Palo Alto Networks/CyberArk Acquisition: Identity Has Always Been the Endpoint
On July 30, Palo Alto Networks (PAN) announced plans to acquire CyberArk, giving a primary provider of endpoint and network security a significant position in identity and privileged access management services. The deal carries a price tag of $25bn, is expected to close in the second half of 2026, and follows PAN’s recent acquisition of Protect AI, an AI-enabled access management solution.
Key takeaways
- Integration across the cybersecurity value chain continues. Driven partly by demands from Chief Information Security Officers (CISOs) and others to reduce complexity in cyber risk solutions, as well as calls for better integration, this deal is just the latest in an innovating and consolidating industry, following Google’s acquisition of Wiz (est. $32bn, March 2025) and Cisco’s acquisition of Splunk (est. $28bn, March 2024).
- The future vision for both firms becomes clearer. The deal is a net positive move for the industry and buyers. The acquisition simplifies the vendor landscape and strengthens the ability of businesses to secure connections and identities across existing endpoints, clouds and AI systems with fewer moving parts and air gaps. The acquisition spotlights the unique focus on identity security for AI, agents and agentic systems, both for managing machine identities and enforcing policy for AI applications. Identity gets the recognition it deserves as the ultimate endpoint.
- Risks exist in the near to mid-term. $25bn is a hefty price tag. Expanding PAN’s portfolio to the identity market may present some integration risks and impact product road maps. While Chartis sees all three of these acquisitions as positive moves for the RiskTech industry, CISOs and Chief Risk Officers (CROs) should be prepared to clarify support continuity, future product plans and contract implications.
Discussion
Compared to recent deals by Google and Cisco, the combination of CyberArk and PAN results in a net-new portfolio of almost 100 cybersecurity products and solutions across more than 10 portfolios, including access management, secure cloud access, privileged access, endpoint, identity governance, machine identity, next gen firewalls, Secure Access Service Edge (SASE) and Security Operations Center (SOC). These portfolios are supported by threat intelligence, assessment and response services, all of which will be impacted by AI development and the risks that AI deployments present to users. While we expect these individual portfolios to remain intact for the foreseeable future, it is reasonable to expect an initial strategy to align on AI for cyber overall, as well as these four solution areas: endpoint management, cloud access security broker (CASB), cyberoperations and security services.
Benefits
The acquisition underscores the notion that identity is clearly the new endpoint, both for users and machines. The line between identity and endpoint is not just blurring, as CrowdStrike, Microsoft and others suggest. CISOs need to acknowledge that the line has completely disappeared. Identity security is the cornerstone of defense against modern threats, especially with the accelerating adoption of AI and agents (many of which operate at elevated privileges by default). As a new product portfolio begins to surface, combining identity services with zero trust features, for example, should prove helpful in mitigating risk ransomware, lateral movement and data exfiltration resulting from the abuse of human, machine or agent identities.
Risks
In the near term, this planned acquisition presents users with a few important strategic and operational considerations related to enterprise security posture, vendor management and future technology directions. For example, on future technological direction, both firms are clearly focused on the impact of AI on business and their individual product portfolios:
- Identity security for AI.
- Agents and agentic systems for managing machine identities and enforcing policy for AI applications at CyberArk.
- AI-powered network security and cyber operations at PAN.
As these individual strategies begin to sync up, executives responsible for deploying and governing AI for both customer and enterprise-facing applications will need to evaluate how well a ‘unified’ platform delivers in practice.
Customers and prospects should consider the following as near-term risk considerations:
- Transition risk. Watch integration roadmaps closely. Cyber risk executives should prepare for potential changes in licensing, and should be ready to evaluate integration and how a merged ‘platform’ evolves and is ultimately introduced to the market. The loss of best-of-breed features or product delays from integration turbulence may create transition risks as well as new opportunities. Vendor consolidation often offers cost efficiencies but can also reduce best-of-class functionality and choices in architecture. Existing CyberArk customers should review support commitments and interoperability plans post-merger. And with PAN now formally incorporating identity security as a core pillar in its cyber platform, organizations may need to reassess their long-term identity, access management and identity governance strategies. Executives should benchmark the combined roadmap against alternatives, especially those offering strong ecosystem partnerships and open architecture.
- Financial risk. The price tag for the acquisition is significant, representing a premium over CyberArk’s recent share price. This could result in market skepticism about the scale of the deal and the integration risk. Given that both firms cover a sizable market, CISOs or CROs should remain aware of the underlying financial and operational health of these and all critical vendors to ensure continuity, resilience and proper support going forward.
Only users who have a paid subscription or are part of a corporate subscription are able to print or copy content.
To access these options, along with all other subscription benefits, please contact info@chartis-research.com or view our subscription options here: https://www.chartis-research.com/static/become-a-member
You are currently unable to print this content. Please contact info@chartis-research.com to find out more.
You are currently unable to copy this content. Please contact info@chartis-research.com to find out more.
Copyright Infopro Digital Limited. All rights reserved.
As outlined in our terms and conditions, https://www.infopro-digital.com/terms-and-conditions/subscriptions/ (point 2.4), printing is limited to a single copy.
If you would like to purchase additional rights please email info@chartis-research.com
Copyright Infopro Digital Limited. All rights reserved.
You may share this content using our article tools. As outlined in our terms and conditions, https://www.infopro-digital.com/terms-and-conditions/subscriptions/ (clause 2.4), an Authorised User may only make one copy of the materials for their own personal use. You must also comply with the restrictions in clause 2.5.
If you would like to purchase additional rights please email info@chartis-research.com