Try our new research platform with insights from 80,000+ expert users

CyberArk IGA Powered by Zilla vs Saviynt comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 4, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk IGA Powered by Zilla
Ranking in Identity Management (IM)
16th
Average Rating
8.6
Reviews Sentiment
7.3
Number of Reviews
3
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (17th)
Saviynt
Ranking in Identity Management (IM)
8th
Average Rating
7.4
Reviews Sentiment
6.2
Number of Reviews
27
Ranking in other categories
User Provisioning Software (3rd), Privileged Access Management (PAM) (10th), Identity Threat Detection and Response (ITDR) (10th), Identity and Access Management (2nd), Identity Security and Posture Management (ISPM) (1st)
 

Mindshare comparison

As of February 2026, in the Identity Management (IM) category, the mindshare of CyberArk IGA Powered by Zilla is 2.0%, up from 0.8% compared to the previous year. The mindshare of Saviynt is 6.4%, down from 8.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity Management (IM) Market Share Distribution
ProductMarket Share (%)
Saviynt6.4%
CyberArk IGA Powered by Zilla2.0%
Other91.6%
Identity Management (IM)
 

Featured Reviews

reviewer2795934 - PeerSpot reviewer
Associate Director at a legal firm with 10,001+ employees
Identity governance has strengthened privileged access controls and supports ongoing compliance
Customization involves making changes to fit customer requirements. Maintenance usually involves sometimes having issues with different connectors, mostly the Active Directory and LDAP connectors. Periodic aggregation of accounts and applications sometimes go through issues with firewalls. Sometimes they do not work, and you need to make sure your connectors are all in sync, especially your LDAP and AD connectors. Sometimes there could be some issues occurring between these two connectors, so there will be maintenance on that side, making sure they are working on a regular basis based on your monitoring plan. Taking backups regularly and periodic backups are essential. Both the support rating and the overall product rating for CyberArk IGA Powered by Zilla is eight out of ten. Eight means they have complete processes in place to help support, they have resources available, and there is a method to contact them and get response quickly. In that regard, eight is appropriate because they reuse some of their main PAM components which is very good, and compared to other products which I ranked around nine, they should be at eight.
reviewer2774067 - PeerSpot reviewer
Software Engineer at a tech consulting company with 11-50 employees
Has reduced manual work and shortened project timelines through faster deployment and intuitive workflows
One of the challenges regarding Saviynt is the lack of material available on the web, as searching on Google or YouTube often yields little information. Advertising Saviynt is necessary because I was not aware of it a couple of months ago, and it is a very helpful product for many organizations. In India, IGA solutions are not widely recognized, and Saviynt can utilize this point by promoting itself in the cybersecurity field. A significant challenge is the lack of people discussing Saviynt in the open market, as the forums provide slower responses compared to platforms like Reddit. Advancements related to AI would be very helpful. Saviynt should provide pricing for their university certifications, which is currently not publicly available. Information about enrolling requires an ID that is not easily obtained, as it can only be acquired through an organization. Some small wishlist features are related to APIs. As I work on projects, I find certain features to be much needed, but at a glance, they may not seem necessary. As I continue working with Saviynt, these small API-related features become apparent and would greatly enhance the experience.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"CyberArk IGA Powered by Zilla is a very stable product, and I do not see a lot of issues with it most of the time."
"I enjoy the ease of setup and creation of a review. Being a user of the tool or kind of an admin of the tool, the ease of setup of an access review is valuable."
"We had these spreadsheets all over the place, but now we have a library of evidence to consult when needed. Zilla keeps everything in one place. It's not scattered all over anymore."
"Based on my experience working with Saviynt, they deserve a rating of nine because they are very responsive to support."
"Saviynt has positively impacted my organization by significantly reducing the time for a project where we previously used a spreadsheet for manual work to keep the data."
"It is a flexible tool because it works on JSON."
"Some of the self-service capabilities are quite powerful."
"Saviynt is used for the greenfield implementation for the whole IAM, IGA, MFA, SSO, and access management."
"The product has a great attestation feature."
"The feature that we use the most is the global, third-party user management."
"It gives very good and in-depth knowledge about a particular identity. Everything is through a single click. We get to know the workflows related to a particular identity with a single click."
 

Cons

"There is still no automated way to de-provision access as a result of a review, but they are getting there in terms of making it unified. They are getting closer to that."
"Maybe this is coming with their AI module, but I would like to see a feature that performs baseline analysis of permissions that may not fit into a role, and it attempts to group them into a role. We've run into problems with applications where someone has not created a role but assigned ad hoc permissions to a user. We still need to do some manual work to identify the group that the user belongs to. It would be amazing to have Zilla streamline that."
"CyberArk IGA Powered by Zilla is lacking in the governance side of identities compared to competitors."
"It is time-consuming to troubleshoot issues."
"One of the challenges regarding Saviynt is the lack of material available on the web, as searching on Google or YouTube often yields little information."
"The product can improve the customer support offered to users since it is an area with shortcomings."
"The company needs to do more to establish standard practices within the product itself that are common in the industry."
"The configuration process at the beginning can be difficult, depending on the complexity of the company."
"The product lacks a broad user base which makes it difficult sometimes to find answers to questions about the product."
"The tool is difficult to migrate."
"Compared to other vendors, Saviynt's Privileged Access Management feature is not complete."
 

Pricing and Cost Advice

"It has been fair because we have been in from the beginning or close to the beginning. I know it is not truly an identity access management system yet, but its price was one of the appealing factors for us to purchase it at the time. It was reasonably priced."
"Saviynt has a competitive price."
"If you need to make any changes then there are additional fees."
"The price of the license for this product is quite expensive."
"The solution has a pay-as-you-go licensing model, and you can subscribe monthly or yearly."
"If you are investing in securing your data and avoiding any non-compliance issues, then yes, it is certainly recommended. To put it plainly, if you're willing to pay fines and aren't concerned about the misuse of data, then there might not be a problem. However, if you intend to safeguard the data of your employees, vendors, and customers, it becomes crucial. In this context, managing data security requires preventive and detective measures, such as enforcing segregation of duties and regularly reviewing permissions. Throughout an individual's life cycle within an organization or customer life cycle, various access permissions are granted. Without taking action on these permissions, there is a risk of exposure later on. If individuals retain access after leaving the organization, it poses a serious security threat. Implementing solutions like Saviynt can address these challenges, ensuring continuous access review, generating reports, alerts, and identifying potential risks."
"We are not into the licensing part. The clients take care of the licensing part."
"Saviynt's pricing is reasonable."
"Saviynt's pricing is acceptable and licensing costs are yearly."
report
Use our free recommendation engine to learn which Identity Management (IM) solutions are best for your needs.
881,733 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Security Firm
21%
Financial Services Firm
14%
Retailer
7%
Insurance Company
6%
Financial Services Firm
16%
Manufacturing Company
8%
Healthcare Company
8%
Computer Software Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise5
Large Enterprise15
 

Questions from the Community

What is your experience regarding pricing and costs for Zilla Security?
It has been fair because we have been in from the beginning or close to the beginning. I know it is not truly an identity access management system yet, but its price was one of the appealing factor...
What needs improvement with Zilla Security?
The first downside is that the central admin console can be improved. Additionally, there is a need for more access to customization. CyberArk IGA Powered by Zilla is lacking in the governance side...
What is your primary use case for Zilla Security?
My use cases for CyberArk IGA Powered by Zilla are identity and access management and governance, focusing on identities and identity governance.
What do you like most about Saviynt?
It is very easy to use. It addresses most of the trends in identity governance and risk management.
What is your experience regarding pricing and costs for Saviynt?
Saviynt is very affordable compared to its competitors. It is cloud-based, making it significantly cheaper than on-premises solutions. This cost-effectiveness aligns well with the Saudi market, whe...
What needs improvement with Saviynt?
One of the challenges regarding Saviynt is the lack of material available on the web, as searching on Google or YouTube often yields little information. Advertising Saviynt is necessary because I w...
 

Also Known As

Zilla Security
No data available
 

Overview

 

Sample Customers

Information Not Available
Shell, McKesson, Kimberly-Clark, Ingram Micro, Intermountain Health Care, Forterra, CoreLogic
Find out what your peers are saying about CyberArk IGA Powered by Zilla vs. Saviynt and other solutions. Updated: February 2026.
881,733 professionals have used our research since 2012.