Listing Thumbnail

    Comply

     Info
    Zilla Security solves the #1 security problem organizations face today - preventing identity related data breaches. Zilla enables organizations to establish a security and compliance best practice to eliminate access risk. We've combined comprehensive identity and access governance, and cloud security in a single platform. Zilla monitors and gives you control over all your identity paths to data access. You get least-privilege security with total visibility, ongoing monitoring, and remediation for identity vulnerabilities. Zilla's fully automated, easy-to-use access reviews help you achieve compliance, demonstrate audit readiness, and provide robust evidence of your organization's security measures.
    4.1

    Overview

    Zilla Security delivers an identity security solution focused on comprehensive security and compliance that is automated and easy to use. The platform combines identity governance with cloud security to deliver access visibility, compliance reviews, user lifecycle management, segregation of duties, and policy-based security remediation.

    Zilla's no-code integration with SaaS applications like Salesforce, cloud infrastructure like AWS, and cloud databases like Databricks, is unparalleled. Robotic automation enables the platform to monitor and configure all web-based applications, even those that don't have security APIs.

    Zilla's self-learning, intelligent automation easily handles cloud scale and dramatically reduces the cost of ownership via a simple user experience that enables collaboration between app owners, IT, security teams, and auditors.

    Zilla delivers:

    Extensive library of out-of-the-box app Integrations Fast onboarding of any app - no coding or scripting - including custom and legacy apps without APIs Fully automated access reviews campaigns and compliance assessments for multiple reviewer types Simple user experience for frictionless collaboration between stakeholders Continuous and audit-ready compliance with all the supporting evidence in one place Advanced search and reporting for the compliance audit purposes Complete visibility into who has access to what

    Highlights

    • Automated monitoring and remediation of access - who has access to what and any access risks. Zilla enables organizations to easily monitor all permissions, infrastructure entitlements, and security settings that give users, machines, and APIs access. We deliver insight into critical access risk and then remediate inappropriate access via integration with an organization's ITSM systems for ticketing workflows.
    • Comprehensive integrations with Zilla Universal Sync (ZUS) - we haven't met an app we can't support. Zilla makes it easy to integrate the tools, systems, and platforms organizations use every day. The platform includes robotic automation that enables customers to integrate with all applications, including legacy and homegrown apps, and ones that offer no security APIs or file exports for security data.
    • Simple, automated User Access Reviews (UAR) - go from months to days for reviews and audits. Zilla automates the entire UAR process and delivers an auditable system of record. The platform generates permissions relevant to a campaign, invites reviewers to complete work, and enables administrators to track reviewer progress. Reviewers can maintain, revoke, change, re-assign, or delegate permissions, while campaign administrators have complete control over the review process.

    Details

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (3)

     Info
    Dimension
    Description
    Cost/12 months
    Comply 500/25
    Zilla Security - Comply for 500 Identities and 25 applications
    $45,000.00
    Comply 2500/100
    Zilla Security - Comply for 2500 identities and 100 applications
    $90,000.00
    Comply additional app
    Zilla Security - Comply Additional App
    $1,000.00

    Vendor refund policy

    No refunds are available

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Vendor resources

    Support

    Vendor support

    The Zilla Customer Support Team is dedicated to providing you with a best-in-class support experience. Our goal is to exceed your expectations and make you successful. Support@ZillaSecurity.com  address

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    25
    In Data Security and Governance

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    1 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Access Monitoring and Remediation
    Automated monitoring of all permissions, infrastructure entitlements, and security settings with identification of access risks and remediation through ITSM system integration for ticketing workflows.
    Universal Application Integration
    No-code integration capability with SaaS applications, cloud infrastructure, and cloud databases using robotic automation to support legacy applications, custom apps, and systems without security APIs.
    Automated Access Reviews
    Fully automated user access review campaigns with permission generation, reviewer invitation, progress tracking, and capabilities for permission maintenance, revocation, reassignment, and delegation.
    Identity Governance and Lifecycle Management
    Comprehensive identity governance platform combining user lifecycle management, segregation of duties enforcement, and policy-based security remediation across cloud and on-premises environments.
    Compliance Visibility and Reporting
    Advanced search and reporting capabilities providing complete visibility into access permissions, audit-ready compliance documentation, and supporting evidence collection for compliance assessments.
    Application Discovery and Integration
    Integrates with Identity and SSO platforms, financial systems, and direct integrations; includes browser agent and desktop agent capabilities for comprehensive application discovery.
    Access Provisioning and Deprovisioning Automation
    Enables bulk access provisioning and deprovisioning for user lifecycle events including joiners, movers, and leavers through automated workflows.
    Access Review Automation
    Automates access reviews and streamlines access management processes through a centralized interface.
    Identity and Access Governance
    Enforces compliance controls mandated by SOX, HIPAA, and SOC 2 standards to ensure appropriate access rights assignment.
    License and Cost Optimization
    Identifies and eliminates application redundancy and unused licenses to optimize software spending.
    Multi-Cloud and SaaS Identity Integration
    Unifies and visualizes identity and entitlement data across AWS, Azure, GCP, Okta, Active Directory, Snowflake, Oracle, Salesforce, and additional cloud and SaaS platforms.
    Least Privilege Enforcement and Permissions Management
    Enforces least privilege access policies and reduces permissions sprawl across cloud and SaaS environments for both human and non-human identities.
    Non-Human Identity and AI Workload Governance
    Discovers, secures, and governs service accounts, secrets, automations, and AI agents, with capability to control access for AI models and pipelines to ensure only authorized identities can invoke, train, or deploy AI systems.
    Automated Access Reviews and Policy-Driven Governance
    Automates user access reviews and replaces manual processes with policy-driven access governance across cloud and SaaS environments.
    Compliance Reporting and Audit Readiness
    Delivers audit-ready reporting for regulatory requirements including SOX, HIPAA, PCI, and supports alignment with Zero Trust and modern compliance frameworks.

    Security credentials

     Info
    Validated by AWS Marketplace
    FedRAMP
    GDPR
    HIPAA
    ISO/IEC 27001
    PCI DSS
    SOC 2 Type 2
    No security profile
    No security profile
    -
    -
    -
    -

    Contract

     Info
    Standard contract
    No

    Customer reviews

    Ratings and reviews

     Info
    4.1
    8 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    50%
    50%
    0%
    0%
    0%
    1 AWS reviews
    |
    7 external reviews
    External reviews are from PeerSpot .
    Vivek-Jaiswal

    Identity governance has strengthened security and now simplifies privileged access reviews

    Reviewed on Apr 08, 2026
    Review provided by PeerSpot

    What is our primary use case?

    There are many use cases for CyberArk IGA Powered by Zilla  in my organization. My main use case focuses on identity and access management and governance, emphasizing the identities and identity governance.

    I do not have anything else to add about my main use case with CyberArk IGA  Powered by Zilla.

    What is most valuable?

    CyberArk IGA  Powered by Zilla basically provides the identity and access management solution. It provides a system admin as well as the system admin user admins, provides all privileged users, and it manages across all the privileged users. It also provides security, password management, and access to the other applications.

    I rely day-to-day on privileged access management as well as protection against the cyber threat from the system admins and provided securities. I think it is very secure in terms of the identity management and access management. It provides governance and focus against the password management.

    CyberArk IGA Powered by Zilla provided a great layer of security in terms of the identity management and access management.

    This has really helped us in terms of providing security. When we implemented CyberArk IGA Powered by Zilla, we definitely achieved a lot in terms of security, mitigating business risk across all assets, saving time, and reducing the risk of account compromise and access compromise.

    Through automation, the management of identity and user management, as well as system management, has reduced time and effort for my team.

    A seventy to eighty percent improvement has definitely been seen in deployment, reviews, or provisioning since using CyberArk IGA Powered by Zilla.

    My team spends significantly less time on access reviews and evidence collection now compared to before; it has changed quite a bit.

    What needs improvement?

    The first thing that can be improved is the central admin console. Additionally, there is a need for more access for customizations. It is lacking a bit in governance science for the identities compared to competitors, so more risk management and governance policies would be beneficial.

    The central admin console can be improved, as well as more access to customizations.

    I would suggest enhancing the reporting functionality of CyberArk IGA Powered by Zilla. It could definitely benefit from more customization and advanced filtering for auditing purposes.

    For how long have I used the solution?

    I have been using CyberArk IGA Powered by Zilla  for a couple of years.

    What do I think about the stability of the solution?

    CyberArk IGA Powered by Zilla is stable.

    What do I think about the scalability of the solution?

    CyberArk IGA Powered by Zilla's scalability depends upon the good architect who has performed the implementation correctly. It is quite scalable, and we can definitely scale up or scale down.

    How are customer service and support?

    The type of support agreement and contract we have is really good. They provide excellent support in terms of lab, discussion forum, and good documentation that covers most issues. The quality of the support is very good.

    I would rate customer support a nine on a scale of one to ten.

    Which solution did I use previously and why did I switch?

    We used Saviynt and SailPoint previously, both of which are very good as well.

    The switch from those solutions to CyberArk IGA Powered by Zilla was primarily due to the automation of processes and compliance, the streamlining of identity governance and administration, and enhancing security and efficiency.

    How was the initial setup?

    CyberArk IGA Powered by Zilla did not take much time to deploy. It requires some additional support from the admin team and the project implementation, so at least two to three people were involved, and it took a couple of weeks to fix the issues.

    The deployment of CyberArk IGA Powered by Zilla was fast.

    What was our ROI?

    There is a lot of time saved in terms of employees, as well as in terms of price and security, with many things improved.

    What's my experience with pricing, setup cost, and licensing?

    For the pricing, I worked with the vendor.

    No challenges were faced in the pricing and setup cost. With the help of vendor support, we were able to get pricing and licensing sorted with the account manager.

    Which other solutions did I evaluate?

    Before choosing CyberArk IGA Powered by Zilla, we evaluated other options which included SailPoint Identity, Microsoft Entra ID , Okta, Omada identity solutions, Saviynt, One Identity, and JumpCloud .

    What other advice do I have?

    CyberArk IGA Powered by Zilla is a really good solution. Others should definitely go for it. I would rate this solution a nine out of ten.

    Pavan Ingaleshwar

    Centralized access visibility has improved investigations but the interface still needs simplification

    Reviewed on Apr 06, 2026
    Review provided by PeerSpot

    What is our primary use case?

    My main use cases for CyberArk IGA Powered by Zilla  include access governance, access reviews, identifying excessive privilege, and tracking user permissions.

    From my SOC perspective, I interacted with CyberArk IGA Powered by Zilla  during the investigation of suspicious login activity, checking user access permission, and validating whether the access was legitimate or fraudulent. It helped me understand who has access to what during the investigation.

    Identifying excessive privilege and tracking user permissions are the two primary use cases that I could list out.

    In one instance, I had to verify access for a user account during an investigation. Previously, this involved checking multiple tools and confirming with different teams. With CyberArk IGA  Powered by Zilla, I swiftly viewed user access and roles in one place, saving both time and effort.

    What is most valuable?

    In my experience, the best feature of CyberArk IGA  Powered by Zilla is its ability to provide clear visibility into user access and permissions, which helps me quickly identify over-privileged access permissions and suspicious accounts.

    This platform helps me check user access history, permission details, and role assignments easily. During investigations, it confirms whether user access is legitimate or not, providing clear visibility into permissions, which is what I really appreciate about this tool.

    Other key features of CyberArk IGA Powered by Zilla include a centralized view of user access, access certifications, review detections of over-privileged accounts, identifying risks, and visibility. Additionally, it assists with login alerts for privilege misuse and suspicious activity.

    CyberArk IGA Powered by Zilla has positively impacted my organization by improving visibility into user access and reducing the risk of over-privileged accounts, which can affect costs for us and our clients. It has also supported faster investigations, allowing for better control over user permissions, thus impacting my organization positively.

    What needs improvement?

    CyberArk IGA Powered by Zilla is a good solution overall, but it could improve the user interface to be more accessible for non-technical users. Sometimes navigating access details and reports feels complex. Faster access to required information during investigations and better integration with other security tools would enhance the experience and help the SOC teams correlate alerts more efficiently.

    While CyberArk IGA Powered by Zilla provides good visibility into user access and helps identify over-privileged access, the user interface can be complex, requiring extra steps to find necessary information.

    For how long have I used the solution?

    I have been using CyberArk IGA Powered by Zilla for eleven months, which means I have become familiar with the platform.

    What do I think about the stability of the solution?

    In my experience, CyberArk IGA Powered by Zilla is stable, and I have not encountered any downtime or reliability issues.

    What do I think about the scalability of the solution?

    CyberArk IGA Powered by Zilla is scalable and has the capability to handle growth or an increased number of users very well, especially with its AI-driven governance and administration capabilities.

    How are customer service and support?

    I do not remember any specifics, but I have not communicated with the customer support team of CyberArk IGA Powered by Zilla.

    Which solution did I use previously and why did I switch?

    Before using CyberArk IGA Powered by Zilla, I was using basic identity access management processes in my previous company. The switch to CyberArk IGA Powered by Zilla was made to improve visibility, automate access reviews, and centralize user access management, which was essential for reducing manual efforts and improving efficiency.

    How was the initial setup?

    I was not part of the deployment process of CyberArk IGA Powered by Zilla, but as far as I know, the initial setup, which involved onboarding and configuring policies, took around thirty to thirty-five days, or approximately one month.

    Based on my understanding, the deployment of CyberArk IGA Powered by Zilla is slightly faster compared to traditional IGA solutions because it streamlines the process. However, I was not part of the deployment team, so I cannot provide detailed insight.

    What about the implementation team?

    The deployment of CyberArk IGA Powered by Zilla is managed by an identified team, and I have used it from the SOC side.

    What was our ROI?

    Using CyberArk IGA Powered by Zilla reduces my investigation time by around thirty to forty percent, especially when verifying user privileges or checking access history.

    The automation in CyberArk IGA Powered by Zilla leads to noticeable improvements in access review processes and validation; previously, these required significant manual effort, such as checking multiple systems and verifying user permissions. Automation centralizes access details, reducing time spent by around thirty to forty percent, and improves accuracy by lessening manual checks.

    While I do not have exact financial figures, the main benefit of using CyberArk IGA Powered by Zilla comes from reduced manual effort and faster access validation during investigations, which improves efficiency and reduces risks related to over-privileged accounts.

    Which other solutions did I evaluate?

    I am not certain if my organization evaluated other options before choosing CyberArk IGA Powered by Zilla, as I did not have insight into that process.

    What other advice do I have?

    The time spent on access reviews and evidence collection is around one month, though I am not completely certain since I was not involved directly. I rate CyberArk IGA Powered by Zilla a seven out of ten overall.

    Isaac-Hammond

    Centralized access has strengthened security and simplified auditing for sensitive environments

    Reviewed on Mar 30, 2026
    Review provided by PeerSpot

    What is our primary use case?

    CyberArk IGA Powered by Zilla  is used across various sectors including financial services, mining, oil and gas environments, as well as manufacturing and SMBs that require access to specific sensitive environments.

    What is most valuable?

    The best features of CyberArk IGA Powered by Zilla  include the hardening of the solution, which involves access to the vault being restricted to one way in and one way out.

    The functionalities of CyberArk PAM include monitoring of activities, which are recorded live for auditing purposes, and it integrates into almost every environment seamlessly.

    After implementing CyberArk IGA  Powered by Zilla, it puts the organization at a very high security level by reducing risk and threats to platforms. It helps protect the identity of individuals in the environment and simplifies auditing, making it straightforward for organizations pursuing ISO certifications.

    What needs improvement?

    Improvement suggestions for CyberArk include addressing the on-premises deployment processes, which require a very skilled engineer to handle because of the complexity of the environments involved.

    For how long have I used the solution?

    I have been working with CyberArk from 2019 to 2024.

    What do I think about the scalability of the solution?

    For larger environments using CyberArk IGA  Powered by Zilla, scalability depends on the integration environment being implemented and the skill set behind it.

    PAM involves all identity management across whole departments. My most recent projects span across two to three months because they involve other stakeholders including senior network engineers to understand how the integration will proceed, which impacts the timeframes needed for implementation.

    How are customer service and support?

    For the technical support of CyberArk, I rate them nine out of ten. While my experience from a partner perspective has been outstanding, the SLAs differ greatly from those of normal users.

    What about the implementation team?

    I personally participated in the deployment of CyberArk IGA Powered by Zilla and was the lead engineer on most of the projects that I have encountered.

    I completed the implementation of CyberArk IGA Powered by Zilla all in-house. Most things are out of the box, but understanding every environment remains essential for smooth integration.

    What's my experience with pricing, setup cost, and licensing?

    My experience with the licensing cost shows that CyberArk is never reasonable on pricing. It goes per administrator user rather than per integrated environment, making it essential to manage access strictly.

    What other advice do I have?

    Implementation for CyberArk IGA Powered by Zilla is quite a complex procedure. My experience with the automation provided by CyberArk IGA Powered by Zilla involves tweaking here and there, as the same device that will create security might also affect your performance.

    In terms of automation, CyberArk places all your access points centrally, so if you are a network engineer wanting to access your devices, it is centralized for you, automating and orchestrating your access while placing security measures in place.

    Regarding measurable improvements after starting to use CyberArk IGA Powered by Zilla, this PAM solution does more than multi-factor authentication by providing additional layers of security through session recording and monitoring, which is critical compared to identity governance, which is mostly for authentication. I rate this product eight point five out of ten.

    Ebin_Abraham

    Automated access reviews have reduced hidden bot risks and create audit evidence seamlessly

    Reviewed on Mar 17, 2026
    Review from a verified AWS customer

    What is our primary use case?

    CyberArk IGA Powered by Zilla  serves as our main tool for access review, certification, and governance of non-human accounts.

    We handle non-human accounts, which refers to all the RPA  bots that use service accounts, and we were able to review the access of these unattended RPA  bot service accounts and SaaS users. When a bot is retired, CyberArk IGA Powered by Zilla  can immediately find that account and review the access, making it a great tool for managing a large number of accounts.

    What is most valuable?

    CyberArk IGA  Powered by Zilla's access reviews, audit report generation, and compliance features are excellent. It creates audit and compliance evidence easily, which previously required substantial manual effort, but now the process has become very straightforward.

    The best feature is definitely the AI component, which includes evidence generation for audit and compliance, addressing one of our biggest challenges. We are able to easily gather all the details required by the audit team, and that is one of the best aspects. Additionally, being cloud-based means it is very easy to scale up without much downtime compared to our previous on-premises solution.

    CyberArk IGA  Powered by Zilla has positively impacted our organization by significantly reducing manual effort. We previously had many unnoticed non-human accounts that we could not deactivate due to their large number, but now that timeframe has drastically decreased, which is one of the greatest advantages. The AI-driven access reviews and automatic generation of compliance and audit documents are among the best features.

    What needs improvement?

    For improvement, I would suggest enhancing the reporting functionality of CyberArk IGA Powered by Zilla, as it could benefit from more customization or advanced filtering for auditing purposes. I have heard from colleagues that for some advanced policies, they are still approaching an Accenture vendor, likely due to existing difficulties.

    The user interface could also be enhanced.

    For how long have I used the solution?

    I have been using the solution for the past one and a half years now.

    What do I think about the stability of the solution?

    CyberArk IGA Powered by Zilla is stable.

    What do I think about the scalability of the solution?

    CyberArk IGA Powered by Zilla demonstrates amazing scalability as a SaaS product in the cloud without any scalability issues.

    How are customer service and support?

    The support team of CyberArk IGA Powered by Zilla is very helpful; as soon as we create a ticket, they reach out quickly and provide immediate solutions, which is excellent.

    Which solution did I use previously and why did I switch?

    We previously used SailPoint, which was an on-premises solution.

    How was the initial setup?

    The deployment of CyberArk IGA Powered by Zilla took approximately two weeks in our organization.

    This deployment was significantly faster compared to our previous on-premises solution.

    What was our ROI?

    I heard from the automation CoE team that we were able to save approximately $75,000 from that specific area, though I am uncertain if that is considered annual savings.

    What's my experience with pricing, setup cost, and licensing?

    I am not familiar with the pricing and licensing costs, but the setup of CyberArk IGA Powered by Zilla was straightforward since it was cloud-based compared to the previous on-premises tool, SailPoint.

    What other advice do I have?

    I would advise others considering CyberArk IGA Powered by Zilla that it is best for large enterprises with many accounts and a focus on compliance; if compliance is a significant concern for your organization, then it is definitely worth choosing. I provided this review with a rating of 9.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Amazon Web Services (AWS)
    James Quansah

    Automated access governance has simplified onboarding, mobility, and secure remote work

    Reviewed on Feb 04, 2026
    Review provided by PeerSpot

    What is our primary use case?

    The main use cases for CyberArk IGA Powered by Zilla  include onboarding users when they are being recruited, as well as managing the moving and exiting processes. When a user like James moves from department A to department B, the IT team no longer needs to manually change roles and permissions to the resources James has access to. Instead, the system automatically provisions James with the new role he has been appointed with. Similarly, when James leaves the organization, all his privileges and resources are automatically revoked without the need to search and manually remove each access point.

    Users also want to have a single sign-on capability so they do not have to log into multiple applications. They can sign in once and have access to all their applications such as Outlook, Salesforce , CRM  solutions, and ERP  solutions without logging in individually. The system logs them in automatically to each application.

    Additionally, CyberArk IGA Powered by Zilla  helps users work from anywhere, regardless of their location or country. Users do not need to be in their office geo-location to access applications or resources, which provides flexibility for accessing applications wherever they are. Furthermore, if an account gets locked, users can reset their password themselves by answering security questions instead of going through the admin process for approval and re-enabling the account.

    What is most valuable?

    CyberArk has a plethora of solutions including PAM, IGA , Secrets Management, and Remote  Access. I personally participate in the deployment process.

    The deployment time for CyberArk IGA  Powered by Zilla is based on the size of the organization, whether it is an enterprise organization or a small medium business. For an organization looking at 1,005 to 2,000 users, the process begins with a scoping phase where information is gathered from the customer, which typically takes two to three days for the customer to populate the documentation. After the customer submits the scoping documents, I and the customer review what they submitted. Once the review is complete, we conduct a kick-off meeting and provide the project timelines to both the customer project manager and our project manager. The entire process should fall within four to five weeks, approximately one month to one month and a week. During the fourth week, the system is fine-tuned. The fifth week involves training and user acceptance testing (UAT) with the customer to confirm that what was requested has been delivered as promised. After UAT, the solution is handed over to the customer.

    What needs improvement?

    The challenges I face with the implementation of CyberArk IGA Powered by Zilla involve legacy applications and legacy systems, which sometimes present issues. Additionally, custom-built APIs that are not properly structured can be problematic, though CyberArk can help redefine them according to the customer's demands.

    Integrating CyberArk IGA Powered by Zilla with banking applications such as T24 is very tough to accomplish. When working with the T24 core banking application, the T24 support team is not able to assist much, so I have to find a way to fix the issue myself. The difficulty is not related to the price but rather to the technical integration challenges with these specialized banking systems.

    For how long have I used the solution?

    I have worked with CyberArk IGA Powered by Zilla for the past three years, and I have worked with PAM for six years.

    How are customer service and support?

    The primary issue I have experienced with CyberArk IGA Powered by Zilla is related to support. Getting the right support in the right jurisdiction is somewhat challenging. Although CyberArk has resource people to work with, the time to resolve issues is problematic. When I send a request, they respond, but getting an actual time slot to work with the customer to resolve the issue sometimes delays. Occasionally, the customer becomes frustrated and seeks support from us, and we experience issues with the first level of support they receive. I rate CyberArk support at a six out of ten.

    What about the implementation team?

    I personally participate in the deployment process.

    Which other solutions did I evaluate?

    CyberArk IGA Powered by Zilla is expensive compared to One Identity IGA and BeyondTrust.

    What other advice do I have?

    CyberArk IGA Powered by Zilla is expensive when compared to One Identity IGA and BeyondTrust. My overall review rating for this product is an eight out of ten.

    View all reviews