Logo Inalogy
EN

    Inalogy Logo

    Your IAM Expert.

    +421 2 3810 1152
    info@inalogy.com

    INALOGY a.s.
    Černyševského 48
    851 01 Bratislava
    Slovakia

    • Home
    • About
    • Solutions
      • Identity Management Solutions
      • Access Management Solutions
      • Identity and Access Management Solutions
      • Identity Governance Solutions
      • Privileged Access Management Solutions
      • Network Security Solutions
    • What’s new
    • Case studies
    • Careers
    • Contact
    • Home
    • About
    • Solutions
      • Identity Management Solutions
      • Access Management Solutions
      • Identity and Access Management Solutions
      • Identity Governance Solutions
      • Privileged Access Management Solutions
      • Network Security Solutions
    • What’s new
    • Case studies
    • Careers
    • Contact

    +421 2 3810 1152 info@inalogy.com

    Legal information and personal data protection

    © INALOGY a.s. LinkedIn

    IAM Solution Inalogy
    • Home
    • Solutions
    • What’s new
    • Case studies
    • About
    • Contact
    EN
    InalogyWhat's newPalo Alto Networks Acquires CyberArk: What It Means for European IAM

    Palo Alto Networks Acquires CyberArk: What It Means for European IAM

    5 mins read
    17 mar 26

    The $25 Billion Deal That Reshapes Privileged Access Management

    In February 2026, Palo Alto Networks officially closed its $25 billion acquisition of CyberArk Software – the largest cybersecurity deal in history. First announced in July 2025, this move brings one of the world’s leading Privileged Access Management (PAM) vendors under the umbrella of a network security giant.

    For IT security leaders across Europe, this is not just another tech M&A headline. It fundamentally changes the dynamics of identity security – and it raises questions every CyberArk customer should be asking right now.

    What Happened

    CyberArk, founded in 1999 in Israel and publicly traded on NASDAQ (CYBR), has been a dominant force in PAM for over two decades. With approximately $1 billion in annual revenue (2024), 3,800+ employees, and an Identity Security Platform used by financial services, healthcare, energy, and government organisations worldwide, it was the gold standard in privileged access.

    Palo Alto Networks – primarily known for firewalls, SASE, and cloud security – announced the acquisition on July 30, 2025. The deal closed in February 2026.

    What followed immediately was sobering: layoffs affecting over 10% of CyberArk’s global workforce, both in Israel and internationally. Palo Alto also announced plans for a dual listing on the Tel Aviv Stock Exchange.

    Key facts:

    • Deal value: $25 billion
    • Announced: July 30, 2025
    • Closed: February 2026
    • Immediate impact: 10%+ workforce reduction at CyberArk
    • Strategic rationale: Palo Alto fills its identity security gap; CyberArk gets access to Palo Alto’s enterprise sales machine

    CyberArk’s Acquisition Spree Before the Acquisition

    It’s worth noting that CyberArk itself was on an aggressive buying spree before being acquired:

    • Venafi (October 2024) — machine identity management, $1.54 billion from Thoma Bravo
    • Zilla Security (February 2025) — Identity Governance and Administration (IGA), $165 million
    • Idaptive (2020) — Zero Trust identity, $70 million

    CyberArk was clearly building a comprehensive identity security platform. Now all of this — PAM, IGA, machine identity, workforce identity — sits inside Palo Alto Networks.

    What This Means for European Organisations

    1. Vendor Consolidation Risk

    Palo Alto’s strategy is clear: platformisation. They want customers buying firewall, SASE, SOC, and identity from one vendor. For CyberArk customers, this means increasing pressure to adopt the full Palo Alto stack — or face deprioritisation as a standalone PAM customer.

    2. European Data Sovereignty Concerns

    Both CyberArk and Palo Alto Networks are US-Israeli companies. In the context of NIS2, DORA, and growing European data sovereignty requirements, having your privileged access management controlled by a US-headquartered mega-vendor raises compliance questions that boards and DPOs need to evaluate.

    3. Product Roadmap Uncertainty

    Post-acquisition integrations typically take 18–24 months. During this period, expect:

    • Feature freeze or slowdown on standalone CyberArk products
    • Integration of CyberArk into Palo Alto’s Cortex/Prisma ecosystem
    • Potential sunsetting of overlapping capabilities
    • Pricing model changes as products get bundled

    The 10%+ layoffs are already a signal: Palo Alto is restructuring, and some institutional knowledge will be lost.

    4. The Open-Source Alternative Exists

    The acquisition highlights a broader industry trend: commercial IAM vendors are consolidating, creating larger, more complex, and more expensive platforms. Meanwhile, a mature open-source identity stack already exists:

    • midPoint (Identity Governance & Administration) — full IGA platform: identity lifecycle, RBAC, provisioning, audit. Developed by Evolveum in Slovakia, licensed under EUPL.
    • Keycloak (Access Management) — enterprise SSO, federation, MFA, OAuth2/OIDC. Developed by Red Hat, Apache 2.0 licence.
    • Apache Guacamole (Privileged Session Management) — clientless remote desktop gateway via web browser, supporting RDP, VNC, and SSH. Provides session recording, access control, and audit trails — directly comparable to CyberArk’s Privileged Session Manager. Apache 2.0 licence, maintained by the Apache Software Foundation.

    Together, these three projects cover the core of what CyberArk (now Palo Alto) offers across IGA, AM, and privileged session management — without vendor lock-in, with full source code transparency, and at a fraction of the cost.

    Key advantages of the open-source stack:

    • No vendor lock-in — EUPL and Apache 2.0 licences guarantee perpetual access
    • European development — midPoint is developed in Slovakia, Keycloak and Guacamole are Apache Foundation projects with global contributor communities
    • Full transparency — source code is auditable, critical for regulated industries under NIS2 and DORA
    • Lower TCO — no per-user licensing fees, no platform bundling pressure
    • Modular architecture — use what you need, replace what you don’t. No all-or-nothing platform commitment

    CyberArk’s credential vaulting technology remains strong — but with Guacamole handling privileged sessions, midPoint managing identity governance, and Keycloak securing access, European organisations have a credible, fully open-source path that covers the vast majority of identity security use cases.

    What Should CyberArk Customers Do Now?

    1. Audit your CyberArk dependency. Understand exactly which CyberArk products you use, what your contract terms are, and when renewals come up.

    2. Evaluate your IAM architecture holistically. PAM is one piece. If you’re also relying on CyberArk (now Palo Alto) for IGA or workforce identity, consider whether that concentration of risk is acceptable.

    3. Assess open-source for IGA and AM. midPoint and Keycloak are production-ready, enterprise-grade platforms deployed across European financial institutions, government agencies, and universities. They can coexist with CyberArk PAM while reducing single-vendor dependency.

    4. Watch the pricing. Post-acquisition pricing changes are inevitable. Lock in terms now if you can, and build optionality into your architecture.

    5. Plan for NIS2 and DORA. Both regulations emphasise supply chain risk and ICT third-party management. A $25 billion acquisition of your PAM vendor by a US network security company is exactly the kind of event your risk assessment should cover.

    How Inalogy Can Help

    At Inalogy, we specialise in building identity infrastructure on open-source foundations — midPoint for Identity Governance, Keycloak for Access Management, and Apache Guacamole for Privileged Session Management. We’ve developed our own connector between midPoint and Keycloak, enabling deep integration between the two platforms.

    As an Evolveum Silver Partner and a European IAM implementor with ISO 27001 certification, we help organisations:

    • Build a vendor-independent IAM architecture using proven open-source platforms
    • Migrate away from proprietary IAM solutions — including CyberArk — where it makes sense
    • Deploy Guacamole as a transparent, auditable alternative to commercial privileged session management
    • Meet NIS2 and DORA compliance requirements with full control over your identity infrastructure

    The identity security landscape just changed. If you’re re-evaluating your IAM strategy, we’d be happy to help.

    Talk to our IAM experts →

    Want to read more ?

    Why We Co-Founded IAM Factory — and What It Means for European Identity Management

    For over a decade, Inalogy has been helping organizations across Europe implement and integrate identity…
    4 mins read
    12 mar 26
    Read more

    MidPoint Earns Cybersecurity Made In Europe Badge: What This Means for Identity Data Sovereignty

    The “Cybersecurity Made In Europe” label represents a rigorous certification standard that validates complete European…
    5 mins read
    15 jul 25
    Read more

    Open Source Identity Management Solutions: Is Open Source Really Free?

    The allure of open source identity management solutions is undeniable. When enterprise vendors like SAP…
    7 mins read
    01 jul 25
    Read more
    IAM Solution Inalogy

    Your IAM Expert.

    Inalogy a.s.

    VAT ID: SK2121853778
    REG ID: 55043712

    Digital Park II, Einsteinova 23
    851 01 Bratislava
    Slovakia

    Our solutions

    • Identity Management Solutions
    • Access Management Solutions
    • Identity and Access Management Solutions
    • Identity Governance Solutions
    • Privileged Access Management Solutions
    • Network Security Solutions
    • Home
    • About
    • What’s new
    • Case studies
    • Careers
    • Contact
    • FAQ
    IAM Solution Inalogy

    Your IAM Expert.

    +421 2 3810 1152

    info@inalogy.com

    LinkedIn

      Request a demo

      Let's arrange a 30 minutes call and our consultants will show you how Inalogy IAM eases you from operations efforts and significantly increases security posture.

      This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.