Try our new research platform with insights from 80,000+ expert users

AuthMind vs CyberArk IGA Powered by Zilla comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

AuthMind
Average Rating
0.0
Number of Reviews
0
Ranking in other categories
Identity Threat Detection and Response (ITDR) (20th)
CyberArk IGA Powered by Zilla
Average Rating
8.6
Reviews Sentiment
7.3
Number of Reviews
3
Ranking in other categories
Identity Management (IM) (16th), Identity and Access Management as a Service (IDaaS) (IAMaaS) (17th)
 

Mindshare comparison

AuthMind and CyberArk IGA Powered by Zilla aren’t in the same category and serve different purposes. AuthMind is designed for Identity Threat Detection and Response (ITDR) and holds a mindshare of 1.1%, up 0.8% compared to last year.
CyberArk IGA Powered by Zilla, on the other hand, focuses on Identity Management (IM), holds 2.0% mindshare, up 0.8% since last year.
Identity Threat Detection and Response (ITDR) Market Share Distribution
ProductMarket Share (%)
AuthMind1.1%
CrowdStrike Falcon12.8%
Microsoft Defender for Identity10.4%
Other75.7%
Identity Threat Detection and Response (ITDR)
Identity Management (IM) Market Share Distribution
ProductMarket Share (%)
CyberArk IGA Powered by Zilla2.0%
SailPoint Identity Security Cloud13.7%
Microsoft Entra ID8.9%
Other75.4%
Identity Management (IM)
 

Featured Reviews

Use AuthMind?
Leave a review
reviewer2795934 - PeerSpot reviewer
Associate Director at a legal firm with 10,001+ employees
Identity governance has strengthened privileged access controls and supports ongoing compliance
Customization involves making changes to fit customer requirements. Maintenance usually involves sometimes having issues with different connectors, mostly the Active Directory and LDAP connectors. Periodic aggregation of accounts and applications sometimes go through issues with firewalls. Sometimes they do not work, and you need to make sure your connectors are all in sync, especially your LDAP and AD connectors. Sometimes there could be some issues occurring between these two connectors, so there will be maintenance on that side, making sure they are working on a regular basis based on your monitoring plan. Taking backups regularly and periodic backups are essential. Both the support rating and the overall product rating for CyberArk IGA Powered by Zilla is eight out of ten. Eight means they have complete processes in place to help support, they have resources available, and there is a method to contact them and get response quickly. In that regard, eight is appropriate because they reuse some of their main PAM components which is very good, and compared to other products which I ranked around nine, they should be at eight.
report
Use our free recommendation engine to learn which Identity Threat Detection and Response (ITDR) solutions are best for your needs.
881,707 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Security Firm
21%
Financial Services Firm
14%
Retailer
7%
Insurance Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

Ask a question
Earn 20 points
What is your experience regarding pricing and costs for Zilla Security?
It has been fair because we have been in from the beginning or close to the beginning. I know it is not truly an identity access management system yet, but its price was one of the appealing factor...
What needs improvement with Zilla Security?
The first downside is that the central admin console can be improved. Additionally, there is a need for more access to customization. CyberArk IGA Powered by Zilla is lacking in the governance side...
What is your primary use case for Zilla Security?
My use cases for CyberArk IGA Powered by Zilla are identity and access management and governance, focusing on identities and identity governance.
 

Also Known As

No data available
Zilla Security
 

Overview

Find out what your peers are saying about CrowdStrike, Microsoft, Huntress and others in Identity Threat Detection and Response (ITDR). Updated: January 2026.
881,707 professionals have used our research since 2012.