By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Palo Alto Networks completes purchase of CyberArk to advance identity security
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Mobile > Palo Alto Networks completes purchase of CyberArk to advance identity security
Mobile

Palo Alto Networks completes purchase of CyberArk to advance identity security

News Room
Last updated: 2026/02/13 at 10:50 PM
News Room Published 13 February 2026
Share
Palo Alto Networks completes purchase of CyberArk to advance identity security
SHARE

The cybersecurity company Palo Alto Networks has closed the purchase of CyberArkidentity security specialist. Palo Alto Networks thus places this capacity among the central pillars of its platformization strategy. The addition of CyberArk’s identity security platform to its portfolio allows Palo Alto Network to offer the ability to protect all company identities. Both human, machine and agentic.

Identity security is becoming increasingly important in protecting businesses, especially as they scale their use of cloud, automation, and AI. In this context, identity has become the main avenue of attack, driven by the rapid increase in human, machine and AI identities that continuously have privileged access to systems and data.

Additionally, machine identities outnumber human identities by more than 80 to 1, and 75% of organizations recognize that their human identities are governed by outdated and overly permissive privilege models. Attackers are increasingly exploiting weaknesses in identity management, making credential abuse and excessive privileges the main threat vectors.

Palo Alto Networks’ recently completed CyberArk purchase responds to this shift by extending privilege security controls beyond a group of administrators to all company identities.

By democratizing privileged access across human, machine, and AI identities, companies can reduce persistent privileges, limit lateral movement, and stop identity-based attacks more quickly. Companies that use identity-based security controls can accelerate the response to these breaches by preventing attackers from abusing excessive credentials and access.

Following the purchase, CyberArk identity security solutions will continue to be available as a standalone platform. Additionally, integration is already underway to incorporate the company’s capabilities into the Palo Alto Networks ecosystem of security products and services. The company’s current customers will not experience any interruptions in service.

According to the purchase agreement, once this is formalized, CyberArk shareholders have the right to receive $45 in cash for each share they own in the company, as well as 2.2005 Palo Alto Networks common shares for each of theirs.

Nikesh Arora, CEO and President of Palo Alto Networkshas highlighted that «the The new wave of AI agents will require us to secure all identities: human, machine, and agent. That’s why we acted decisively by announcing our intention to acquire CyberArk last July and I’m excited to see product integration begin. For our clients, this means the end of ‘identity silos’. “Now they can manage privileged access across their entire hybrid cloud environment from the same company they trust for Network Security and Security Operations, ensuring they are protected in the age of AI.”

Matt Cohen, CEO of CyberArkhas recognized that «bind forces with Palo Alto Networks creates the ultimate cyber guardian for the modern enterprise. It’s a win-win: our clients gain access to the most comprehensive security portfolio in the world and our employees become part of a global engine of innovation. “Together, we are creating the most robust combination of proven technologies to stop identity-driven breaches.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Top Emerging Niches for Pinterest Marketers Top Emerging Niches for Pinterest Marketers
Next Article This Sleek USB Gadget Uses Your iPhone Or Android Phone To Lock Your Data – BGR This Sleek USB Gadget Uses Your iPhone Or Android Phone To Lock Your Data – BGR
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Google Gemini and “distillation attacks”
Google Gemini and “distillation attacks”
Mobile
10 Weird USB Gadgets You Need To Check Out – BGR
10 Weird USB Gadgets You Need To Check Out – BGR
News
How to Post Affiliate Links on Pinterest without Looking Spammy
How to Post Affiliate Links on Pinterest without Looking Spammy
Computing
Apple might end up borrowing Samsung’s whole foldable strategy
Apple might end up borrowing Samsung’s whole foldable strategy
News

You Might also Like

Google Gemini and “distillation attacks”
Mobile

Google Gemini and “distillation attacks”

3 Min Read
which cars can circulate and which rest on February 14
Mobile

which cars can circulate and which rest on February 14

5 Min Read
Rewards, skins, and how to claim
Mobile

Rewards, skins, and how to claim

3 Min Read
Conclusion Strategies, a great ally for strategy and execution
Mobile

Conclusion Strategies, a great ally for strategy and execution

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?