Try our new research platform with insights from 80,000+ expert users

CyberArk IGA Powered by Zilla vs SecureAuth Identity Platform comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 4, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk IGA Powered by Zilla
Ranking in Identity Management (IM)
16th
Average Rating
8.6
Reviews Sentiment
7.0
Number of Reviews
5
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (18th), Identity Governance Administration (IGA) (6th)
SecureAuth Identity Platform
Ranking in Identity Management (IM)
27th
Average Rating
5.6
Reviews Sentiment
5.6
Number of Reviews
2
Ranking in other categories
User Provisioning Software (13th), Access Management (23rd), Customer Identity and Access Management (CIAM) (14th)
 

Mindshare comparison

As of March 2026, in the Identity Management (IM) category, the mindshare of CyberArk IGA Powered by Zilla is 2.3%, up from 1.3% compared to the previous year. The mindshare of SecureAuth Identity Platform is 1.7%, up from 0.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity Management (IM) Mindshare Distribution
ProductMindshare (%)
CyberArk IGA Powered by Zilla2.3%
SecureAuth Identity Platform1.7%
Other96.0%
Identity Management (IM)
 

Featured Reviews

reviewer2795934 - PeerSpot reviewer
Associate Director at a legal firm with 10,001+ employees
Identity governance has strengthened privileged access controls and supports ongoing compliance
Customization involves making changes to fit customer requirements. Maintenance usually involves sometimes having issues with different connectors, mostly the Active Directory and LDAP connectors. Periodic aggregation of accounts and applications sometimes go through issues with firewalls. Sometimes they do not work, and you need to make sure your connectors are all in sync, especially your LDAP and AD connectors. Sometimes there could be some issues occurring between these two connectors, so there will be maintenance on that side, making sure they are working on a regular basis based on your monitoring plan. Taking backups regularly and periodic backups are essential. Both the support rating and the overall product rating for CyberArk IGA Powered by Zilla is eight out of ten. Eight means they have complete processes in place to help support, they have resources available, and there is a method to contact them and get response quickly. In that regard, eight is appropriate because they reuse some of their main PAM components which is very good, and compared to other products which I ranked around nine, they should be at eight.
it_user710517 - PeerSpot reviewer
Identity and Access Engineer at a tech services company with 1,001-5,000 employees
Valuable features include access request and certification. Application integration, reporting, and certification could be improved.
Valuable features include access request, certification, and password management Provide centralised identity-access management Application integration, reporting, and certification could be improved More than three years The product is only as good as the data you use Moving from v7.x to v8.x…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I enjoy the ease of setup and creation of a review. Being a user of the tool or kind of an admin of the tool, the ease of setup of an access review is valuable."
"CyberArk IGA Powered by Zilla is a very stable product, and I do not see a lot of issues with it most of the time."
"We had these spreadsheets all over the place, but now we have a library of evidence to consult when needed. Zilla keeps everything in one place. It's not scattered all over anymore."
"It helps users work from anywhere, regardless of their location or country. Users do not need to be in their office geo-location to access applications or resources, which provides flexibility for accessing applications wherever they are."
"The self-service functionality for password/access management reduced our need for manual intervention."
"For v8.4, you can work easily if you stick to OOTB, however, should you require customization, then the tool is very flexible using SQL/VB knowledge to extend."
 

Cons

"The primary issue I have experienced with CyberArk IGA Powered by Zilla is related to support."
"CyberArk IGA Powered by Zilla is lacking in the governance side of identities compared to competitors."
"There is still no automated way to de-provision access as a result of a review, but they are getting there in terms of making it unified. They are getting closer to that."
"Maybe this is coming with their AI module, but I would like to see a feature that performs baseline analysis of permissions that may not fit into a role, and it attempts to group them into a role. We've run into problems with applications where someone has not created a role but assigned ad hoc permissions to a user. We still need to do some manual work to identify the group that the user belongs to. It would be amazing to have Zilla streamline that."
"Moving from v7.x to v8.x is not easy. You need Courion expertise and skills to upgrade and migrate the data."
"Stability was a constant concern. The application was plagued with memory leak issues from initial installation and through multiple major/minor version upgrades."
 

Pricing and Cost Advice

"It has been fair because we have been in from the beginning or close to the beginning. I know it is not truly an identity access management system yet, but its price was one of the appealing factors for us to purchase it at the time. It was reasonably priced."
Information not available
report
Use our free recommendation engine to learn which Identity Management (IM) solutions are best for your needs.
884,873 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Security Firm
20%
Financial Services Firm
13%
Retailer
7%
Insurance Company
6%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for Zilla Security?
It has been fair because we have been in from the beginning or close to the beginning. I know it is not truly an identity access management system yet, but its price was one of the appealing factor...
What needs improvement with Zilla Security?
The challenges I face with the implementation of CyberArk IGA Powered by Zilla involve legacy applications and legacy systems, which sometimes present issues. Additionally, custom-built APIs that a...
What is your primary use case for Zilla Security?
The main use cases for CyberArk IGA Powered by Zilla include onboarding users when they are being recruited, as well as managing the moving and exiting processes. When a user like James moves from ...
Ask a question
Earn 20 points
 

Also Known As

Zilla Security
SecureAuth Identity Governance, Core Access Assurance Suite, Courion Access Assurance Suite
 

Overview

 

Sample Customers

Information Not Available
Alegent Health, Associated Materials, Brookdale Senior Living, NV Energy, Woodforest Bank, Wellspan Health
Find out what your peers are saying about CyberArk IGA Powered by Zilla vs. SecureAuth Identity Platform and other solutions. Updated: March 2026.
884,873 professionals have used our research since 2012.