Skip to main content
TrustRadius
Zilla Security

Zilla Security

Overview

What is Zilla Security?

Zilla delivers a SaaS platform for security and access compliance. Zilla automates user access review processes that are essential for maintaining compliance with regulations like SOX, HIPAA, GLBA, FFIEC and SOC 2. Zilla automatically integrates with SaaS applications, cloud platforms,…

Read more
Recent Reviews

TrustRadius Insights

Zilla Security has proven to be an invaluable tool for users in automating the user access review process. With Zilla, provisioning and …
Continue reading
TrustRadius

Leaving a review helps other professionals like you evaluate Identity Governance and Administration Tools and Solutions

Be the first one in your network to review Zilla Security, and make your voice heard!

Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Zilla Security?

Zilla delivers a SaaS platform for security and access compliance. Zilla automates user access review processes that are essential for maintaining compliance with regulations like SOX, HIPAA, GLBA, FFIEC and SOC 2. Zilla automatically integrates with SaaS applications, cloud platforms, and on…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

6 people also want pricing

Alternatives Pricing

What is SecurID?

SecurID, a company and solution suite from RSA, is an identity and access management suite supporting access management, authentication, and identity governance.

What is The Okta Identity Cloud?

Okta is an enterprise grade identity management service, built in the cloud. IT can manage access across any application, person or device. Whether the people are employees, partners or customers or whether the applications are in the cloud, on premises or on a mobile device, Okta helps IT become…

Return to navigation

Product Details

What is Zilla Security?

Zilla provides a platform that aims to provide comprehensive visibility into the configuration settings for all applications, systems, and platforms. With Zilla, the user can build a plan of action to eliminate common security risks:
  • Safeguard highly sensitive data—such as protected health information, personally identifiable information, and intellectual property—that becomes more accessible as an organization's cloud footprint expands.
  • Identify over-provisioned employees who pose a risk for misuse of data or who could be potential targets for external hackers.
  • Surface orphan accounts, service accounts, or bot accounts that become prime targets for hackers.
  • Pinpoint API integrations that can result in data leaks
  • Recognize segregation of duties violations that put the business at risk for fraud.

Zilla Security Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Zilla Security has proven to be an invaluable tool for users in automating the user access review process. With Zilla, provisioning and cleanup of accounts has become much easier, eliminating the need for manual work. Users have found that the software's ability to automate quarterly access reviews has been instrumental in saving time and effort. By enabling quick and accurate documentation, Zilla allows users to easily provide evidence to auditors. The speed and efficiency of Zilla also empower users to conduct user access review campaigns more frequently, covering multiple systems without requiring additional staff.

Before implementing Zilla Security, users faced challenges in performing required user access reviews. However, with the software's centralized and auditable system for user access reviews, this process has become easy and efficient. Users can construct quarterly access review campaigns for sensitive systems without manual work, ensuring compliance with various compliance frameworks. One of the notable benefits of using Zilla is its ability to involve all stakeholders in the access review process, eliminating vague and incomplete reviews as well as convoluted tracking. This has resulted in more comprehensive and accurate access reviews.

Furthermore, Zilla Security has streamlined the manual process of access certification, reducing back-and-forth and helping users comply with security standards. The software's ease of use and auditor evidence capabilities have made the sales and implementation process pleasant and straightforward for users. Zilla's role-based access control features have also played a crucial role in identifying unexpected privileged accounts and facilitating timely provisioning and de-provisioning.

Overall, Zilla Security has had a significant impact on organizations by solving network security threats, ensuring data protection, and streamlining compliance with security standards. Whether it's scheduling periodic access reviews or reviewing access to financial controls, Zilla has proven to be a solid solution that replaces disparate methods and tools used throughout organizations.

User-Friendly Interface: Users have consistently praised Zilla Security for its user-friendly interface, with many reviewers stating that it is easy to use and navigate. The intuitive design of the platform allows even non-technical users to quickly understand and complete tasks efficiently.

Responsive Support Team: Reviewers have expressed their appreciation for the responsiveness and helpfulness of the Support and Product teams at Zilla Security. Customers report that the team promptly addresses any issues or concerns raised, providing timely assistance when needed.

Efficient Access Reviews: Many users find that Zilla Security simplifies the process of conducting access reviews through its automatic and user-friendly approach. With features like automated timing and an intuitive interface, administrators can easily manage user access rights without hassle.

  1. Setup Process: Some users have found the process of getting their data into the right format for Zilla Security to be time-consuming and not seamless, indicating a need for improvement in the setup experience.

  2. Management of Complex Identity Environments: Several reviewers have mentioned challenges with managing complex identity environments, such as difficulties in matching users to identities and manual account cleanup. This highlights a potential area where Zilla Security could enhance its functionality and provide more efficient solutions.

  3. Limited Application Integrations: A number of users have expressed a desire for additional application integrations, suggesting that the current integration options offered by Zilla Security may be limited. Expanding the range of supported applications would allow users to fully leverage the software's capabilities across various platforms and systems.

Sorry, no reviews are available for this product yet

Return to navigation