Try our new research platform with insights from 80,000+ expert users

AuthMind vs CyberArk IGA Powered by Zilla comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

AuthMind
Average Rating
0.0
Number of Reviews
0
Ranking in other categories
Identity Threat Detection and Response (ITDR) (20th)
CyberArk IGA Powered by Zilla
Average Rating
8.6
Reviews Sentiment
7.3
Number of Reviews
3
Ranking in other categories
Identity Management (IM) (16th), Identity and Access Management as a Service (IDaaS) (IAMaaS) (17th)
 

Mindshare comparison

AuthMind and CyberArk IGA Powered by Zilla aren’t in the same category and serve different purposes. AuthMind is designed for Identity Threat Detection and Response (ITDR) and holds a mindshare of 1.2%, up 0.7% compared to last year.
CyberArk IGA Powered by Zilla, on the other hand, focuses on Identity Management (IM), holds 1.8% mindshare, up 0.7% since last year.
Identity Threat Detection and Response (ITDR) Market Share Distribution
ProductMarket Share (%)
AuthMind1.2%
CrowdStrike Falcon13.4%
Microsoft Defender for Identity11.1%
Other74.3%
Identity Threat Detection and Response (ITDR)
Identity Management (IM) Market Share Distribution
ProductMarket Share (%)
CyberArk IGA Powered by Zilla1.8%
SailPoint Identity Security Cloud14.6%
Microsoft Entra ID9.3%
Other74.3%
Identity Management (IM)
 

Featured Reviews

Use AuthMind?
Leave a review
reviewer2795934 - PeerSpot reviewer
Associate Director at a legal firm with 10,001+ employees
Identity governance has strengthened privileged access controls and supports ongoing compliance
Customization involves making changes to fit customer requirements. Maintenance usually involves sometimes having issues with different connectors, mostly the Active Directory and LDAP connectors. Periodic aggregation of accounts and applications sometimes go through issues with firewalls. Sometimes they do not work, and you need to make sure your connectors are all in sync, especially your LDAP and AD connectors. Sometimes there could be some issues occurring between these two connectors, so there will be maintenance on that side, making sure they are working on a regular basis based on your monitoring plan. Taking backups regularly and periodic backups are essential. Both the support rating and the overall product rating for CyberArk IGA Powered by Zilla is eight out of ten. Eight means they have complete processes in place to help support, they have resources available, and there is a method to contact them and get response quickly. In that regard, eight is appropriate because they reuse some of their main PAM components which is very good, and compared to other products which I ranked around nine, they should be at eight.
report
Use our free recommendation engine to learn which Identity Threat Detection and Response (ITDR) solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Security Firm
21%
Financial Services Firm
13%
Retailer
7%
Insurance Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

Ask a question
Earn 20 points
What is your experience regarding pricing and costs for Zilla Security?
It has been fair because we have been in from the beginning or close to the beginning. I know it is not truly an identity access management system yet, but its price was one of the appealing factor...
What needs improvement with Zilla Security?
There is still no automated way to de-provision access due to a review completion, but they are getting there in terms of making it unified. Right now it is just a one-way integration, importing us...
What is your primary use case for Zilla Security?
We use the tool for access reviews. It is mainly for our regulatory SOX compliance. That was the main use case, and why we purchased Zilla back at the end of 2021.
 

Also Known As

No data available
Zilla Security
 

Overview

Find out what your peers are saying about CrowdStrike, Microsoft, Huntress and others in Identity Threat Detection and Response (ITDR). Updated: December 2025.
881,082 professionals have used our research since 2012.