

One Identity Manager and CyberArk IGA Powered by Zilla compete in the identity and access management category. Based on the data comparisons, CyberArk seems to have the upper hand due to its strong security reputation and seamless integration capabilities.
Features: One Identity Manager provides robust access request and approval, centralized management, and role-based access control, ensuring enhanced security. CyberArk IGA Powered by Zilla excels in seamless integration into multiple environments, high security with privileged access management, and its ability to work effectively in cloud-based setups.
Room for Improvement: One Identity Manager needs a more user-friendly interface and simplified customization processes, with challenges noted particularly in cloud integration. CyberArk IGA Powered by Zilla could improve automation for de-provisioning and governance features, and users suggest enhanced customization and more comprehensive risk management governance policies.
Ease of Deployment and Customer Service: One Identity Manager is primarily for on-premises environments, suitable for extensive customization but having a complex setup process. Customer service varies in responsiveness, with premier support offering better experiences. CyberArk, being cloud-based, provides smoother deployment and easier setup, though user reviews highlight mixed experiences with manual intervention. Its customer support is stable and reliable.
Pricing and ROI: One Identity Manager is cost-effective over time, though initial setup costs are higher. Its flexible but complex licensing suits enterprise-scale needs where cost efficiency manifests over time. CyberArk, while praised for security, is considered expensive due to pricing based on administrator users rather than integrated environments, making proper access management key for cost control.
The main benefit of using CyberArk IGA Powered by Zilla comes from reduced manual effort and faster access validation during investigations, which improves efficiency and reduces risks related to over-privileged accounts.
Any deployment takes time to mature, and CyberArk IGA Powered by Zilla does provide benefits immediately in terms of quick adoption of finding out the privileged access identities by running through their crawler.
I heard from the automation CoE team that we were able to save approximately $75,000 from that specific area.
Without it, we would need thousands of additional people.
Instead of spending on various systems, having one centralized system that handles all my organizational requirements helps save money.
Several users reported reduced onboarding and offboarding times by around 40% thanks to automated provisioning and de-provisioning.
The type of support agreement or contract you have with them determines the level of support provided.
When I send a request, they respond, but getting an actual time slot to work with the customer to resolve the issue sometimes delays.
As soon as we create a ticket, they reach out quickly and provide immediate solutions.
If you have outages or critical production problems, you can count on the manufacturer to help resolve the situation.
They should focus on bringing in technically skilled individuals who understand the tools and technologies involved.
Compared to my experiences with other tools, their support is exemplary.
For larger environments using CyberArk IGA Powered by Zilla, scalability depends on the integration environment being implemented and the skill set behind it.
It is quite scalable, and we can definitely scale up or scale down.
CyberArk IGA Powered by Zilla is quite scalable, and it would depend on a good architect who has done the implementation correctly.
It is architected so that key components can be scaled both horizontally and vertically to handle increasing loads from employee accounts to millions of external identities if needed.
Generally, if we need to add thousands of new users, we can ramp up container resources effectively.
We could handle about 1,00,000 records for different users.
As long as you are maintaining the patches and upgrades in time, the vault, which is the main central component, is very good.
In my experience, CyberArk IGA Powered by Zilla is stable, and I have not encountered any downtime or reliability issues.
One Identity Manager is considered stable and dependable for enterprise identity management with a strong track record of uptime and reliability when implemented correctly.
I would rate it a nine out of ten for stability.
Specifically affecting the test and development environments, not the production environment.
Integrating CyberArk IGA Powered by Zilla with banking applications such as T24 is very tough to accomplish.
I would suggest enhancing the reporting functionality of CyberArk IGA Powered by Zilla, as it could benefit from more customization or advanced filtering for auditing purposes.
Faster access to required information during investigations and better integration with other security tools would enhance the experience and help the SOC teams correlate alerts more efficiently.
This lack of 24-hour support is problematic from a testing and development standpoint.
It is crucial for them to expand their support team to match their product's success.
When it comes to privileged access management, we need to know who has access to what, which is the central problem we want to solve.
My experience with the licensing cost shows that CyberArk is never reasonable on pricing.
I am not familiar with the pricing and licensing costs, but the setup of CyberArk IGA Powered by Zilla was straightforward since it was cloud-based compared to the previous on-premises tool, SailPoint.
No challenges were faced in the pricing and setup cost.
On-premises might incur higher costs.
We have a good enterprise license agreement, and we are very happy with what we get for the price we pay for it.
Many customers find it fair and reasonable for enterprise use, though it can be expensive for smaller organizations due to total licensing and implementation cost.
The best feature is definitely the AI component, which includes evidence generation for audit and compliance, addressing one of our biggest challenges.
The functionalities of CyberArk PAM include monitoring of activities, which are recorded live for auditing purposes, and it integrates into almost every environment seamlessly.
CyberArk IGA Powered by Zilla has positively impacted my organization by improving visibility into user access and reducing the risk of over-privileged accounts, which can affect costs for us and our clients.
It ensures high security through multiple approval processes, preventing unauthorized access and enhancing compliance by providing time-based access for privileged accounts with proper audit trails.
It continuously monitors user behavior in real-time, triggering automated responses, and manages secure access for both on-premises and cloud applications using protocols such as SAML.
Once you have some experience, it demonstrates best practices and guides you on the correct way to use the tool.
| Product | Mindshare (%) |
|---|---|
| One Identity Manager | 10.6% |
| CyberArk IGA Powered by Zilla | 4.9% |
| Other | 84.5% |

| Company Size | Count |
|---|---|
| Small Business | 2 |
| Midsize Enterprise | 1 |
| Large Enterprise | 4 |
| Company Size | Count |
|---|---|
| Small Business | 61 |
| Midsize Enterprise | 26 |
| Large Enterprise | 103 |
CyberArk IGA Powered by Zilla is designed to streamline identity governance and administration by automating access controls and compliance processes, enhancing security and efficiency.
Known for its robust capabilities, CyberArk IGA Powered by Zilla offers comprehensive identity governance that simplifies policy enforcement and compliance management. It enables organizations to efficiently manage user access, reducing risks and ensuring secure operations. By leveraging automation, it minimizes manual tasks and enhances productivity.
What are the key features?
Which benefits or ROI should users consider?
CyberArk IGA Powered by Zilla is implemented across industries such as finance and healthcare, where regulatory compliance and data protection are critical. It helps organizations enhance their security postures while ensuring compliance with industry standards.
One Identity Manager is a value-added and trusted active directory management and user provisioning software solution. One Identity Manager administers and protects an organization’s data and users, minimizes threats, and ensures that compliance regulations are consistently satisfied.
Users will have access to the data and applications they need when they need them. One Identity can be used on premises, in the cloud, and also with hybrid options. One Identity Manager is able to easily combine strict governance compliance regulations and rigorous security protocols to keep business enterprises secure and functional today and into the future. One Identity Manager is also a robust, scalable identity governance and administration (IGA) solution. The solution is designed to meet the changing needs of a growing dynamic business enterprise, and not be limited or left vulnerable by IT department constricts.
One Identity consistently provides robust security solutions that facilitate a strong secure enterprise where the users, applications, and critical data are safe and secure. The unified identity security platform provides identity governance and administration (IGA), privileged access management (PAM), active directory management and security (ADMS), and identity and access management (IAM) processes to ensure an aggressive stance on security for today’s dynamic enterprise organizations.
One Identity is used by more than 11,000 organizations worldwide managing over five hundred million plus identities.
One Identity Manager Features
Reviews from Real Users
“The initial setup process for an employee is straightforward. We set up processes for user accounts and we can add other processes to them. Our goal is to automate all user-permission and user-administration processes with One Identity and we are doing that more and more.” - Marc H., IT Architect at a tech services company
“The most valuable features are that it has a lot of capabilities, can integrate with a lot of systems, including automated onboarding like CyberArk, and allows you to integrate different entities.” - Security Consultant at a financial services firm
We monitor all Identity Governance Administration (IGA) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.