Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Palo Alto Networks to Acquire CyberArk in  Billion Deal

Palo Alto Networks to Acquire CyberArk in $25 Billion Deal

Posted on July 30, 2025July 30, 2025 By CWS

Palo Alto Networks, a frontrunner in cybersecurity, introduced right now that it has agreed to amass CyberArk, an organization identified for id safety, for about $25 billion. This transfer is predicted to alter the cybersecurity trade considerably.

The deal marks Palo Alto Networks’ strategic entry into the Identification Safety market, establishing it as a brand new core pillar within the firm’s multi-platform technique.

The acquisition will mix Palo Alto Networks’ AI-powered safety platforms with CyberArk’s famend management in Privileged Entry Administration (PAM). This integration goals to increase sturdy id safety throughout all sorts of customers, human, machine, and the rising class of autonomous AI brokers.

Below the phrases of the settlement, CyberArk shareholders will obtain $45.00 in money and a pair of.2005 shares of Palo Alto Networks widespread inventory for every CyberArk share they maintain. This represents a 26% premium over CyberArk’s latest common inventory value.

Palo Alto Networks Acquires CyberArk

Nikesh Arora, Chairman and CEO of Palo Alto Networks, described the timing as an inflection level for Identification Safety. “Our market entry technique has all the time been to enter classes at their inflection level, and we consider that second for Identification Safety is now,” Arora acknowledged.

He emphasised that the rise of AI and the proliferation of machine identities necessitate a safety mannequin the place each id has the suitable degree of privilege controls. “CyberArk is the definitive chief in Identification Safety with sturdy, foundational know-how that’s important for securing the AI period,” he added.

The strategic mixture is predicted to ship vital advantages, together with the acceleration of Palo Alto Networks’ platform technique by integrating CyberArk’s capabilities into its Strata™ and Cortex platforms.

This can present prospects with a unified answer to shut safety gaps and simplify operations. Moreover, the merger is poised to disrupt the standard Identification and Entry Administration (IAM) market by making use of security-first PAM ideas to each id.

A key focus of the acquisition will probably be securing agentic AI. As organizations more and more deploy autonomous AI brokers, these entities turn out to be the last word privileged customers. The mixed firm will present the important framework for securing this new workforce by imposing just-in-time entry and least privilege ideas.

Udi Mokady, Founder and Govt Chairman of CyberArk, hailed the deal as a “profound second” within the firm’s journey. “Becoming a member of forces with Palo Alto Networks is a strong subsequent chapter, constructed on shared values and a deep dedication to fixing the hardest id challenges,” Mokady mentioned. “Collectively, we’ll convey unmatched experience throughout human and machine identities, privileged entry, and AI-driven innovation to safe what’s subsequent.”

The transaction has been unanimously authorised by the boards of each corporations and is predicted to shut within the second half of Palo Alto Networks’ fiscal 12 months 2026, pending regulatory approvals and a vote by CyberArk shareholders.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Strive 50 Free Trial Searches

Cyber Security News Tags:Acquire, Alto, Billion, CyberArk, Deal, Networks, Palo

Post navigation

Previous Post: 5 Email Attacks SOCs Cannot Detect Without A Sandbox 
Next Post: FunkSec Ransomware Decryptor Released Free to Public After Group Goes Dormant

Related Posts

AWS Execution Roles Enable Subtle Privilege Escalation in SageMaker and EC2 AWS Execution Roles Enable Subtle Privilege Escalation in SageMaker and EC2 Cyber Security News
Linux Kernel Patching: Preventing Exploits in 2025 Linux Kernel Patching: Preventing Exploits in 2025 Cyber Security News
Wendy’s Franchise Database Allegedly Compromised Wendy’s Franchise Database Allegedly Compromised Cyber Security News
NETREAPER Offensive Security Toolkit That Wraps 70+ Penetration Testing Tools NETREAPER Offensive Security Toolkit That Wraps 70+ Penetration Testing Tools Cyber Security News
IXON VPN Client Vulnerability Let Attackers Escalate Privileges IXON VPN Client Vulnerability Let Attackers Escalate Privileges Cyber Security News
Threat Actors Leversges Google Cloud Services to Steal Microsoft 365 Logins Threat Actors Leversges Google Cloud Services to Steal Microsoft 365 Logins Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Amazon Quick’s Vulnerability Exposed AI Chat to Unauthorized Users
  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Amazon Quick’s Vulnerability Exposed AI Chat to Unauthorized Users
  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark