CyberArk's U.S. headquarters in Newton, Massachusetts | |
| Company type | Public |
|---|---|
| Nasdaq: CYBR | |
| Industry | Software |
| Founded | 1999; 26 years ago (1999) |
| Founders |
|
| Headquarters | , Israel |
Key people |
|
| Products | Privileged Account Security |
| Revenue | |
| Total assets | |
| Total equity | |
Number of employees | 3,793 (2024) |
| Website | cyberark |
| Footnotes / references [1] | |
CyberArk Software Ltd. is an Israeli publicly tradedinformation security company offeringidentity management. The company's technology is utilized primarily in thefinancial services,energy,retail,healthcare andgovernment markets. CyberArk is headquartered inPetach-Tikva.[2][3] The company also has offices throughout theAmericas,EMEA,Asia Pacific andJapan.[4]
CyberArk was founded in 1999 in Israel[5][6] by Udi Mokady[7] andAlon N. Cohen.
In June 2014, CyberArk filed for aninitial public offering (IPO) with theSecurities and Exchange Commission, listing 2013 revenues of $66.2 million.[8] CyberArk became a public company the same year, trading on theNASDAQ as CYBR.[9]
In April 2022, it announced the expansion of its R&D center at the Gav-Yam Negev Tech Park inBeersheba, which it had opened in May 2021.[10]
In February 2023, CyberArk announced that Udi Mokady, who had led the company asCEO since November 2005, would transition out of that role and becomeexecutive chair of the company'sboard, with Matt Cohen taking over the reins as CEO after previously serving asCRO and COO since joining the company in 2019; this transition became effective in April 2023.[11][12]
In September 2023, CyberArk announced new details about its upcoming Artificial Intelligence Center of Excellence, designed in part by CyberArk Labs.[13]
In August 2024, it announced annual revenue of $868 million. Subscription revenue made up 78% of that amount.[14][15]
On July 30, 2025Palo Alto Networks announced it would buy CyberArk for $25 billion.[16]
In the years following its 2014 IPO, CyberArk has embarked on a string of acquisitions.
In August 2015, CyberArk acquired Cybertinel, an Israel-based company focused on threat detection, for an estimated $20 million.[17]
In October 2015, CyberArk acquired Viewfinity, a private Massachusetts-based company which specialized in privilege management and application control software, for $39.5 million.[18]
In March 2016, CyberArk acquired Agata Solutions, an Israel-based startup which developedDeep Packet Inspection (DPI) security solutions, for $3.1 million.[19][20]
In May 2017, CyberArk acquired Conjur Inc., a Massachusetts-based cybersecurity company which secured access for software development and IT teams that are building cloud-based software, for $42 million.[21]
In March 2018, CyberArk acquired the assets of Vaultive, a Boston-based cloud security provider. Twenty Vaultive employees, most from the company'sresearch and development team, joined CyberArk.[22]
In May 2020, CyberArk acquired Idaptive, a startup which focused on azero trust (ZT) approach to identity security, for $70 million.[23]
In March 2022, CyberArk acquired Aapi, Inc., anIrvine, California based startup focused on automatingidentity and access management, for $17.7 million.[24][25]
In August 2022, CyberArk acquired C3M, aSan Francisco, CA based startup which developed an API-based Cloud Security Posture Management (CPSM) solution, for $28.3 million.[26][27]
In October 2024, CyberArk completed its acquisition ofVenafi, a machine identity management company,[28] from the investment firmThoma Bravo for around $1.54 billion.[29][30]
In February 2025, CyberArk acquired Zilla Security, which focused on Identity Governance and Administration (IGA), in a deal for $165 million in cash and an additional $10 million earnout contingent on performance milestones.[31]
It sells subscriptions to what it has titled an Identity Security Platform.[14] Among other products, as of 2015 it has a Privileged Account Security Platform to "privileged accounts and an organisation' sensitive information." The platform aims to stop hackers from entering computer systems via either a breach of administrator or key account holder privileges.[32]