it is a comparatively new product in the market, careful consideration should be given when deciding about use cases and reaching out to the customer support team to check out the product compatibility and the integration with the end application that you may have in your environment before making a buying decision.
For how long have I used the solution?
CyberArk IGA Powered by Zilla has been in use for the last one and a half years.
What do I think about the stability of the solution?
CyberArk IGA Powered by Zilla is a stable solution.
What do I think about the scalability of the solution?
As it is a SaaS product, it is highly scalable and can be deployed in a multi-hybrid cloud environment. Based on the needs of an end business, this can be scaled vertically as well as horizontally in terms of deployment.
How are customer service and support?
Customer support is pretty good. They were able to help with the deployment and the rollout of the product on time.
Which solution did I use previously and why did I switch?
No different solution has been used before. CyberArk IGA Powered by Zilla was the first and foremost product that was reviewed and implemented.
How was the initial setup?
When deploying CyberArk IGA Powered by Zilla, it was built for cloud and hybrid environment, and it claims that the deployment speed is up to five times faster than the traditional IGA solution. Overall, this is a very great product if it is used wisely.
What about the implementation team?
Professional services were engaged for design and the rollout, which typically takes around three to four months depending on the business case. It took around six months to fully deploy CyberArk IGA Powered by Zilla and the identity access management to our organization.
What was our ROI?
Return of investment has been seen in fewer employee count needed to manage the access and role, which can be a very tedious task in a huge enterprise business.
What's my experience with pricing, setup cost, and licensing?
The pricing and the setup cost depend on the usage. It depends on what kind of a subscription and a support model has been requested initially. The Zilla-powered module entry level may cost up to $45,000 per year, depending on how many applications and the user access is needed.
Which other solutions did I evaluate?
Google's Identity provider services were evaluated by the team.
What other advice do I have?
CyberArk IGA Powered by Zilla is a very satisfactory product overall. It was a great interaction. CyberArk IGA Powered by Zilla is a very new and advanced way of giving the access to an end-user by AI-powered automation, which uses an AI profile to automatically discover and maintain job-appropriate permissions, which is a very helpful and powerful module in an enterprise business. The overall review rating for this product is 10 out of 10.
Secured privileged access and improved compliance while workflows and UI still need refinement
What is our primary use case?
The usual use cases for CyberArk IGA Powered by Zilla that my customers work with include monitoring access, recording it, and session control, as we primarily operate in the health tech and fintech domain.
When a vendor logs into CyberArk IGA Powered by Zilla, they generally request access for confidential target systems, and we configure the secret proxy for this purpose.
What is most valuable?
The features of CyberArk IGA Powered by Zilla that I have found the most valuable include credential masking, time-bound access, and using it for the approval of workflows and audit trails for compliance-related tasks.
I find these features valuable primarily because they help reduce the risk of credential exposure, which is crucial for compliance in healthcare systems and SOC or ISO-related contexts. The elimination of shared passwords is another significant benefit.
An example of how automation reduced time and effort for my customers is that we work with health tech systems where vendors request secure remote access to privileged systems without exposing credentials. This helps enable controlled access while monitoring or recording sessions for security and compliance.
What needs improvement?
I believe CyberArk IGA Powered by Zilla can be improved by simplifying the workflow and the UI for managing access requests and approvals. Additionally, reducing the complexity of onboarding and configurations would enhance better efficiency.
For how long have I used the solution?
I am using CyberArk CyberArk IGA Powered by Zilla for almost three years now.
What do I think about the stability of the solution?
CyberArk IGA Powered by Zilla is quite stable, with no experience of data breaches or leakage. The network and security performance are efficient. I would rate this aspect around eight to eight point five.
What do I think about the scalability of the solution?
In terms of measurable improvements in deployment, reviews, or provisioning from CyberArk IGA Powered by Zilla, I notice it works well for scalability as it supports distributed environments and integrates with cloud platforms, making it useful for hybrid and cloud setups.
However, some complexity and improvement need to be addressed.
When assessing the stability and reliability, I would rate the scalability and reliability around eight. I say this about scalability and stability because it aligns well with enterprise-level systems yet can feel complex with the workflow and requires understanding to navigate configurations effectively.
How are customer service and support?
I do not communicate often with the technical support of CyberArk IGA Powered by Zilla unless absolutely necessary.
However, issues arise occasionally that may slow down operations. Support is user-centric and generally helpful.
I would rate the technical support around seven or seven point five. The points deducted for the technical support primarily relate to turnaround time, which varies depending on licensing.
Optimizing this could significantly enhance the user experience, but overall the support team is friendly and tries to assist effectively.
How was the initial setup?
I participated in the initial setup of CyberArk IGA Powered by Zilla.
The initial setup process is highly customizable.
When integrating for a fintech industry and applying similar models to health tech, we use primary components like the Digital Vault, Password Vault, and PVWA, along with configuring target systems such as servers and databases.
Technical documentation simplifies this process significantly.
What's my experience with pricing, setup cost, and licensing?
I am aware of the pricing and licensing of CyberArk IGA Powered by Zilla. It is neither very cheap nor overly costly compared to other security service providers. Opting for multi-year subscriptions can be more economical.
What other advice do I have?
I have seen measurable improvements in reviews and provisioning.
Specifically, in provisioning, it provides just-in-time access and a role-based architecture that helps in configuring access restrictions based on user roles, such as preventing registered nurses from accessing systems meant for doctors.
I would rate CyberArk IGA Powered by Zilla at seven point five overall.
Identity governance has strengthened security and now simplifies privileged access reviews
What is our primary use case?
There are many use cases for CyberArk IGA Powered by Zilla in my organization. My main use case focuses on identity and access management and governance, emphasizing the identities and identity governance.
I do not have anything else to add about my main use case with CyberArk IGA Powered by Zilla.
What is most valuable?
CyberArk IGA Powered by Zilla basically provides the identity and access management solution. It provides a system admin as well as the system admin user admins, provides all privileged users, and it manages across all the privileged users. It also provides security, password management, and access to the other applications.
I rely day-to-day on privileged access management as well as protection against the cyber threat from the system admins and provided securities. I think it is very secure in terms of the identity management and access management. It provides governance and focus against the password management.
CyberArk IGA Powered by Zilla provided a great layer of security in terms of the identity management and access management.
This has really helped us in terms of providing security. When we implemented CyberArk IGA Powered by Zilla, we definitely achieved a lot in terms of security, mitigating business risk across all assets, saving time, and reducing the risk of account compromise and access compromise.
Through automation, the management of identity and user management, as well as system management, has reduced time and effort for my team.
A seventy to eighty percent improvement has definitely been seen in deployment, reviews, or provisioning since using CyberArk IGA Powered by Zilla.
My team spends significantly less time on access reviews and evidence collection now compared to before; it has changed quite a bit.
What needs improvement?
The first thing that can be improved is the central admin console. Additionally, there is a need for more access for customizations. It is lacking a bit in governance science for the identities compared to competitors, so more risk management and governance policies would be beneficial.
The central admin console can be improved, as well as more access to customizations.
I would suggest enhancing the reporting functionality of CyberArk IGA Powered by Zilla. It could definitely benefit from more customization and advanced filtering for auditing purposes.
For how long have I used the solution?
I have been using CyberArk IGA Powered by Zilla for a couple of years.
What do I think about the stability of the solution?
CyberArk IGA Powered by Zilla is stable.
What do I think about the scalability of the solution?
CyberArk IGA Powered by Zilla's scalability depends upon the good architect who has performed the implementation correctly. It is quite scalable, and we can definitely scale up or scale down.
How are customer service and support?
The type of support agreement and contract we have is really good. They provide excellent support in terms of lab, discussion forum, and good documentation that covers most issues. The quality of the support is very good.
I would rate customer support a nine on a scale of one to ten.
Which solution did I use previously and why did I switch?
We used Saviynt and SailPoint previously, both of which are very good as well.
The switch from those solutions to CyberArk IGA Powered by Zilla was primarily due to the automation of processes and compliance, the streamlining of identity governance and administration, and enhancing security and efficiency.
How was the initial setup?
CyberArk IGA Powered by Zilla did not take much time to deploy. It requires some additional support from the admin team and the project implementation, so at least two to three people were involved, and it took a couple of weeks to fix the issues.
The deployment of CyberArk IGA Powered by Zilla was fast.
What was our ROI?
There is a lot of time saved in terms of employees, as well as in terms of price and security, with many things improved.
What's my experience with pricing, setup cost, and licensing?
For the pricing, I worked with the vendor.
No challenges were faced in the pricing and setup cost. With the help of vendor support, we were able to get pricing and licensing sorted with the account manager.
Which other solutions did I evaluate?
Before choosing CyberArk IGA Powered by Zilla, we evaluated other options which included SailPoint Identity, Microsoft Entra ID, Okta, Omada identity solutions, Saviynt, One Identity, and JumpCloud.
What other advice do I have?
CyberArk IGA Powered by Zilla is a really good solution. Others should definitely go for it. I would rate this solution a nine out of ten.
Centralized access has strengthened security and simplified auditing for sensitive environments
What is our primary use case?
CyberArk IGA Powered by Zilla is used across various sectors including financial services, mining, oil and gas environments, as well as manufacturing and SMBs that require access to specific sensitive environments.
What is most valuable?
The best features of CyberArk IGA Powered by Zilla include the hardening of the solution, which involves access to the vault being restricted to one way in and one way out.
The functionalities of CyberArk PAM include monitoring of activities, which are recorded live for auditing purposes, and it integrates into almost every environment seamlessly.
After implementing CyberArk IGA Powered by Zilla, it puts the organization at a very high security level by reducing risk and threats to platforms. It helps protect the identity of individuals in the environment and simplifies auditing, making it straightforward for organizations pursuing ISO certifications.
What needs improvement?
Improvement suggestions for CyberArk include addressing the on-premises deployment processes, which require a very skilled engineer to handle because of the complexity of the environments involved.
For how long have I used the solution?
I have been working with CyberArk from 2019 to 2024.
What do I think about the scalability of the solution?
For larger environments using CyberArk IGA Powered by Zilla, scalability depends on the integration environment being implemented and the skill set behind it.
PAM involves all identity management across whole departments. My most recent projects span across two to three months because they involve other stakeholders including senior network engineers to understand how the integration will proceed, which impacts the timeframes needed for implementation.
How are customer service and support?
For the technical support of CyberArk, I rate them nine out of ten. While my experience from a partner perspective has been outstanding, the SLAs differ greatly from those of normal users.
What about the implementation team?
I personally participated in the deployment of CyberArk IGA Powered by Zilla and was the lead engineer on most of the projects that I have encountered.
I completed the implementation of CyberArk IGA Powered by Zilla all in-house. Most things are out of the box, but understanding every environment remains essential for smooth integration.
What's my experience with pricing, setup cost, and licensing?
My experience with the licensing cost shows that CyberArk is never reasonable on pricing. It goes per administrator user rather than per integrated environment, making it essential to manage access strictly.
What other advice do I have?
Implementation for CyberArk IGA Powered by Zilla is quite a complex procedure. My experience with the automation provided by CyberArk IGA Powered by Zilla involves tweaking here and there, as the same device that will create security might also affect your performance.
In terms of automation, CyberArk places all your access points centrally, so if you are a network engineer wanting to access your devices, it is centralized for you, automating and orchestrating your access while placing security measures in place.
Regarding measurable improvements after starting to use CyberArk IGA Powered by Zilla, this PAM solution does more than multi-factor authentication by providing additional layers of security through session recording and monitoring, which is critical compared to identity governance, which is mostly for authentication. I rate this product eight point five out of ten.
Automated access reviews have reduced hidden bot risks and create audit evidence seamlessly
What is our primary use case?
CyberArk IGA Powered by Zilla serves as our main tool for access review, certification, and governance of non-human accounts.
We handle non-human accounts, which refers to all the RPA bots that use service accounts, and we were able to review the access of these unattended RPA bot service accounts and SaaS users. When a bot is retired, CyberArk IGA Powered by Zilla can immediately find that account and review the access, making it a great tool for managing a large number of accounts.
What is most valuable?
CyberArk IGA Powered by Zilla's access reviews, audit report generation, and compliance features are excellent. It creates audit and compliance evidence easily, which previously required substantial manual effort, but now the process has become very straightforward.
The best feature is definitely the AI component, which includes evidence generation for audit and compliance, addressing one of our biggest challenges. We are able to easily gather all the details required by the audit team, and that is one of the best aspects. Additionally, being cloud-based means it is very easy to scale up without much downtime compared to our previous on-premises solution.
CyberArk IGA Powered by Zilla has positively impacted our organization by significantly reducing manual effort. We previously had many unnoticed non-human accounts that we could not deactivate due to their large number, but now that timeframe has drastically decreased, which is one of the greatest advantages. The AI-driven access reviews and automatic generation of compliance and audit documents are among the best features.
What needs improvement?
For improvement, I would suggest enhancing the reporting functionality of CyberArk IGA Powered by Zilla, as it could benefit from more customization or advanced filtering for auditing purposes. I have heard from colleagues that for some advanced policies, they are still approaching an Accenture vendor, likely due to existing difficulties.
The user interface could also be enhanced.
For how long have I used the solution?
I have been using the solution for the past one and a half years now.
What do I think about the stability of the solution?
CyberArk IGA Powered by Zilla is stable.
What do I think about the scalability of the solution?
CyberArk IGA Powered by Zilla demonstrates amazing scalability as a SaaS product in the cloud without any scalability issues.
How are customer service and support?
The support team of CyberArk IGA Powered by Zilla is very helpful; as soon as we create a ticket, they reach out quickly and provide immediate solutions, which is excellent.
Which solution did I use previously and why did I switch?
We previously used SailPoint, which was an on-premises solution.
How was the initial setup?
The deployment of CyberArk IGA Powered by Zilla took approximately two weeks in our organization.
This deployment was significantly faster compared to our previous on-premises solution.
What was our ROI?
I heard from the automation CoE team that we were able to save approximately $75,000 from that specific area, though I am uncertain if that is considered annual savings.
What's my experience with pricing, setup cost, and licensing?
I am not familiar with the pricing and licensing costs, but the setup of CyberArk IGA Powered by Zilla was straightforward since it was cloud-based compared to the previous on-premises tool, SailPoint.
What other advice do I have?
I would advise others considering CyberArk IGA Powered by Zilla that it is best for large enterprises with many accounts and a focus on compliance; if compliance is a significant concern for your organization, then it is definitely worth choosing. I provided this review with a rating of 9.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Automated access governance has simplified onboarding, mobility, and secure remote work
What is our primary use case?
The main use cases for CyberArk IGA Powered by Zilla include onboarding users when they are being recruited, as well as managing the moving and exiting processes. When a user like James moves from department A to department B, the IT team no longer needs to manually change roles and permissions to the resources James has access to. Instead, the system automatically provisions James with the new role he has been appointed with. Similarly, when James leaves the organization, all his privileges and resources are automatically revoked without the need to search and manually remove each access point.
Users also want to have a single sign-on capability so they do not have to log into multiple applications. They can sign in once and have access to all their applications such as Outlook, Salesforce, CRM solutions, and ERP solutions without logging in individually. The system logs them in automatically to each application.
Additionally, CyberArk IGA Powered by Zilla helps users work from anywhere, regardless of their location or country. Users do not need to be in their office geo-location to access applications or resources, which provides flexibility for accessing applications wherever they are. Furthermore, if an account gets locked, users can reset their password themselves by answering security questions instead of going through the admin process for approval and re-enabling the account.
What is most valuable?
CyberArk has a plethora of solutions including PAM, IGA, Secrets Management, and Remote Access. I personally participate in the deployment process.
The deployment time for CyberArk IGA Powered by Zilla is based on the size of the organization, whether it is an enterprise organization or a small medium business. For an organization looking at 1,005 to 2,000 users, the process begins with a scoping phase where information is gathered from the customer, which typically takes two to three days for the customer to populate the documentation. After the customer submits the scoping documents, I and the customer review what they submitted. Once the review is complete, we conduct a kick-off meeting and provide the project timelines to both the customer project manager and our project manager. The entire process should fall within four to five weeks, approximately one month to one month and a week. During the fourth week, the system is fine-tuned. The fifth week involves training and user acceptance testing (UAT) with the customer to confirm that what was requested has been delivered as promised. After UAT, the solution is handed over to the customer.
What needs improvement?
The challenges I face with the implementation of CyberArk IGA Powered by Zilla involve legacy applications and legacy systems, which sometimes present issues. Additionally, custom-built APIs that are not properly structured can be problematic, though CyberArk can help redefine them according to the customer's demands.
Integrating CyberArk IGA Powered by Zilla with banking applications such as T24 is very tough to accomplish. When working with the T24 core banking application, the T24 support team is not able to assist much, so I have to find a way to fix the issue myself. The difficulty is not related to the price but rather to the technical integration challenges with these specialized banking systems.
For how long have I used the solution?
I have worked with CyberArk IGA Powered by Zilla for the past three years, and I have worked with PAM for six years.
How are customer service and support?
The primary issue I have experienced with CyberArk IGA Powered by Zilla is related to support. Getting the right support in the right jurisdiction is somewhat challenging. Although CyberArk has resource people to work with, the time to resolve issues is problematic. When I send a request, they respond, but getting an actual time slot to work with the customer to resolve the issue sometimes delays. Occasionally, the customer becomes frustrated and seeks support from us, and we experience issues with the first level of support they receive. I rate CyberArk support at a six out of ten.
What about the implementation team?
I personally participate in the deployment process.
Which other solutions did I evaluate?
CyberArk IGA Powered by Zilla is expensive compared to One Identity IGA and BeyondTrust.
What other advice do I have?
CyberArk IGA Powered by Zilla is expensive when compared to One Identity IGA and BeyondTrust. My overall review rating for this product is an eight out of ten.
Identity governance has strengthened privileged access controls and supports ongoing compliance
What is our primary use case?
My use cases for CyberArk IGA Powered by Zilla are identity and access management and governance, focusing on identities and identity governance.
What is most valuable?
CyberArk IGA Powered by Zilla is primarily known for managing privileged access identities, including all privileged users such as admins and system admins. It has a very good record in management of these identities, as well as password management and access to other applications.
What needs improvement?
The first downside is that the central admin console can be improved. Additionally, there is a need for more access to customization.
CyberArk IGA Powered by Zilla is lacking in the governance side of identities compared to competitors. More risk management governance policies and features would be beneficial.
What do I think about the stability of the solution?
CyberArk IGA Powered by Zilla is a very stable product, and I do not see a lot of issues with it most of the time. As long as you are maintaining the patches and upgrades in time, the vault, which is the main central component, is very good. If it is implemented or deployed correctly, it is very good.
What do I think about the scalability of the solution?
CyberArk IGA Powered by Zilla is quite scalable, and it would depend on a good architect who has done the implementation correctly. You could definitely scale up or scale down.
How are customer service and support?
Maintenance has to be on your end. CyberArk will not do that unless you sign up for their support agreements. The type of support agreement or contract you have with them determines the level of support provided. They provide a lot of support resources such as a lab, discussion forums, and good documentation, which should cover most issues.
The quality of support is quite good. The type of support contract you have determines the response you receive. CyberArk probably has an SLA of within one business day for priority tickets. They have a good support team.
Which solution did I use previously and why did I switch?
I have used a lot of other products in the market, and there are definitely better leaders in this space. Such products include SailPoint, Saviynt, and Ping One. Those products are better than CyberArk IGA Powered by Zilla in some areas or overall.
How was the initial setup?
The initial deployment of CyberArk IGA Powered by Zilla is somewhere in the middle. CyberArk has a policy of having only certified individuals who are certified in the product working on deployments, so even though the person is new, they will be able to install this without any problems. However, it could be challenging if it is spread over a large installation or a complex architecture.
What about the implementation team?
A team is needed who will go into the requirements, understand the infrastructure, and come up with a project plan for the implementation. At least two to three people should be on the team initially.
What was our ROI?
Any deployment takes time to mature, and CyberArk IGA Powered by Zilla does provide benefits immediately in terms of quick adoption of finding out the privileged access identities by running through their crawler. Using crawler tools like DNA may help ease the effort quickly. However, some of the complex use cases will take time.
Which other solutions did I evaluate?
I am trying to compare CyberArk IGA Powered by Zilla with other IGA solutions and grading them. It is definitely a very good product, but at the same time, the IGA may require some improvement in some areas, which is why I am ranking it to eight.
What other advice do I have?
Customization involves making changes to fit customer requirements. Maintenance usually involves sometimes having issues with different connectors, mostly the Active Directory and LDAP connectors. Periodic aggregation of accounts and applications sometimes go through issues with firewalls. Sometimes they do not work, and you need to make sure your connectors are all in sync, especially your LDAP and AD connectors. Sometimes there could be some issues occurring between these two connectors, so there will be maintenance on that side, making sure they are working on a regular basis based on your monitoring plan. Taking backups regularly and periodic backups are essential.
Both the support rating and the overall product rating for CyberArk IGA Powered by Zilla is eight out of ten. Eight means they have complete processes in place to help support, they have resources available, and there is a method to contact them and get response quickly. In that regard, eight is appropriate because they reuse some of their main PAM components which is very good, and compared to other products which I ranked around nine, they should be at eight.