No more typing reviews! Try our Samantha, our new voice AI agent.

CyberArk IGA Powered by Zilla vs Saviynt Identity Cloud comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 11, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk IGA Powered by Zilla
Ranking in Identity Governance Administration (IGA)
5th
Average Rating
8.6
Reviews Sentiment
7.1
Number of Reviews
10
Ranking in other categories
Identity Management (IM) (11th), Identity and Access Management as a Service (IDaaS) (IAMaaS) (12th)
Saviynt Identity Cloud
Ranking in Identity Governance Administration (IGA)
4th
Average Rating
7.4
Reviews Sentiment
6.2
Number of Reviews
27
Ranking in other categories
Privileged Access Management (PAM) (10th), Identity and Access Management (3rd), Non-Human Identity Management (NHIM) (7th), Identity Security and Posture Management (ISPM) (1st)
 

Mindshare comparison

As of May 2026, in the Identity Governance Administration (IGA) category, the mindshare of CyberArk IGA Powered by Zilla is 4.9%, up from 3.2% compared to the previous year. The mindshare of Saviynt Identity Cloud is 17.7%, down from 20.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity Governance Administration (IGA) Mindshare Distribution
ProductMindshare (%)
Saviynt Identity Cloud17.7%
CyberArk IGA Powered by Zilla4.9%
Other77.4%
Identity Governance Administration (IGA)
 

Featured Reviews

AmitRathod - PeerSpot reviewer
Senior Analyst at Toll Holdings Limited
Automation has transformed access reviews and governance across human and non-human identities
The UI of CyberArk IGA Powered by Zilla is good, but there is room for improvement in the transition from legacy systems. Organizations with highly customized, long-standing legacy IGA tools may face a steep learning curve and complex data migration when moving to this modern AI-driven or cloud-native solution. Another limitation involves integration gaps. While CyberArk IGA Powered by Zilla boasts extensive pre-built connectors, any application not covered requires manual configuration or the deployment of Zilla Universal Sync, which may increase implementation time and could be less effective for legacy applications. However, it can be quite useful for SaaS-based applications, so improvement in customization or configuration for legacy applications is needed. There is a considerable dependency on data quality. The effectiveness of AI-driven insights, such as entitlement recommendations for approve, deny, or do nothing actions, is entirely reliant on the quality and accuracy of the data ingested from connected applications. This means data quality should not just depend on application integration but also overall user insights regarding usage, such as login activity or MFA utilization.
reviewer2774067 - PeerSpot reviewer
Software Engineer at a tech consulting company with 11-50 employees
Has reduced manual work and shortened project timelines through faster deployment and intuitive workflows
One of the challenges regarding Saviynt is the lack of material available on the web, as searching on Google or YouTube often yields little information. Advertising Saviynt is necessary because I was not aware of it a couple of months ago, and it is a very helpful product for many organizations. In India, IGA solutions are not widely recognized, and Saviynt can utilize this point by promoting itself in the cybersecurity field. A significant challenge is the lack of people discussing Saviynt in the open market, as the forums provide slower responses compared to platforms like Reddit. Advancements related to AI would be very helpful. Saviynt should provide pricing for their university certifications, which is currently not publicly available. Information about enrolling requires an ID that is not easily obtained, as it can only be acquired through an organization. Some small wishlist features are related to APIs. As I work on projects, I find certain features to be much needed, but at a glance, they may not seem necessary. As I continue working with Saviynt, these small API-related features become apparent and would greatly enhance the experience.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"CyberArk IGA Powered by Zilla's access reviews, audit report generation, and compliance features are excellent."
"CyberArk IGA Powered by Zilla is a very stable product, and I do not see a lot of issues with it most of the time."
"CyberArk IGA Powered by Zilla has positively impacted my organization through the collection of audit evidence, the compliance workflow, and user access reviews, which helps me significantly."
"Overall, CyberArk IGA Powered by Zilla helps us automate user access reviews, provisioning, and de-provisioning for both human and machine identities across hybrid and multi-cloud environments."
"After implementing CyberArk IGA Powered by Zilla, it puts the organization at a very high security level by reducing risk and threats to platforms."
"We had these spreadsheets all over the place, but now we have a library of evidence to consult when needed. Zilla keeps everything in one place. It's not scattered all over anymore."
"The features of CyberArk IGA Powered by Zilla that I have found the most valuable include credential masking, time-bound access, and using it for the approval of workflows and audit trails for compliance-related tasks."
"When we implemented CyberArk IGA Powered by Zilla, we definitely achieved a lot in terms of security, mitigating business risk across all assets, saving time, and reducing the risk of account compromise and access compromise."
"The dedicated Freshdesk platform is a user community and a step in the right direction for offering learning resources."
"Saviynt has positively impacted my organization by significantly reducing the time for a project where we previously used a spreadsheet for manual work to keep the data, and helped reduce that time from around two weeks to two to three days or even less."
"It's easy to manage and easy to use; a simple tool for end-users."
"Saviynt is used for the greenfield implementation for the whole IAM, IGA, MFA, SSO, and access management."
"The feature that we use the most is the global, third-party user management."
"The most valuable feature is the ease of implementation."
"Saviynt has a lot of potential with many features available for users."
"Some of the self-service capabilities are quite powerful."
 

Cons

"CyberArk IGA Powered by Zilla is lacking in the governance side of identities compared to competitors."
"For improvement, I would suggest enhancing the reporting functionality of CyberArk IGA Powered by Zilla, as it could benefit from more customization or advanced filtering for auditing purposes."
"Improvement suggestions for CyberArk include addressing the on-premises deployment processes, which require a very skilled engineer to handle because of the complexity of the environments involved."
"Organizations with highly customized, long-standing legacy IGA tools may face a steep learning curve and complex data migration when moving to this modern AI-driven or cloud-native solution."
"There is still no automated way to de-provision access as a result of a review, but they are getting there in terms of making it unified. They are getting closer to that."
"I believe CyberArk IGA Powered by Zilla can be improved by simplifying the workflow and the UI for managing access requests and approvals."
"The primary issue I have experienced with CyberArk IGA Powered by Zilla is related to support."
"Maybe this is coming with their AI module, but I would like to see a feature that performs baseline analysis of permissions that may not fit into a role, and it attempts to group them into a role. We've run into problems with applications where someone has not created a role but assigned ad hoc permissions to a user. We still need to do some manual work to identify the group that the user belongs to. It would be amazing to have Zilla streamline that."
"The customer support and implementation services need to be improved."
"The company needs to do more to establish standard practices within the product itself that are common in the industry."
"We sometimes experience performance issues when the solution fails to process the data between two different applications."
"The biggest drawback is that for every change you want to make, you have to go back to them and ask for it."
"According to feedback I've received, some users prefer SailPoint over Saviynt in real complex environments. SailPoint has its provisioning platform. Complex integrations may pose challenges in scenarios like a large bank with thousands of users, making SailPoint a preferred choice for some."
"While one product performed excellently, another was quite complex with code dating back 15 years."
"The tool is difficult to migrate."
"The configuration process at the beginning can be difficult, depending on the complexity of the company."
 

Pricing and Cost Advice

"It has been fair because we have been in from the beginning or close to the beginning. I know it is not truly an identity access management system yet, but its price was one of the appealing factors for us to purchase it at the time. It was reasonably priced."
"The solution has a pay-as-you-go licensing model, and you can subscribe monthly or yearly."
"If you are investing in securing your data and avoiding any non-compliance issues, then yes, it is certainly recommended. To put it plainly, if you're willing to pay fines and aren't concerned about the misuse of data, then there might not be a problem. However, if you intend to safeguard the data of your employees, vendors, and customers, it becomes crucial. In this context, managing data security requires preventive and detective measures, such as enforcing segregation of duties and regularly reviewing permissions. Throughout an individual's life cycle within an organization or customer life cycle, various access permissions are granted. Without taking action on these permissions, there is a risk of exposure later on. If individuals retain access after leaving the organization, it poses a serious security threat. Implementing solutions like Saviynt can address these challenges, ensuring continuous access review, generating reports, alerts, and identifying potential risks."
"Saviynt has a competitive price."
"The product is less expensive than one of the competitors."
"Saviynt's pricing is reasonable."
"The pricing is comparable to Azure Entra ID. Kind of the same"
"We are not into the licensing part. The clients take care of the licensing part."
"If you need to make any changes then there are additional fees."
report
Use our free recommendation engine to learn which Identity Governance Administration (IGA) solutions are best for your needs.
893,438 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Security Firm
18%
Financial Services Firm
13%
Retailer
6%
Insurance Company
5%
Financial Services Firm
16%
Manufacturing Company
8%
Educational Organization
8%
Computer Software Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business3
Midsize Enterprise1
Large Enterprise7
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise5
Large Enterprise15
 

Questions from the Community

What is your experience regarding pricing and costs for Zilla Security?
I am not familiar with the pricing and licensing costs, but the setup of CyberArk IGA Powered by Zilla was straightforward since it was cloud-based compared to the previous on-premises tool, SailPo...
What needs improvement with Zilla Security?
For improvement, I would suggest enhancing the reporting functionality of CyberArk IGA Powered by Zilla, as it could benefit from more customization or advanced filtering for auditing purposes. I h...
What is your primary use case for Zilla Security?
CyberArk IGA Powered by Zilla serves as our main tool for access review, certification, and governance of non-human accounts. We handle non-human accounts, which refers to all the RPA bots that use...
What is your experience regarding pricing and costs for Saviynt?
Saviynt is very affordable compared to its competitors. It is cloud-based, making it significantly cheaper than on-premises solutions. This cost-effectiveness aligns well with the Saudi market, whe...
What needs improvement with Saviynt?
One of the challenges regarding Saviynt is the lack of material available on the web, as searching on Google or YouTube often yields little information. Advertising Saviynt is necessary because I w...
What is your primary use case for Saviynt?
My main use case for Saviynt is deploying IGA solutions to our customers. For deploying IT solutions to our customers using Saviynt, one of our recent projects was to develop an IGA solution for a ...
 

Also Known As

Zilla Security
No data available
 

Overview

 

Sample Customers

Information Not Available
Shell, McKesson, Kimberly-Clark, Ingram Micro, Intermountain Health Care, Forterra, CoreLogic
Find out what your peers are saying about CyberArk IGA Powered by Zilla vs. Saviynt Identity Cloud and other solutions. Updated: April 2026.
893,438 professionals have used our research since 2012.