Try our new research platform with insights from 80,000+ expert users

CyberArk IGA Powered by Zilla vs Saviynt comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 4, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk IGA Powered by Zilla
Ranking in Identity Management (IM)
16th
Average Rating
8.6
Reviews Sentiment
7.3
Number of Reviews
3
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (17th)
Saviynt
Ranking in Identity Management (IM)
5th
Average Rating
7.4
Reviews Sentiment
6.2
Number of Reviews
27
Ranking in other categories
User Provisioning Software (3rd), Privileged Access Management (PAM) (7th), Identity Threat Detection and Response (ITDR) (8th), Identity and Access Management (1st), Identity Security and Posture Management (ISPM) (1st)
 

Mindshare comparison

As of January 2026, in the Identity Management (IM) category, the mindshare of CyberArk IGA Powered by Zilla is 1.8%, up from 0.7% compared to the previous year. The mindshare of Saviynt is 6.4%, down from 8.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity Management (IM) Market Share Distribution
ProductMarket Share (%)
Saviynt6.4%
CyberArk IGA Powered by Zilla1.8%
Other91.8%
Identity Management (IM)
 

Featured Reviews

reviewer2795934 - PeerSpot reviewer
Associate Director at a legal firm with 10,001+ employees
Identity governance has strengthened privileged access controls and supports ongoing compliance
Customization involves making changes to fit customer requirements. Maintenance usually involves sometimes having issues with different connectors, mostly the Active Directory and LDAP connectors. Periodic aggregation of accounts and applications sometimes go through issues with firewalls. Sometimes they do not work, and you need to make sure your connectors are all in sync, especially your LDAP and AD connectors. Sometimes there could be some issues occurring between these two connectors, so there will be maintenance on that side, making sure they are working on a regular basis based on your monitoring plan. Taking backups regularly and periodic backups are essential. Both the support rating and the overall product rating for CyberArk IGA Powered by Zilla is eight out of ten. Eight means they have complete processes in place to help support, they have resources available, and there is a method to contact them and get response quickly. In that regard, eight is appropriate because they reuse some of their main PAM components which is very good, and compared to other products which I ranked around nine, they should be at eight.
reviewer2774067 - PeerSpot reviewer
Software Engineer at a tech consulting company with 11-50 employees
Has reduced manual work and shortened project timelines through faster deployment and intuitive workflows
One of the challenges regarding Saviynt is the lack of material available on the web, as searching on Google or YouTube often yields little information. Advertising Saviynt is necessary because I was not aware of it a couple of months ago, and it is a very helpful product for many organizations. In India, IGA solutions are not widely recognized, and Saviynt can utilize this point by promoting itself in the cybersecurity field. A significant challenge is the lack of people discussing Saviynt in the open market, as the forums provide slower responses compared to platforms like Reddit. Advancements related to AI would be very helpful. Saviynt should provide pricing for their university certifications, which is currently not publicly available. Information about enrolling requires an ID that is not easily obtained, as it can only be acquired through an organization. Some small wishlist features are related to APIs. As I work on projects, I find certain features to be much needed, but at a glance, they may not seem necessary. As I continue working with Saviynt, these small API-related features become apparent and would greatly enhance the experience.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I enjoy the ease of setup and creation of a review. Being a user of the tool or kind of an admin of the tool, the ease of setup of an access review is valuable."
"We had these spreadsheets all over the place, but now we have a library of evidence to consult when needed. Zilla keeps everything in one place. It's not scattered all over anymore."
"CyberArk IGA Powered by Zilla is a very stable product, and I do not see a lot of issues with it most of the time."
"We have found the implementation process to be very easy."
"Saviynt has positively impacted my organization by significantly reducing the time for a project where we previously used a spreadsheet for manual work to keep the data."
"It gives very good and in-depth knowledge about a particular identity. Everything is through a single click. We get to know the workflows related to a particular identity with a single click."
"One of the tool's advantages is its user-friendly interface, making it easier to manipulate from a GUI perspective. The graphical user interface for users and administrators is straightforward. While it may require more configuration initially, once set up, it becomes more accessible and easier to use."
"It is a flexible tool because it works on JSON."
"The repository has many features where you can define primary and secondary owners."
"Some of the self-service capabilities are quite powerful."
"It is very easy to use. It addresses most of the trends in identity governance and risk management."
 

Cons

"Maybe this is coming with their AI module, but I would like to see a feature that performs baseline analysis of permissions that may not fit into a role, and it attempts to group them into a role. We've run into problems with applications where someone has not created a role but assigned ad hoc permissions to a user. We still need to do some manual work to identify the group that the user belongs to. It would be amazing to have Zilla streamline that."
"There is still no automated way to de-provision access as a result of a review, but they are getting there in terms of making it unified. They are getting closer to that."
"CyberArk IGA Powered by Zilla is lacking in the governance side of identities compared to competitors."
"The tool is difficult to migrate."
"The company needs to do more to establish standard practices within the product itself that are common in the industry."
"The main difficulty was the integration process itself. But we were able to kind of work through it and fix it. We tried integrating with our HR system and other IBM solutions, like Microsoft Identity Management."
"According to feedback I've received, some users prefer SailPoint over Saviynt in real complex environments. SailPoint has its provisioning platform. Complex integrations may pose challenges in scenarios like a large bank with thousands of users, making SailPoint a preferred choice for some."
"The biggest drawback is that for every change you want to make, you have to go back to them and ask for it."
"Compared to other vendors, Saviynt's Privileged Access Management feature is not complete."
"Considering the shortcomings of the tool, I would say that the training part of the product needs improvement."
"One of the challenges regarding Saviynt is the lack of material available on the web, as searching on Google or YouTube often yields little information."
 

Pricing and Cost Advice

"It has been fair because we have been in from the beginning or close to the beginning. I know it is not truly an identity access management system yet, but its price was one of the appealing factors for us to purchase it at the time. It was reasonably priced."
"If you are investing in securing your data and avoiding any non-compliance issues, then yes, it is certainly recommended. To put it plainly, if you're willing to pay fines and aren't concerned about the misuse of data, then there might not be a problem. However, if you intend to safeguard the data of your employees, vendors, and customers, it becomes crucial. In this context, managing data security requires preventive and detective measures, such as enforcing segregation of duties and regularly reviewing permissions. Throughout an individual's life cycle within an organization or customer life cycle, various access permissions are granted. Without taking action on these permissions, there is a risk of exposure later on. If individuals retain access after leaving the organization, it poses a serious security threat. Implementing solutions like Saviynt can address these challenges, ensuring continuous access review, generating reports, alerts, and identifying potential risks."
"Saviynt's pricing is acceptable and licensing costs are yearly."
"Saviynt's pricing is reasonable."
"The price of the license for this product is quite expensive."
"We are not into the licensing part. The clients take care of the licensing part."
"If you need to make any changes then there are additional fees."
"Saviynt has a competitive price."
"The solution has a pay-as-you-go licensing model, and you can subscribe monthly or yearly."
report
Use our free recommendation engine to learn which Identity Management (IM) solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Security Firm
21%
Financial Services Firm
13%
Retailer
7%
Insurance Company
6%
Financial Services Firm
16%
Computer Software Company
8%
Manufacturing Company
8%
Healthcare Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise5
Large Enterprise15
 

Questions from the Community

What is your experience regarding pricing and costs for Zilla Security?
It has been fair because we have been in from the beginning or close to the beginning. I know it is not truly an identity access management system yet, but its price was one of the appealing factor...
What needs improvement with Zilla Security?
There is still no automated way to de-provision access due to a review completion, but they are getting there in terms of making it unified. Right now it is just a one-way integration, importing us...
What is your primary use case for Zilla Security?
We use the tool for access reviews. It is mainly for our regulatory SOX compliance. That was the main use case, and why we purchased Zilla back at the end of 2021.
What do you like most about Saviynt?
It is very easy to use. It addresses most of the trends in identity governance and risk management.
What is your experience regarding pricing and costs for Saviynt?
Saviynt is very affordable compared to its competitors. It is cloud-based, making it significantly cheaper than on-premises solutions. This cost-effectiveness aligns well with the Saudi market, whe...
What needs improvement with Saviynt?
One of the challenges regarding Saviynt is the lack of material available on the web, as searching on Google or YouTube often yields little information. Advertising Saviynt is necessary because I w...
 

Also Known As

Zilla Security
No data available
 

Overview

 

Sample Customers

Information Not Available
Shell, McKesson, Kimberly-Clark, Ingram Micro, Intermountain Health Care, Forterra, CoreLogic
Find out what your peers are saying about CyberArk IGA Powered by Zilla vs. Saviynt and other solutions. Updated: December 2025.
881,082 professionals have used our research since 2012.