

RSA Identity Governance and Lifecycle and CyberArk IGA Powered by Zilla compete in the identity governance market. RSA seems to have the upper hand in ease of deployment and cost-effectiveness, while CyberArk holds a advantage in security and integration capabilities.
Features: RSA Identity Governance and Lifecycle is noted for efficient access review, role management, and policy enforcement. Its streamlined management capabilities make it appealing for organizations seeking simplicity. CyberArk IGA Powered by Zilla stands out for its robust security measures, seamless integration with existing infrastructures, and advanced compliance features.
Room for Improvement: RSA Identity Governance and Lifecycle could improve its cloud accessibility and multi-tenancy options, as well as its customization capabilities. The interface, although user-friendly, may benefit from enhanced graphical dashboards. For CyberArk IGA Powered by Zilla, the deployment process could be simplified, and the product could offer more preset configurations to reduce initial setup time. Improved user training resources and documentation could also enhance its user adoption.
Ease of Deployment and Customer Service: RSA Identity Governance and Lifecycle offers straightforward deployment and is praised for its supportive customer service. CyberArk IGA Powered by Zilla, though having a more complex deployment process, offers strong customer support and specialized assistance for complex integrations.
Pricing and ROI: RSA Identity Governance and Lifecycle is viewed as cost-effective with a satisfactory ROI due to its competitive pricing. CyberArk IGA Powered by Zilla, despite higher initial setup costs, delivers long-term ROI through its advanced capabilities and enhanced security benefits.
| Product | Mindshare (%) |
|---|---|
| CyberArk IGA Powered by Zilla | 2.0% |
| RSA Identity Governance and Lifecycle | 1.1% |
| Other | 96.9% |


| Company Size | Count |
|---|---|
| Small Business | 3 |
| Midsize Enterprise | 1 |
| Large Enterprise | 5 |
| Company Size | Count |
|---|---|
| Small Business | 2 |
| Midsize Enterprise | 2 |
| Large Enterprise | 6 |
CyberArk IGA Powered by Zilla is designed to streamline identity governance and administration by automating access controls and compliance processes, enhancing security and efficiency.
Known for its robust capabilities, CyberArk IGA Powered by Zilla offers comprehensive identity governance that simplifies policy enforcement and compliance management. It enables organizations to efficiently manage user access, reducing risks and ensuring secure operations. By leveraging automation, it minimizes manual tasks and enhances productivity.
What are the key features?
Which benefits or ROI should users consider?
CyberArk IGA Powered by Zilla is implemented across industries such as finance and healthcare, where regulatory compliance and data protection are critical. It helps organizations enhance their security postures while ensuring compliance with industry standards.
RSA Identity Governance and Lifecycle aids efficient identity management, offering synchronization with Active Directory for seamless setups and enhancing security with two-factor authentication.
RSA Identity Governance and Lifecycle streamlines identity management from initiation to off-boarding, focusing on role-based access control and application integration. Despite requiring on-premise deployment, it provides advanced policy features for segregation of duties and access management. Performance issues arise with large file sizes, and there is limited integration with some third-party applications. Users benefit from custom forms, workflows, and an intuitive portal that eases the user's experience. While improvements are needed in database integration and multi-tenant capabilities, the solution remains popular for its auditing and certification support.
What are the key features of RSA Identity Governance and Lifecycle?RSA Identity Governance and Lifecycle is utilized in sectors managing digital identities, with deployment options on AWS, either on the cloud or on-premise. It assists organizations in handling joiner, mover, and leaver processes, adapting to business-specific needs while adding authentication layers to network access.
We monitor all Identity Management (IM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.