Why I’m Thrilled to Introduce Zilla’s Modern IGA Platform: A Game-Changer for Identity Governance

by | Sep 26, 2024

Twenty years ago, I helped pioneer IGA at Aveksa. At the time, it was a great solution for the identity  compliance crisis driven by stringent regulatory requirements and the growing challenges of managing user entitlements.

Since that time, however, the world has changed significantly. An explosion of apps, the increasing complexity of user, role, and entitlement management, and the new concept of identity as a security perimeter have rendered  IGA as a space in need of significant overhaul. That’s why I started Zilla Security, and today I’m excited to introduce you to more innovation that yet again transforms the identity governance space.

Today, Zilla is pleased to announce the launch of our AI-powered Modern IGA Platform. With the introduction of Zilla AI Profiles™ and significantly enhanced provisioning capabilities, our team at Zilla is again changing the way organizations govern identity and access. We’re doing this by rethinking the age-old concept of roles, and using AI to automate role discovery and maintenance. And, we’re expanding upon our existing provisioning capabilities to automate and simplify enterprise joiner, mover, and leaver processes.

These innovations leverage the power of AI and automation to optimize traditionally complex, manual, and error-prone identity governance processes, and  bring immediate benefit to identity teams. I’m excited to tell you more about it.

Zilla AI Profiles: The Evolution Beyond Traditional Roles

For a long time, Zilla has been hearing from customers about their frustrations with the complexities around managing user roles, entitlements and permissions. Zilla felt that there had to be a better solution, and we wanted to harness the power of Artificial Intelligence and Machine Learning to engineer it. We’ve been hard at work on this new approach to roles, which we call Zilla AI Profiles.

Zilla delivers the next generation of role-based access control through purpose-built AI that analyzes the existing environment of users, apps, and entitlements, to define profiles for job-appropriate access. Zilla then enables centralized collaboration with the application, data and permission owners who possess the context to make access decisions and validate profiles.

The early results of activating AI Profiles in our customer environments have been phenomenal. We’ve seen the number of permissions that require review drop by as much as 75%. The impact of this is that IT and Identity teams can get time back from manual and redundant approval processes to focus on more strategic initiatives for the business.

Zilla also understands that, with the excitement of AI, there are also questions around data integrity and privacy and the use of AI within enterprise IT environments. Rest assured, Zilla’s AI methodology operates entirely within the customer’s environment, ensuring that no customer data leaves the environment or is shared externally.  We hope you’ll try out AI Profiles in your environment and let us know what you do with all of the time back it gives your team.

Enhanced Provisioning: Simplify User Lifecycle Management with 60% Fewer Tickets

Zilla has also significantly enhanced and expanded our provisioning capabilities to automate and simplify enterprise joiner, mover, and leaver processes.  Last year, when Zilla announced our self-service access request capabilities, we knew we wanted to take it a step further and add more automation and integration into user lifecycle management capabilities. We set to work building a solution that provides the necessary balance of security, timely access delivery and productivity.

After months of design, engineering, and testing, Zilla’s provisioning capabilities are here and will enable identity teams to provision users faster, with up to 60% fewer tickets. We do this through  Zilla AI Profiles, SCIM support and integrations with ITSM systems like ServiceNow and Jira Service Management. Zilla provisioning automates permissions changes, without compromising full transparency and auditability.

Zilla Identity Governance Automation is Here

The IGA space is long overdue for innovation, and I’m thrilled that Zilla is leading the charge on this much-needed transformation.

Please join our webinar on October 10th, where we’ll delve deeper into the trends driving these solutions and show you just how we can take the pain out of your IGA processes.

Author

  • Identity security leader Deepak Taneja smiles at the camera, in a blue and white checkered button-down shirt.

    Zilla Security Co-Founder, CEO & President Deepak Taneja is an entrepreneur and security expert with extensive experience founding and leading enterprise software companies. Deepak has been at the forefront of innovation in identity management for over 25 years.

    His vision for Zilla is to secure the enterprise by automating the management of permissions to all applications and data. Prior to Zilla Security, he founded and led Aveksa, a pioneer in identity governance, and was CTO at RSA Security after Aveksa was acquired by RSA.

    Previously, as CTO for Netegrity, he led the evolution of SiteMinder into an industry-leading web access management platform. An avid supporter of technology entrepreneurship, Deepak has served as a board member and advisor to several successful startups. Deepak holds a B. Tech in Electrical Engineering from the Indian Institute of Technology, Kanpur, and an M.S. in Electrical Engineering from the University of Florida.

    Connect with Deepak via LinkedIn.

    View all posts

Recent Posts

Modern IGA as a System of Record

A Modern Identity Governance & Administration (IGA) solution does more than govern identities—it can also serve as a comprehensive system of record.

Key Takeaways from a Discussion on Modern Identity Governance

Highlights of Zilla’s discussion on the need to modernize identity governance strategies. IGA experts covered the complex nature of IGA, the importance of automation and AI in a modern IGA strategy, and how to address the challenge of non-human identities.