CyberArk Software

CyberArk Software, established in 1999, is a leading global cybersecurity company headquartered in Newton, Massachusetts. It specializes in privileged access management, a critical aspect of identity security, with over half of the Fortune 500 companies as its customers. CyberArk's core offering helps businesses protect their most valuable assets by preventing cyber threats and stopping attack escalation. With around 9,000 customers across diverse industries and a presence in multiple countries, the company has transitioned to a subscription-based revenue model.

Udi Mokady

Founder and Executive Chairman

Eran Shimony

Principal Security Researcher

11 past transactions

Zilla Security

Acquisition in 2025
Zilla Security is a provider of identity governance and administration (IGA) solutions, offering a software-as-a-service (SaaS) platform designed to automate identity compliance, provisioning, and security processes. The platform includes application integration capabilities for both widely used and custom applications, facilitating a streamlined approach to identity management. Its Zilla AI Profiles feature simplifies the creation and maintenance of rules defining roles or groups, enhancing operational efficiency. By leveraging automation, Zilla Security enables organizations to optimize deployment, conduct access reviews, and manage provisioning with reduced effort and fewer IT service management tickets, ultimately supporting the security of customer data and user access across various cloud applications and infrastructure.

Venafi

Acquisition in 2024
Venafi, Inc. is a cybersecurity company that specializes in enterprise key and certificate management solutions. Founded in 2000 and headquartered in Salt Lake City, Utah, Venafi offers a range of products that enhance the security of machine identities, including the Venafi Director platform for comprehensive oversight of keys and certificates, Server Certificate Manager for certificate inventory security, and SSH Key Manager for improved threat intelligence. The company’s solutions enable organizations to secure machine-to-machine communications across various environments, including on-premises, virtual, cloud, and IoT. Additional offerings include Symmetric Key Manager, Mobile Certificate Manager, and Venafi Cloud for DevOps, which collectively help manage cryptographic keys and digital certificates efficiently. Venafi serves clients across multiple sectors, including financial services, healthcare, and telecommunications, addressing challenges such as compliance, risk management, and system availability. Through automated remediation and global visibility, Venafi mitigates risks associated with machine identities, ensuring secure communications within the extended enterprise.

Sweet Security

Seed Round in 2023
Sweet Security, established by seasoned IDF commanders, specializes in cloud runtime security. Their Cloud Runtime Security Suite empowers security teams to swiftly and precisely halt cloud attacks at the point of occurrence, minimizing business disruption. The platform ensures comprehensive security across cloud environments, shifting security right to protect cloud workloads.

Dig Security

Seed Round in 2022
Dig Security is a cloud data security startup that specializes in providing real-time visibility, control, and protection for data assets across multiple cloud environments. As enterprises face challenges related to data exfiltration and policy violations amidst increasingly complex database settings, Dig Security offers a cloud-native and agentless solution. Its platform enables businesses to effectively manage cloud data sprawl while ensuring the security of their data without hindering operational efficiency. By integrating Data Detection & Response (DDR) capabilities, Dig Security empowers organizations to discover, monitor, and protect their cloud data in real time, delivering comprehensive threat protection services for data stored in public cloud infrastructures.

aapi

Acquisition in 2022
AAPI is a developer of an integration and automation platform that enhances identity solutions, incident response platforms, and communications systems. The company specializes in streamlining identity and access management, identity governance, and administration by offering automated API functions. AAPI's platform improves existing solutions, enabling seamless, secure, and compliant identity experiences across various applications, including popular tools like Salesforce and Microsoft Teams. The company focuses on three core areas: identity automation, which allows organizations to respond to identity events across applications; embedded app functions, which enable users to perform real-time actions with ease; and micro access control, which provides granular access to specific application functions, advancing beyond traditional privileged access management and cloud access security broker solutions. Through these innovations, AAPI aims to help organizations efficiently manage and track identities while enhancing productivity and security.

Idaptive

Acquisition in 2020
Idaptive, LLC is a technology company based in Santa Clara, California, that specializes in next-generation access solutions aimed at enhancing security for organizations. Founded in 2018, Idaptive focuses on a Zero Trust approach to protect against data breaches by verifying users, validating their devices, and intelligently controlling access to applications and endpoints. The company's platform integrates multiple security features, including multi-factor authentication, single sign-on, provisioning and lifecycle management, risk analytics, and device security management. Idaptive's innovative solution is recognized in the industry for its ability to converge various security functions, thereby simplifying security management and promoting increased organizational confidence in digital business practices. As of May 2020, Idaptive operates as a subsidiary of CyberArk Software Ltd.

Vaultive

Acquisition in 2018
Vaultive is a provider of cloud data encryption services that addresses critical concerns surrounding cloud data security. The company offers a unique encryption in use technology that allows organizations to retain control and ownership of their data, even when it resides in the cloud. By enabling customers to hold the encryption keys, Vaultive empowers businesses to utilize cloud applications effectively while ensuring compliance, governance, and security. Its services facilitate the processing of encrypted data within cloud applications, allowing for tasks such as searching, indexing, and sorting without the need for decryption. This approach enables organizations to benefit from the efficiency and cost-effectiveness of cloud computing while maintaining the data security and control typically associated with on-premise solutions.

Conjur

Acquisition in 2017
Conjur is a developer of security software designed to support enterprises in automating their infrastructure while ensuring robust identity and access management. The company offers a platform that enables organizations to identify, authorize, and audit all service and user identities across various environments, including public and hybrid clouds, virtual machines, and containers. By focusing on the automation of machine identity provisioning, privileged access authorization, and service account control, Conjur addresses the critical operational and compliance challenges faced by businesses in highly automated software delivery processes. The platform enhances security by providing real-time monitoring and detailed activity reports, which are essential for compliance and security audits. With a growing emphasis on safeguarding sensitive IT systems amidst rising security threats, Conjur delivers vital infrastructure solutions that allow enterprises to adopt modern IT practices confidently. Its clientele includes notable organizations such as Discovery Communications, AOL, and Cisco.

Agata Solutions

Acquisition in 2016
Agata Solutions Ltd. is a cybersecurity firm based in Hod Hasharon, Israel, founded in 2008. It specializes in developing advanced cyber security solutions utilizing deep packet inspection (DPI) technology. Agata's offerings include network traffic management, security services, and a suite of tools for high-speed network forensics, which encompasses metadata analysis and dynamic policy rules. The company's products, including detection suites and network analytics, are designed to cater to the needs of government agencies, enterprises, and network operators, enhancing their network intelligence and security capabilities. As of September 2015, Agata Solutions operates as a subsidiary of CyberArk Software.

Viewfinity

Acquisition in 2015
Viewfinity, Inc. is a provider of application control and privilege management solutions designed to secure desktop, laptop, and server environments within enterprises. Founded in 2007 and based in Waltham, Massachusetts, with additional locations in Europe and Israel, the company offers products such as Privilege Management for Endpoints, which manages user rights for applications requiring elevated permissions, and Privilege Management for Servers, which enables granular control of permissions based on user roles. Viewfinity also features its Application Control software, which automates the processes of whitelisting and blacklisting applications. The company's solutions are particularly beneficial for sectors including healthcare, education, finance, government, energy, and utilities. As of October 2015, Viewfinity operates as a subsidiary of CyberArk Software, Ltd.

Cybertinel

Acquisition in 2015
Cybertinel is a company that specializes in cyber threat detection, focusing on identifying credential threats during the early stages of the attack cycle. With a combination of innovative technology and a team of skilled experts, Cybertinel enhances the capabilities of its partners, particularly CyberArk. Through its dedicated approach to security, the company aims to provide effective solutions that address emerging cyber threats, thereby contributing to the overall safety and integrity of its clients' digital environments.
Spot something off? Help us improve by flagging any incorrect or outdated information. Just email us at support@teaserclub.com. Your feedback is most welcome.