A Modern Identity Governance & Administration (IGA) solution does more than govern identities—it can also serve as a comprehensive system of record.

Zilla Security Co-Founder, CEO & President Deepak Taneja is an entrepreneur and security expert with extensive experience founding and leading enterprise software companies. Deepak has been at the forefront of innovation in identity management for over 25 years.
His vision for Zilla is to secure the enterprise by automating the management of permissions to all applications and data. Prior to Zilla Security, he founded and led Aveksa, a pioneer in identity governance, and was CTO at RSA Security after Aveksa was acquired by RSA.
Previously, as CTO for Netegrity, he led the evolution of SiteMinder into an industry-leading web access management platform. An avid supporter of technology entrepreneurship, Deepak has served as a board member and advisor to several successful startups. Deepak holds a B. Tech in Electrical Engineering from the Indian Institute of Technology, Kanpur, and an M.S. in Electrical Engineering from the University of Florida.
Connect with Deepak via LinkedIn.
Why I’m Thrilled to Introduce Zilla’s Modern IGA Platform: A Game-Changer for Identity Governance
Zilla is pleased to announce the launch of our AI-powered Modern IGA Platform, with the introduction of Zilla AI Profiles™ and enhanced provisioning capabilities.
Guide to NYDFS Compliance: How Zilla Can Help
See how Zilla’s identity governance platform generates comprehensive audit reports, ensuring seamless adherence to NYDFS requirements.
Integrations Drive Identity Governance
The value you get from IGA (Identity Governance and Administration) solutions has always been proportional to your governance.
2023 was a Defining year for Zilla Security. Here’s What it Signals for the Industry.
Zilla Security’s record-breaking growth is a positive sign of market shift towards security-first…
The problems with featherweight IGA – what Identity Provider vendors don’t tell you!
You deployed an identity provider (IdP) solution for single-sign-on (SSO) for your cloud applications, and the project went well. You onboarded seventy-five SaaS apps to your IdP, got identity federation working with your AWS, Azure or GCP infrastructure, and all was...
Bulletproof access provisioning is essential to identity security
The daily news about data breaches always details what data was stolen by hackers or rogue insiders but never mentions the broken access provisioning processes that are often at fault. Establishing the right joiner-mover-leaver and access request processes is critical...
SSPM and CIEM are valuable feature sets, but do you really want a patchwork of identity security?
When I talk to customers and partners, I often get questions about the plethora of point solutions related to identity security and how they differ from one another. The growing alphabet soup of industry acronyms has made it increasingly difficult for overloaded...
A new lens for IGA
Identity is taking center stage in IT and security circles, so I wanted to share my thoughts on changes driving Identity Governance and Administration (IGA).
Identity security complements cloud security posture management
Cloud Security Posture Management (CSPM) solutions help you secure your cloud platforms and your development pipeline on those platforms. CSPM provides you with an infrastructure-centric perspective on cloud security. The cloud, however, is more than just platforms...
Why enterprises struggle with legacy identity governance & administration
Traditionally, Identity Governance and Administration (IGA) solutions are known to help organizations improve their compliance and audit performance. But for companies looking for a solution that includes cloud platforms and SaaS services with fast time to value,...
Identity governance meets cloud security in identity security
I’m excited to announce that Zilla Security has closed a $13.5M Series A venture round with Tola Capital, FirstMark Capital, and Pillar VC. Zilla’s mission is to automate identity security for organizations of all sizes and help businesses grow their cloud footprint...
Access compliance for FinTech start-ups: What to know
So-called “FinTech” firms are shaking up the financial services industry with new approaches to solving old problems. But new companies still have to play by the old rules, including financial industry regulations for monitoring user entitlements and access.Here’s...
Context is the new perimeter
A new adage is emerging in the cloud security world that context is the new perimeter. If you believe this, and there is every reason to believe it, then it begs the question - Where is this context? Why has the shift to the cloud made context so much more important?...
Cloud misconfigurations
In my previous blog, I outlined the enormous benefits of the rapidly growing SaaS and cloud services model for software, and also touched on the inherent security risks of misconfigurations and how they’re going largely unaddressed. These risks are substantial, so...