{"id":15788,"date":"2026-02-12T12:19:09","date_gmt":"2026-02-12T12:19:09","guid":{"rendered":"https:\/\/newestek.com\/?p=15788"},"modified":"2026-02-12T12:19:09","modified_gmt":"2026-02-12T12:19:09","slug":"palo-alto-closes-privileged-access-gap-with-25b-cyberark-acquisition","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=15788","title":{"rendered":"Palo Alto closes privileged access gap with $25B CyberArk acquisition"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>Cybersecurity company Palo Alto Networks has <a href=\"https:\/\/www.csoonline.com\/article\/4031259\/palo-alto-networks-to-buy-cyberark-for-25b-as-identity-security-takes-center-stage.html?utm=hybrid_search\" target=\"_blank\">completed<\/a> its $25 billion acquisition of Israel-based identity security firm CyberArk, bringing privileged access and identity security into the core of its platform strategy.<\/p>\n<p>With this acquisition, Palo Alto aims to extend privileged access controls across human, machine, and AI identities, reduce standing privileges, limit lateral movement, and stop identity-based attacks faster, the company said.<\/p>\n<p>The deal also marks what the company <a href=\"https:\/\/www.paloaltonetworks.in\/company\/press\/2026\/palo-alto-networks-completes-acquisition-of-cyberark-to-secure-the-ai-era\" target=\"_blank\" rel=\"noreferrer noopener\">describes<\/a> as the end of \u201cidentity silos,\u201d enabling customers to manage privileged access across hybrid cloud environments through a unified platform, said Nikesh Arora, Chairman and CEO of Palo Alto Networks, in a statement.<\/p>\n<p>According to Palo Alto, organizations that use identity-driven security controls can accelerate their breach response by up to 80% by preventing attackers from abusing credentials and obtaining excessive access.<\/p>\n<h2 class=\"wp-block-heading\" id=\"closing-the-privileged-access-gap\">Closing the privileged access gap<\/h2>\n<p>The move comes at a time when identity has emerged as one of the most targeted layers in enterprise attacks, driven by the rapid adoption of cloud, automation, and AI.<\/p>\n<p>\u201cIn a cloud-first world, the network perimeter has largely disappeared, and identity has become the new perimeter, with most major breach reports showing that compromised credentials are central to attacks. The rise of agentic identity makes this even more urgent as enterprises deploy autonomous AI agents that read emails, query databases, and trigger workflows. These agents operate 24\/7 and often hold broad permissions to function reliably,\u201d said Pareekh Jain, CEO at EIIRTrend &amp; Pareekh Consulting.<\/p>\n<p>If an attacker compromises an AI agent\u2019s identity, they can execute attacks at machine speed, exfiltrating data or disrupting systems faster than human teams can respond, Jain pointed out.<\/p>\n<p>That is the layer <a href=\"https:\/\/www.csoonline.com\/article\/575343\/cyberark-s-enterprise-browser-promises-zero-trust-support-policy-management.html?utm=hybrid_search\">CyberArk<\/a> has traditionally focused on securing. The company specializes in privileged access management, and its expertise in securing credentials, passwords, and privileged accounts across hybrid, multi-cloud, and on-premises environments has made it a key player for enterprises seeking to protect their most sensitive accounts.<\/p>\n<p>And while network, cloud, and endpoint visibility are areas where Palo Alto is already present, analysts say the CyberArk acquisition strengthens a capability that was not deeply native to its platform.<\/p>\n<p>\u201cThe integration will strengthen Palo Alto\u2019s <a href=\"https:\/\/www.csoonline.com\/article\/4126694\/zero-trust-in-practice-a-deep-technical-dive-into-going-fully-passwordless-in-hybrid-enterprise-environments.html?utm=hybrid_search\">zero trust<\/a> strategy by embedding CyberArk\u2019s PAM, Identity Provider from Idaptive, and Identity Governance from Zilla into its network, cloud, and SOC tools like Prisma and Cortex, enabling unified visibility, automated privilege enforcement, and protection for human, machine, and AI agent identities,\u201d added Jain.<\/p>\n<p>For Palo Alto Networks, this fills a core gap in a platform strategy because identity is the policy anchor for Zero Trust access and enforcement. It should strengthen the \u201creduce standing privilege and blast radius\u201d story across cloud, endpoint, and SecOps workflows, not as a bolt-on but as a first-class pillar, said Chirag Mehta, vice president and principal analyst at Constellation Research.<\/p>\n<h2 class=\"wp-block-heading\" id=\"customer-impact-and-integration-risks\">Customer impact and integration risks<\/h2>\n<p>While Palo Alto is integrating CyberArk\u2019s capabilities into its security ecosystem, the company will continue to offer CyberArk\u2019s identity security solutions as a standalone platform.<\/p>\n<p>This signals continuity and roadmap stability for existing customers in the near term. \u201cStandalone CyberArk availability is expected to continue, now backed by Palo Alto\u2019s global scale, expanded support, Unit 42 threat intelligence, and AI-driven analytics for stronger real-time risk detection,\u201d added Jain.<\/p>\n<p>However, Devroop Dhar, MD at Primus Partners, says the risk, as with any acquisition, is transition friction. \u201cProduct roadmaps may shift, interfaces change, and customers worry that pricing bundles or licensing models will evolve. Some may also worry about vendor lock-in as identity becomes tightly coupled with a single broader platform,\u201d he said.<\/p>\n<p>On the other hand, enterprises using Palo Alto had to work with other vendors to get identity governance or privileged access. Now, identity becomes a native part of the platform story, which can simplify Zero Trust programs by linking privileged identity controls to network, cloud, and SecOps enforcement, noted Mehta.<\/p>\n<p>The upside is better end-to-end policy and faster response when identity is the initiating signal, Mehta said. \u201cThe watch-out is how smoothly Palo Alto integrates the tech and licensing without adding complexity or disrupting existing identity ecosystems.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"race-to-own-the-identity-plane\">Race to own the identity plane<\/h2>\n<p>As security platforms continue to converge, vendors are moving away from standalone point solutions toward unified ecosystems that combine network, cloud, endpoint, and identity controls under a single architecture. This shift reflects growing enterprise demand for integrated visibility and policy enforcement rather than fragmented toolsets.<\/p>\n<p>\u201cIn putting identity deeply into its stack, Palo Alto moves closer to competing with Microsoft\u2019s identity-centric approach and with broader platform players combining endpoint, cloud, and access security,\u201d Dhar said. Jain noted that this acquisition also positions Palo Alto as a full-stack identity player in identity security (PAM, IGA, IdP), challenging Okta and others by combining CyberArk\u2019s depth with superior threat detection and SASE.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity company Palo Alto Networks has completed its $25 billion acquisition of Israel-based identity security firm CyberArk, bringing privileged access and identity security into the core of its platform strategy. With this acquisition, Palo Alto aims to extend privileged access controls across human, machine, and AI identities, reduce standing privileges, limit lateral movement, and stop identity-based attacks faster, the company said. The deal also marks&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=15788\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15788","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15788","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15788"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15788\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15788"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15788"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15788"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}