In partnership with

👋 Hi, it’s Rohit Malhotra and welcome to the FREE edition of Partner Growth Newsletter, my weekly newsletter doing deep dives into the fastest-growing startups and S1 briefs. Subscribe to join readers who get Partner Growth delivered to their inbox every Wednesday morning.

Latest posts

If you’re new, not yet a subscriber, or just plain missed it, here are some of our recent editions.

Partners

Hiring in 8 countries shouldn't require 8 different processes

This guide from Deel breaks down how to build one global hiring system. You’ll learn about assessment frameworks that scale, how to do headcount planning across regions, and even intake processes that work everywhere. As HR pros know, hiring in one country is hard enough. So let this free global hiring guide give you the tools you need to avoid global hiring headaches.

Interested in sponsoring these emails? See our partnership options here.

Subscribe to the Life Self Mastery podcast, which guides you on getting funding and allowing your business to grow rocketship. 

Previous guests include Guy Kawasaki, Brad Feld, James Clear, Nick Huber, Shu Nyatta and 350+ incredible guests.

Palo Alto-CyberArk acquisition

Introduction

Palo Alto's $2B+ CyberArk acquisition isn't a typical security bolt-on — it's a calculated identity play in a market that's been quietly becoming the biggest attack surface in enterprise security.

Palo Alto announced the deal last July. This month, it closed. The logic: machine identities now outnumber human ones by 80 to 1, and nearly 90% of organizations have already suffered an identity-centric breach. Credential abuse isn't a niche threat vector anymore. It's the dominant one.

On the surface: a large cybersecurity platform doing what large platforms do — acquire, integrate, consolidate. But look closer, and the logic gets sharper.

CyberArk wasn't struggling. It was isolated. It had built the gold standard in privileged access management, but PAM was becoming a point solution in a world demanding platforms. Meanwhile, Palo Alto had network security, cloud security, and SecOps — but a gaping hole where identity should sit.

The executives on both sides had watched enterprises consolidate vendor relationships for years. They knew standalone identity security was becoming a pillar, not a product category.

And here's the strategic efficiency: instead of two separate tools fighting for the same CISO budget, Palo Alto now owns the full stack — network, cloud, operations, and identity — with one throat to choke and one platform to sell.

History

Palo Alto Networks didn't start as a $100 billion cybersecurity platform with ambitions to own every layer of enterprise security. It started as a bet that the firewall — the most fundamental piece of network infrastructure — was broken.

Nir Zuk founded Palo Alto Networks in 2005 with a single premise: legacy firewalls couldn't see application traffic, and attackers knew it. His answer was the next-generation firewall — one that understood context, not just ports and protocols. No complex integrations. No stitched-together policies. Just a product built around visibility.

The timing was right. Enterprises were drowning in point solutions. Check Point and Cisco dominated the market but hadn't meaningfully innovated in years. Palo Alto found the gap — and drove a truck through it.

By 2012, it had gone public. By 2015, it was expanding beyond the firewall into threat intelligence, endpoint security, and cloud. The company made seventeen acquisitions in five years, each one filling a hole in what was becoming an ambitious platform play.

CyberArk followed a parallel trajectory — but in identity. Founded in Israel in 1999 by Udi Mokady, it spent its first decade solving a niche problem: securing privileged accounts that administrators used to access critical systems. Unglamorous work. Essential work. The kind that only gets noticed when something goes catastrophically wrong.

CyberArk went public in 2014. It grew steadily, expanded into cloud entitlements, secrets management, and workforce identity — quietly building the most comprehensive identity security portfolio in the market while larger vendors ignored the category.

Both companies watched the same threat landscape evolve: perimeter security collapsed. Cloud made networks irrelevant. Ransomware gangs discovered that stealing credentials was easier than breaking encryption. Identity became the new attack surface — and neither network security nor identity security alone was enough to stop it.

Then Nikesh Arora made his move. The deal was announced in July 2025. Seven months later, it closed — two former standalone leaders, one cap table, and a unified platform built for the era where your biggest security risk isn't a vulnerability in your code. It's a compromised identity with too much access.

Deal breakdown

Here's what makes the structure interesting: Palo Alto isn't hiding the price — but the math still tells a story. $45.00 in cash plus 2.2005 shares of PANW stock for every CyberArk share. A combined entity that now covers network security, cloud security, SecOps, and identity under one platform. Seventy thousand customers inheriting a new capability overnight.

The timeline tells the story.

July 2025: Palo Alto announces intent to acquire CyberArk.

February 11, 2026: Deal closes. Identity Security becomes a core pillar of Palo Alto's platformization strategy.

February 17, 2026: Q2 earnings call. Investors get the first look at what the combined business actually means for numbers.

But here's what Palo Alto actually built.

The product: CyberArk's Identity Security Platform — covering privileged access, secrets management, endpoint privilege controls, and AI identity governance — folded into the world's most comprehensive cybersecurity portfolio. Best-in-class identity tech meeting best-in-class distribution.

The geography: A global footprint with a notable twist. Palo Alto announces intent to dual-list on the Tel Aviv Stock Exchange under the ticker "CYBR" — a tribute to CyberArk's Israeli heritage and a signal that its R&D center there, already the largest outside Silicon Valley, becomes a primary global innovation hub.

The real play: Platformization economics. CISOs are exhausted by vendor sprawl. Palo Alto's entire strategy — its "platformization" motion — is built on convincing enterprises to consolidate security spend onto fewer vendors. Adding identity closes the last major gap. Now one vendor can cover the full attack surface.

What changes: CyberArk's solutions remain available as a standalone platform. Existing customers see no disruption. Integration is underway to infuse CyberArk's capabilities into the broader Palo Alto ecosystem — enterprise speak for the real consolidation comes later.

The deeper signal: Standalone identity security is a shrinking category. CyberArk as an independent company was the best at what it did — but "best at one thing" is increasingly a losing position when buyers want platforms. Palo Alto's betting that identity plus network plus cloud plus SecOps creates something genuinely difficult to displace. The alternative was CyberArk slowly losing deals to vendors that bundled identity as a feature rather than a product.

Value proposition

To understand why Palo Alto acquired CyberArk, you need to understand what identity security actually solves. Not another compliance checkbox. Not incremental access management improvements. A fundamentally different approach to the problem that matters most in modern enterprise security: the gap between having strong perimeter defenses and still getting breached.

The identity security architecture did one thing obsessively well — eliminate the blind spot between credential abuse and business impact. While network security tools excelled at stopping external threats, CyberArk was designed specifically for the threat that lives inside: the compromised identity with legitimate access that no firewall can stop.

Here's the product advantage: network security is a wall. It keeps attackers out — until it doesn't. Identity security is a governor. It assumes breach, limits what any identity can do, and stops lateral movement before attackers reach what they came for. Privileged access management, secrets management, endpoint privilege controls — not bolt-on features but core infrastructure for environments where a single compromised credential can unlock everything.

The real-world difference wasn't subtle. Machine identities now outnumber human ones 80 to 1. AI agents are multiplying faster than security teams can track them. Ninety percent of organizations have already suffered an identity-centric breach — not because their firewalls failed, but because attackers stopped trying to break through walls and started stealing keys instead.

And this mattered more as enterprise architecture shifted from on-premise to hybrid cloud. The perimeter dissolved. Identities became the new perimeter. CyberArk owned the layer where breaches actually happen.

The customer momentum validated the approach. From mid-market companies to global enterprises across financial services, healthcare, and critical infrastructure — organizations that could deploy any security vendor but chose CyberArk specifically because privileged access isn't a feature you want bundled as an afterthought.

The product differentiation, the category dominance, the gaping hole in Palo Alto's own platform. CyberArk wasn't building toward independence. It was building toward combination.

What it means for founders

The Palo Alto-CyberArk deal exposes a brutal truth about cybersecurity startups: category leadership without platform control is a consolidation target, not a defensible position.

Most security founders are fighting over features — better dashboards, faster threat detection, slicker integrations. It's the most obvious place to compete, which makes it the most expensive. You're racing against Palo Alto's next acquisition, fighting on breadth against platforms that bundle your category for free, and praying your standalone tool stays on the CISO's shortlist for another budget cycle.

CyberArk went one level higher: identity infrastructure. Privileged access management, secrets management, endpoint privilege controls on top of the credential layer every enterprise depends on. They didn't build better password vaults. They built the governance layer that sits between every human, machine, and AI agent and the systems they access. That positioning made them the most acquirable company in cybersecurity — and ultimately, not defensible as a standalone.

Palo Alto couldn't ignore CyberArk as a long-term independent because identity without network context is incomplete, and network security without identity controls has a fatal blind spot. CyberArk captured the most critical layer in enterprise security without controlling the distribution. That's why Palo Alto moved — before a competitor closed the gap first.

Now Matt Cohen leads the combined identity business, reporting into Palo Alto's platformization structure. The same company optimizing for consolidated revenue and CISO wallet share. Cohen built a company that dominated its category by staying focused and independent. He's walking into a structure where integration velocity matters more than standalone product vision.

The identity security leadership sounds like validation. It's actually a ceiling acknowledged. CyberArk merged because its leaders saw the compression coming. Microsoft bundles identity into Entra, Okta pushes into privileged access, CrowdStrike expands into identity threat detection — and suddenly your "standalone PAM" is a feature inside every platform vendor's portfolio.

Closing thoughts

The Palo Alto-CyberArk story isn't about disruption. It's about recognizing when standalone categories get absorbed into platforms — and consolidating before the market prices you as a line item.

Over two decades of category creation, a public market run that proved identity security was real infrastructure, and now an acquisition by the most acquisitive platform in cybersecurity. Not because CyberArk built inferior technology or lost product-market fit. Because they built the most critical security layer in the enterprise — and the platforms with distribution eventually came for it.

Everyone's obsessed with building moats. CyberArk built the identity layer. They connected privileged access controls to every human, machine, and AI agent touching enterprise infrastructure. That positioning made them valuable to exactly one type of buyer: whoever needed identity at platform scale without building from scratch.

Palo Alto wrote the check.

Here's what founders should take from this: in cybersecurity, the endgame is platform or acquired. The identity category isn't defensible long-term as a standalone — but it is essential. CyberArk saw Microsoft expanding Entra, CrowdStrike pushing into identity threat detection, Okta fighting for the same budget. They knew the independent window was narrowing.

Palo Alto gets the last major piece of its platform puzzle. CyberArk's leadership gets resources, distribution, and a runway to build AI identity capabilities no standalone company could fund at that speed.

That's not an exit. That's what happens when you build something so foundational that the largest platform in your industry can't afford to leave it independent.

Here is my interview with Akshat Mandloi, the co-founder of smallest.ai, a voice AI startup recently named among Inc42’s “30 Startups to Watch” for 2025.

If you enjoyed our analysis, we’d very much appreciate you sharing with a friend.

Tweets of the week

Here are the options I have for us to work together. If any of them are interesting to you - hit me up!

And that’s it from me. See you next week.

What do you think about my bi-weekly Newsletter? Love it | Okay-ish | Stop it

Reply

Avatar

or to participate

Keep Reading