

OpenText Identity Governance and CyberArk IGA Powered by Zilla compete in the identity governance space. CyberArk IGA Powered by Zilla may have an upper hand due to its comprehensive features and advanced integration capabilities, appealing to organizations requiring advanced solutions.
Features: OpenText Identity Governance provides robust access request management and compliance reporting, making it suitable for organizations with strict regulatory requirements. It offers effective role management for scalable governance and maintains powerful reporting capabilities to ensure audit readiness. CyberArk IGA Powered by Zilla shines with identity lifecycle management, seamlessly integrating with existing frameworks, while its advanced analytics enhances decision-making processes. It supports dynamic provisioning, aligning access levels to organizational changes automatically.
Room for Improvement: OpenText Identity Governance could enhance its user interface for more intuitive navigation and improve configurability to meet specific enterprise needs. Expanding third-party integrations would bolster its ecosystem connectivity. CyberArk IGA Powered by Zilla could benefit from streamlining its setup process to minimize deployment time. Further refining user training materials would decrease learning curves and enhance user adoption rates. Expanding integration templates can facilitate smoother interoperability with diverse environments.
Ease of Deployment and Customer Service: OpenText Identity Governance is known for an uncomplicated deployment process coupled with responsive customer support, ensuring rapid adoption. CyberArk IGA Powered by Zilla is praised for its efficient deployment tailored to organizational size, accompanied by technically proficient customer service that effectively resolves complex issues, improving user satisfaction.
Pricing and ROI: OpenText Identity Governance offers competitive pricing, delivering strong ROI through lower setup costs, making it accessible to a wider range of businesses. In contrast, CyberArk IGA Powered by Zilla requires higher initial investments, justified by its powerful features which promise significant long-term ROI, catering to large enterprises seeking comprehensive identity management solutions.
The main benefit of using CyberArk IGA Powered by Zilla comes from reduced manual effort and faster access validation during investigations, which improves efficiency and reduces risks related to over-privileged accounts.
Any deployment takes time to mature, and CyberArk IGA Powered by Zilla does provide benefits immediately in terms of quick adoption of finding out the privileged access identities by running through their crawler.
I heard from the automation CoE team that we were able to save approximately $75,000 from that specific area.
The type of support agreement or contract you have with them determines the level of support provided.
When I send a request, they respond, but getting an actual time slot to work with the customer to resolve the issue sometimes delays.
As soon as we create a ticket, they reach out quickly and provide immediate solutions.
For larger environments using CyberArk IGA Powered by Zilla, scalability depends on the integration environment being implemented and the skill set behind it.
CyberArk IGA Powered by Zilla is scalable and has the capability to handle growth or an increased number of users very well.
It is quite scalable, and we can definitely scale up or scale down.
As long as you are maintaining the patches and upgrades in time, the vault, which is the main central component, is very good.
In my experience, CyberArk IGA Powered by Zilla is stable, and I have not encountered any downtime or reliability issues.
CyberArk IGA Powered by Zilla is quite stable, with no experience of data breaches or leakage.
Integrating CyberArk IGA Powered by Zilla with banking applications such as T24 is very tough to accomplish.
I would suggest enhancing the reporting functionality of CyberArk IGA Powered by Zilla, as it could benefit from more customization or advanced filtering for auditing purposes.
Faster access to required information during investigations and better integration with other security tools would enhance the experience and help the SOC teams correlate alerts more efficiently.
My experience with the licensing cost shows that CyberArk is never reasonable on pricing.
Opting for multi-year subscriptions can be more economical.
I am not familiar with the pricing and licensing costs, but the setup of CyberArk IGA Powered by Zilla was straightforward since it was cloud-based compared to the previous on-premises tool, SailPoint.
The best feature is definitely the AI component, which includes evidence generation for audit and compliance, addressing one of our biggest challenges.
The functionalities of CyberArk PAM include monitoring of activities, which are recorded live for auditing purposes, and it integrates into almost every environment seamlessly.
CyberArk IGA Powered by Zilla has positively impacted my organization by improving visibility into user access and reducing the risk of over-privileged accounts, which can affect costs for us and our clients.
| Product | Mindshare (%) |
|---|---|
| CyberArk IGA Powered by Zilla | 2.0% |
| OpenText Identity Governance | 1.5% |
| Other | 96.5% |


| Company Size | Count |
|---|---|
| Small Business | 3 |
| Midsize Enterprise | 1 |
| Large Enterprise | 5 |
| Company Size | Count |
|---|---|
| Small Business | 9 |
CyberArk IGA Powered by Zilla is designed to streamline identity governance and administration by automating access controls and compliance processes, enhancing security and efficiency.
Known for its robust capabilities, CyberArk IGA Powered by Zilla offers comprehensive identity governance that simplifies policy enforcement and compliance management. It enables organizations to efficiently manage user access, reducing risks and ensuring secure operations. By leveraging automation, it minimizes manual tasks and enhances productivity.
What are the key features?
Which benefits or ROI should users consider?
CyberArk IGA Powered by Zilla is implemented across industries such as finance and healthcare, where regulatory compliance and data protection are critical. It helps organizations enhance their security postures while ensuring compliance with industry standards.
OpenText Identity Governance provides robust access review capabilities, risk analysis, and intuitive dashboards. Its advanced role mining and dynamic grouping ensure efficient access management, supporting compliance through separations of duties.
OpenText Identity Governance enhances access management and auditing processes through features such as role mining, access certification, and separations of duties that support efficient management protocols. Though it excels in stability, scalability, and integration with Identity Management solutions, it requires improvements in installation, Workflow Designer, and cloud application connectors. Addressing stability issues and offering enhanced Identity Intelligence features are essential for competitive edge. The governance tool leverages automated reporting and approval workflows, aiding large environments in streamlining management tasks. Its ability to integrate closely with NetIQ Identity Manager facilitates internal audits, particularly in banking and governmental sectors.
What are the key features?OpenText Identity Governance sees deployment in industries like banking and government, where auditing and access management are critical. It aids in permission management and account discovery, utilized notably in regions such as Chile and Argentina. Organizations benefit from its integration with NetIQ Identity Manager to ensure proper account activation and deactivation, ultimately facilitating sector-specific compliance and auditing tasks.
We monitor all Identity Management (IM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.