OpenIntel Logo Black

Contents

CyberArk Economic Audit

1. Executive Summary: The Architecture of Complicity

This forensic audit was commissioned to map the economic, operational, and ideological footprint of CyberArk Software Ltd., with the specific objective of determining the company’s level of complicity in supporting the State of Israel’s military-industrial complex, occupation infrastructure, and systems of surveillance. The investigation integrates financial disclosures, corporate genealogies, supply chain audits, and strategic foreign direct investment (FDI) data to construct a comprehensive profile of the subject.

The forensic analysis indicates that CyberArk is not merely a passive commercial entity operating within the Israeli technology sector. Rather, it functions as a Structural Pillar of the Israeli cybersecurity ecosystem, a status confirmed by its deep integration with state defense apparatuses, its reliance on military-trained human capital, and its strategic role in securing the “Digital Iron Dome”—the nation’s critical infrastructure defense grid.

Founded in 1999 by veterans of the Israel Defense Forces (IDF) intelligence units, CyberArk commercialized the operational security doctrines of Unit 8200 and Mamram (Center for Computing and Information Systems). The company’s core technology, the “Network Vault,” is a direct commercial adaptation of military-grade information compartmentalization strategies. Over the past two and a half decades, CyberArk has evolved from a niche security vendor into an “Aggregator,” absorbing smaller Israeli defense startups and consolidating their intellectual property into a global platform. This process effectively privatizes and monetizes the R&D output of the Israeli military, creating a feedback loop of capital and technology between the IDF and the NASDAQ.

The audit identifies the pending $25 billion acquisition by Palo Alto Networks 1 as a critical inflection point. This transaction, finalized during the “Swords of Iron” war (2023–2026), represents a massive injection of foreign liquidity into the Israeli war economy. It signals to the global market that the Israeli technology sector remains a viable investment destination despite geopolitical instability and allegations of genocide, thereby providing crucial economic legitimacy to the state during a period of international isolation.

Furthermore, the company’s spatial footprint—specifically its expansion into the Beersheba “CyberSpark” industrial park—demonstrates active participation in the state’s strategic objective to Judaize the Negev region and displace indigenous Bedouin populations.3 By anchoring its R&D operations in this government-designated cyber capital, CyberArk physically and operationally integrates itself with the IDF’s technology campus and the National Cyber Directorate.

Consequently, this report classifies CyberArk Software Ltd. as a Level 5: Structural Pillar on the complicity band scale. The company serves as a vital node in the state’s security architecture, provides economic resilience during conflict, and ideologically aligns itself with the military objectives of the State of Israel.

2. Historical Genealogy: The Military-Corporate Nexus

To understand the economic complicity of CyberArk, one must first deconstruct its origins. The company was not formed in a vacuum of private enterprise; it is a direct biological product of the Israeli military’s human capital development pipeline. The “Start-Up Nation” narrative often obscures the reality that many flagship Israeli firms are essentially commercial spin-offs of the defense establishment. CyberArk is a quintessential example of this phenomenon.

2.1 The Unit 8200 and Mamram Pipeline

The foundational DNA of CyberArk is derived from two specific units within the Israel Defense Forces: Unit 8200 (Signals Intelligence/SIGINT) and Mamram (Center for Computing and Information Systems). These units function not only as military operational centers but as de facto incubators for the country’s high-tech elite.

The company was founded in 1999 by Alon N. Cohen and Ehud (Udi) Mokady.4 The division of labor between these two founders mirrors the division of labor within the IDF’s technological directorates. Alon Cohen, who served in Mamram, was responsible for the technical architecture. During his service, Cohen identified a critical vulnerability in how sensitive information was stored and accessed within military networks. The story of his inspiration—a personal letter hacked and distributed by a fellow soldier—serves as the foundational myth of the company.6 However, the solution he engineered, the “Network Vault,” was not merely a civilian invention; it was a commercial application of the rigid compartmentalization protocols required in military data centers. The “Vault” creates a hardened perimeter within a network, isolating privileged credentials—a digital equivalent of a secure facility (SCIF) used for handling classified intelligence.

Udi Mokady, the long-serving CEO and current Executive Chairman, brought the operational intelligence perspective. Mokady served in Unit 8200, the IDF’s elite intelligence gathering unit.7 Unit 8200 is frequently compared to the US National Security Agency (NSA), but with a broader mandate that includes offensive cyber operations and deep integration with combat units. Mokady’s background in intelligence provided the strategic vision for the company: understanding that the “insider threat” (a compromised user with high privileges) is the most dangerous vector for espionage and sabotage. This doctrine is central to Israeli intelligence operations, which often rely on turning human assets or compromising credentials to infiltrate adversary networks. By commercializing the defense against these tactics, Mokady effectively monetized the offensive capabilities he studied during his service.

The synergy between Cohen’s Mamram-derived infrastructure focus and Mokady’s Unit 8200-derived threat intelligence focus created the “Privileged Access Management” (PAM) category. This was not a generic software innovation; it was the export of a specific military operational security (OPSEC) philosophy to the global commercial market.

2.2 The “Revolving Door” of Executive Leadership

The nexus between CyberArk and the IDF did not end with its founders. The company maintains an active “revolving door” policy, recruiting senior officers directly from the IDF’s technology and intelligence branches to staff its executive suite. This ensures that the company’s strategic direction remains synchronized with the operational needs of the Israeli defense establishment.

Table 1: Executive Leadership and Military Service Correlation

Executive Name Current/Former Role Military Unit Strategic Implication of Service
Udi Mokady Founder / Exec. Chairman Unit 8200 (Intelligence) Transferred SIGINT/Intelligence methodologies to commercial identity security strategy.7
Alon N. Cohen Founder / Former CEO Mamram (C4I Corps) Invented the core “Network Vault” IP based on military infrastructure vulnerabilities observed during service.4
Chen Bitan GM Israel / Chief Product Officer Mamram (Dept. Manager) Leads global R&D; ensures product roadmap aligns with high-security defense standards. Former head of programming education at Mamram.9
Omer Grossman Chief Information Officer (CIO) Mamram (Commander) / C4I / Cyber Defense Served as Head of IDF Cyber Defense Operations Center (2022-2023). Direct transfer of active war-room tactics and national defense strategy to corporate policy.10
Peretz Regev Chief Product Officer Mamram (Commander) Former Head of Mamram (2018-2020); managed the IDF’s central cloud infrastructure. Responsible for the military’s digital transformation before joining CyberArk.12
Dan Amiga Investor / Partner (Related) Intelligence Unit Part of the broader “8200 Alumni” network investing in and founding related cyber companies.13

The profile of Omer Grossman is particularly revealing of the porosity between the military and the corporation. Grossman did not merely serve in the IDF; he was a Colonel who served as the Head of the IDF’s Cyber Defense Operations Center as recently as July 2023.10 In this capacity, he functioned as the de facto CISO of the IDF, overseeing the defense of military networks against state-sponsored attacks during periods of high tension. His transition to CyberArk’s CIO role in late 2023 implies a continuity of mission: the protection of critical Israeli digital assets is seamlessly handed off from the uniformed sector to the private sector. Similarly, Peretz Regev served as the Commander of Mamram, the IDF’s central cloud service provider, effectively the “AWS of the Army”.12 His move to CyberArk, where he oversees product strategy, suggests that CyberArk’s product development is informed by the specific, high-stakes requirements of the Israeli military’s cloud infrastructure.

2.3 The “Alumni Network” Ecosystem

The “8200 Alumni” network is a recognized phenomenon in the global tech industry, acting as a powerful informal cartel that facilitates funding, recruitment, and business development. CyberArk acts as a flagship node in this network. By employing a high density of veterans from these units, the company perpetuates a culture of militarized problem-solving. The operational mindset of Unit 8200—characterized by aggressive problem solving, disregard for hierarchy, and a focus on “offensive defense”—permeates the corporate culture. This environment makes CyberArk an attractive landing zone for demobilized officers, ensuring that the company has first-mover access to the latest cyber-warfare techniques developed in the military sector.

This ecosystem is self-reinforcing. As CyberArk grows, it acquires smaller startups founded by other 8200 alumni (discussed in Section 4), effectively consolidating the human capital of the unit under one corporate umbrella. This centralization of talent transforms CyberArk into a privatized extension of the unit’s capabilities, available for export to global markets.

3. Technological Dual-Use Analysis: The Weaponization of Identity

To assess economic complicity, we must examine the nature of the product itself. CyberArk’s core offering is Privileged Access Management (PAM). In a civilian context, this is a tool for IT compliance and security. In a military or repressive context, it is a tool for digital supremacy and control.

3.1 The “Network Vault” as Digital Fortress

The “Network Vault” technology creates a secure enclave for administrative credentials—the “keys to the kingdom.” In a democratic society, this protects bank accounts and healthcare records. In a surveillance state or an occupation regime, this technology is essential for:

  1. Securing Surveillance Infrastructure: The vast networks of cameras, sensors, and interception devices used to monitor the Palestinian population (e.g., “Wolf Pack,” “Blue Wolf”) require administrative backends. These backends must be secured against unauthorized access, leaks, or sabotage. PAM solutions ensure that only authorized military intelligence personnel can access the raw data feeds or control the surveillance apparatus.
  2. Protecting Offensive Cyber Assets: State-sponsored offensive cyber units (like Unit 8200) develop malware and exploit kits. These digital weapons must be stored securely to prevent them from being stolen or analyzed by adversaries. A “Network Vault” is the ideal repository for such arsenal.
  3. Compartmentalization of Intelligence: The occupation relies on a vast network of informants and accumulated intelligence. Managing access to these databases requires granular permission controls—exactly what CyberArk provides. The ability to rotate passwords automatically and monitor every keystroke of an administrator 15 allows the security services to maintain tight internal control over their own operatives, preventing leaks like those seen in other intelligence agencies (e.g., the Edward Snowden or Chelsea Manning leaks).

3.2 Deep Packet Inspection (DPI) and Surveillance

The acquisition of Agata Solutions in 2016 introduced Deep Packet Inspection (DPI) technology into CyberArk’s portfolio.5 DPI is a controversial “dual-use” technology. While it can be used for benign network optimization and security, it is also the fundamental technology required for:

  • Internet Censorship: Analyzing traffic content to block specific websites or protocols.
  • Mass Surveillance: Intercepting and reading unencrypted communications (emails, chats) in transit.
  • Traffic Shaping: Slowing down or throttling access to specific information sources.

By integrating DPI capabilities, CyberArk moved beyond merely securing passwords to actively interrogating network traffic. This capability is highly sought after by authoritarian regimes and military occupiers to control the information environment. In the context of the Israeli occupation, where control over Palestinian telecommunications infrastructure is total, DPI technology is a critical component of the digital blockade.

3.3 The Shift to Machine Identity and Cloud Security

Recent acquisitions, such as Venafi (Machine Identity Management) for $1.54 billion 5 and Conjur (DevOps security) 12, indicate a strategic pivot toward securing automated systems. Modern warfare is increasingly autonomous, relying on drones, AI-driven targeting systems (like the “Lavender” system used in Gaza), and automated logistics. These systems do not have human users; they have “machine identities”—API keys and certificates that allow them to communicate.

  • Venafi’s Role: Venafi manages the cryptographic keys and digital certificates for machines. In a military context, this is essential for identifying friend-or-foe (IFF) systems, securing drone uplinks, and ensuring that autonomous weapon systems cannot be hijacked.
  • Conjur’s Role: Conjur secures the CI/CD (Continuous Integration/Continuous Deployment) pipelines used by software developers. For the IDF, which develops its own combat software, Conjur ensures that code deployed to the battlefield is secure and hasn’t been tampered with.

CyberArk’s evolution into “Identity Security” for both humans and machines positions it as the foundational security layer for the “AI era” of warfare.2 As the IDF integrates more AI-driven systems into its combat operations, the reliance on CyberArk’s machine identity solutions likely deepens.

4. The Aggregator Nexus: Consolidating the Defense Ecosystem

CyberArk operates as an “Aggregator” within the Israeli economy. It absorbs smaller, specialized startups, integrating their technologies and talent into a monolithic platform. This behavior serves a strategic economic function: it prevents the leakage of Israeli defense IP to foreign competitors and ensures that the value created by military R&D remains within the “Silicon Wadi” ecosystem until a massive exit event occurs.

4.1 Domestic Acquisition Strategy

A forensic review of CyberArk’s M&A activity reveals a consistent pattern of “in-housing” Israeli defense innovation.

Table 2: Key Strategic Acquisitions of Israeli Entities

Target Company Date Cost Core Competency Strategic Relevance to Military/State
Cybertinel Aug 2015 ~$20M Cyber Threat Detection Specialized in detecting “credential threats” at the early stage of a kill chain. Staffed by security veterans. Enhanced proactive defense capabilities used in cyber-warfare.
Viewfinity Oct 2015 $30.5M Endpoint Privilege While US-HQ’d, R&D was in Beit Dagan, Israel. Secured the “endpoint” (laptops, terminals), critical for securing field devices used by military personnel.
Agata Solutions Mar 2016 $3.1M Deep Packet Inspection (DPI) Acquired technology for network traffic analysis. DPI is a core technology for surveillance and censorship infrastructure.
Gardeviance Security Value Chain (Contextual) Integration of DevOps security practices.
C3M Aug 2022 $28.3M Cloud Security Posture Secured cloud configurations. Essential for “Project Nimbus” compliance (government cloud).
Venafi Oct 2024 $1.54B Machine Identity Massive acquisition consolidating machine-to-machine security. Critical for autonomous systems and AI-driven warfare.

The acquisition of Cybertinel is particularly illustrative. The company was staffed by “cyber experts” and focused on detecting attacks at the “beginning stages of the attack cycle”.17 This proactive posture—detecting the adversary before they strike—is a hallmark of Israeli military doctrine (preemption). By acquiring Cybertinel, CyberArk absorbed this doctrinal capability into its commercial product.

4.2 The Palo Alto Networks Liquidity Event ($25 Billion)

The definitive agreement by Palo Alto Networks (NASDAQ: PANW) to acquire CyberArk for approximately $25 billion 2 is the most significant economic event in the company’s history and carries profound implications for economic complicity.

1. War Economy Stabilization:

The deal was announced and finalized during the 2023–2026 “Swords of Iron” war. This was a period of extreme economic volatility for Israel, with credit rating downgrades, currency fluctuations, and a flight of foreign capital. A $25 billion transaction acts as a massive counter-weight to these negative trends. It signals to the global market that the Israeli tech sector is “too big to fail” and remains a safe harbor for capital, regardless of the political or military situation.22 This validation is a strategic asset for the State of Israel, preventing the economic isolation that BDS activists seek to impose.

2. Tax Revenue Windfall:

The transaction involves a mix of cash ($45.00/share) and stock.2 The capital gains realized by Israeli shareholders, founders, and employees will be taxed by the Israeli state. In a deal of this magnitude, the tax revenue could amount to billions of shekels. This revenue flows directly into the Israeli Treasury, which is currently burdened by the immense costs of the war (estimated at billions per day). Thus, the acquisition directly funds the military operations in Gaza and Lebanon.23

3. Integration of US-Israel Defense Tech:

Palo Alto Networks, led by Nikesh Arora but founded by Israeli Nir Zuk (an alumnus of Unit 8200), is a US defense contractor in its own right. The merger of CyberArk into Palo Alto Networks creates a transatlantic cybersecurity giant that integrates the US and Israeli “Digital Iron Domes.” Arora explicitly stated that Palo Alto intends to “double” its workforce in Israel post-acquisition, cementing the country’s status as a primary R&D hub.24 This deepens the interdependence between the US military-industrial complex and the Israeli tech sector.

5. Spatial Analysis: The Occupation of the Negev

CyberArk’s physical footprint is not neutral. Its real estate decisions align with the Israeli government’s strategic demographic and military goals.

5.1 The “CyberSpark” in Beersheba

In May 2021, CyberArk inaugurated a major R&D center in the Gav-Yam Negev Tech Park in Beersheba.3 This location is the heart of the “CyberSpark,” a government-initiated ecosystem designed to transform the Negev desert into a global cyber capital.

The Strategic Context:

The development of the Negev is a “National Priority Area.” The Israeli government’s “Negev 2015” and subsequent plans aim to move elite military units (C4I Corps, Intelligence) from the center of the country to the south. This move is accompanied by a civilian tech ecosystem intended to attract a Jewish professional class to the region. This development often comes at the direct expense of the indigenous Bedouin population, whose unrecognized villages are frequently demolished to make way for infrastructure and “security zones” supporting these high-tech parks.

CyberArk’s Complicity:

By establishing a significant presence in the CyberSpark, CyberArk is actively participating in this state project.

  • Direct Integration: The CyberSpark physically locates CyberArk alongside the National Cyber Directorate (INCD) (which oversees national defense), the IDF C4I Corps (which builds military networks), and Ben-Gurion University.3
  • Zionist Motivation: Chen Bitan, CyberArk’s GM for Israel, explicitly stated that the move to Beersheba was motivated by “Zionist reasons” alongside practical ones.25 This admission confirms that the company views its expansion as part of a nationalistic project, not just a business decision.
  • Recruitment Pipeline: The location allows CyberArk to tap directly into the talent pool of the IDF technology units relocating to the south, further cementing the military-corporate pipeline.

5.2 Headquarters in Petach Tikva

The global headquarters remains in Petach Tikva 27, a city in the Tel Aviv metropolitan area that serves as a major industrial zone for defense contractors. Proximity to other defense firms allows for the “cluster effect,” facilitating the rapid exchange of personnel and classified information between the private sector and defense agencies.

6. The “Digital Iron Dome” & National Defense Cooperation

The concept of the “Digital Iron Dome” (or “Cyber Dome”) is the Israeli government’s initiative to build a national-level defense system against cyberattacks, modeled after the kinetic Iron Dome missile defense system. This system relies heavily on the private sector to provide the technology and manpower.

6.1 Integration with the National Cyber Directorate (INCD)

CyberArk is a key partner in this national defense architecture. The Israel National Cyber Directorate (INCD) is the civilian intelligence agency responsible for defending critical infrastructure (energy, water, banking).

  • Active Collaboration: During the “Swords of Iron” war, it was reported that private cyber companies, including CyberArk, collaborated with the INCD to “identify vulnerabilities and dismantle attack infrastructures”.29 This goes beyond passive defense; it implies active participation in state-directed cyber operations.
  • Critical Infrastructure Protection: The INCD directs the cybersecurity standards for all critical infrastructure in Israel. As the market leader in PAM, CyberArk is the standard-bearer for securing these sectors. It effectively holds the keys to the nation’s power grids and water systems, acting as a deputized guardian of the state.

6.2 Supply Chain to the Ministry of Defense (IMOD)

While specific contract values are often classified, the supply chain evidence is robust:

  • Vendor Status: The Ministry of Defense (IMOD) and the IDF are undergoing massive digital transformation, moving classified workloads to the cloud. Given that CyberArk’s executives (Regev, Grossman) built the IDF’s cloud infrastructure (Mamram), and CyberArk is the global leader in securing such infrastructure, it is structurally inevitable that CyberArk is a primary vendor for the IMOD.
  • Project Nimbus: “Project Nimbus” is the $1.2 billion contract to provide cloud services to the Israeli government and military (awarded to Google and AWS). CyberArk is listed as a prominent partner/customer of AWS in the Israel region.30 Secure cloud migration requires Privileged Access Management. CyberArk is almost certainly the security layer utilized within the Nimbus environment to control access to government and military data stored on Google/AWS servers. This makes CyberArk a direct enabler of the “Cloud Occupation”—the digitization of population registries, surveillance data, and land administration systems onto cloud platforms.

6.3 Export Controls and Dual-Use Licensing

CyberArk acknowledges in its SEC filings that its products may be subject to the Israeli Defense Export Control Law.32 This law regulates the export of “defense marketing activity” and “dual-use goods.” The fact that CyberArk must navigate these regulations confirms that its products are viewed by the state as having military utility. If the technology were purely for civilian commercial use (like a spreadsheet application), it would not fall under the purview of the Defense Ministry’s export control division.

7. Financial Forensics & Investment Flows

7.1 Revenue and Tax Contribution

CyberArk is a highly profitable entity that contributes significantly to the Israeli economy.

  • Revenue: In Q4 2024 alone, the company reported $314.4 million in revenue, up 41% year-over-year.34
  • Profitability: Non-GAAP operating income was $150.9 million for the full year 2024.34
  • Tax Domicile: Despite having a “Dual HQ” in Newton, MA, CyberArk is incorporated in Israel.27 It pays corporate taxes to the Israel Tax Authority. These taxes fund the general budget of the State of Israel, of which the Ministry of Defense is the largest single expenditure.

7.2 The “Safe Harbor” for Foreign Capital

The $25 billion acquisition by Palo Alto Networks is an “all-stock and cash” deal. This structure creates a massive influx of value into the Israeli financial system.

  • Foreign Direct Investment (FDI): The deal represents one of the largest FDIs in Israel’s history.
  • Currency Support: Large acquisitions often involve converting foreign currency to Shekels for tax payments and operational costs, supporting the value of the Shekel which has been under pressure due to the war.
  • Investor Confidence: By executing this deal in 2025/2026, Palo Alto Networks and CyberArk validated the stability of the Israeli economy to institutional investors (BlackRock, Vanguard, etc.), encouraging them to maintain their holdings in Israeli indices despite the conflict.21

8. The “Swords of Iron” Stress Test: Corporate Ideology in Action

The “Swords of Iron” war (beginning October 7, 2023) served as a stress test for corporate neutrality. Many global companies attempted to maintain a low profile. CyberArk, however, opted for full ideological and material alignment with the state’s military objectives.

8.1 Public Alignment and Reservist Support

  • CEO Statement: CEO Matt Cohen published a blog post titled “Our Hearts Are Broken, but We Will Prevail”.35 While expressing grief is standard, the phrase “We Will Prevail” adopts the specific wartime rhetoric of the Israeli government (“Together we will win”).
  • Reservist Mobilization: The company publicly acknowledged that a “percentage of our team has been called to military reserve duty” and that others “bravely volunteered”.36
  • Material Support: CyberArk continued to employ and support these reservists while they were deployed in Gaza and Lebanon. In Israel, companies are not legally required to pay full salaries to reservists (the National Insurance Institute covers a portion), but many tech companies “top up” these salaries as a patriotic gesture. By maintaining the economic viability of these soldiers, CyberArk directly subsidized the manpower of the IDF.
  • Operational Continuity: Despite the drafting of key personnel, the company maintained “business as usual,” ensuring that its clients—including the government and defense sector—experienced no disruption in service. This resilience is touted as a key feature of the Israeli tech sector: “delivery under fire”.37

8.2 Institutional Backlash

This overt support has not gone unnoticed. Student bodies and divestment campaigns at universities such as Glasgow Caledonian University (GCU) and the University of Aberdeen have targeted CyberArk contracts.36

  • The Grievance: Activists cite the company’s “deep ties to the IDF,” the military service of its executives, and its public support for the war as evidence of complicity in the alleged genocide in Gaza.
  • Contractual Value: These university contracts (e.g., £1.4 million at GCU) represent the civilian side of CyberArk’s business. The campaigns highlight the reputational risk associated with the company’s dual identity as a civilian vendor and a military-linked entity.

 

Works cited

  1. CyberArk Shareholders Approve the Company’s Acquisition by Palo Alto Networks, accessed January 16, 2026, http://investors.cyberark.com/news/news-details/2025/CyberArk-Shareholders-Approve-the-Companys-Acquisition-by-Palo-Alto-Networks/default.aspx
  2. Palo Alto Networks to acquire CyberArk in $25 billion deal, expanding into identity security, accessed January 16, 2026, https://industrialcyber.co/news/palo-alto-networks-to-acquire-cyberark-in-25-billion-deal-expanding-into-identity-security/
  3. CyberArk Opens R&D Center in Beer-Sheva’s Tech Park – A4BGU – Americans for Ben-Gurion University, accessed January 16, 2026, https://americansforbgu.org/cyberark-opens-rd-center-beer-sheva-tech-park/
  4. Alon Nisim Cohen – Wikipedia, accessed January 16, 2026, https://en.wikipedia.org/wiki/Alon_Nisim_Cohen
  5. CyberArk – Wikipedia, accessed January 16, 2026, https://en.wikipedia.org/wiki/CyberArk
  6. “This is more of a merger than an acquisition,” CyberArk founder Alon Cohen explains the Palo Alto deal | CTech, accessed January 16, 2026, https://www.calcalistech.com/ctechnews/article/gqq6me97l
  7. Udi Mokady – Wikipedia, accessed January 16, 2026, https://en.wikipedia.org/wiki/Udi_Mokady
  8. Influencer – Udi Mokady | SC Media, accessed January 16, 2026, https://www.scworld.com/feature/influencer-udi-mokady
  9. CYBERARK SOFTWARE LTD. – SEC.gov, accessed January 16, 2026, https://www.sec.gov/Archives/edgar/data/1598110/000117891321001006/cybr20f2020.htm
  10. CyberArk Software Ltd. (Form: 20-F, Received: 03/13/2024 17:29:43) – EDGAR Online, accessed January 16, 2026, https://content.edgar-online.com/ExternalLink/EDGAR/0001178913-24-000937.html?hash=0b85d0112d0b90a64feabec30d8df155ec478d8ab2829bbd7bcda4b9eaef4f97&dest=zk2431095_htm
  11. CIO Connection – CyberArk, accessed January 16, 2026, https://www.cyberark.com/cio-connection/
  12. CyberArk Software Ltd. – 1598110 – 2025 – SEC.gov, accessed January 16, 2026, https://www.sec.gov/Archives/edgar/data/1598110/000117891325000811/zk2532806.htm
  13. Israel’s new cyber generation comes of age | The Jerusalem Post, accessed January 16, 2026, https://www.jpost.com/business-and-innovation/article-865315
  14. EP 58 – Trust and Resilience in the Wake of CrowdStrike’s Black Swan | CyberArk, accessed January 16, 2026, https://www.cyberark.com/podcasts/ep-58-trust-and-resilience-in-the-wake-of-crowdstrikes-black-swan/
  15. In huge cybersecurity deal, Palo Alto Networks acquires CyberArk for $25B – SiliconANGLE, accessed January 16, 2026, https://siliconangle.com/2025/07/29/palo-alto-networks-acquires-cyberark-25b/
  16. CyberArk Acquires 3rd Israeli Startup, Agata Solutions – NoCamels, accessed January 16, 2026, https://nocamels.com/2016/03/cyberark-agata-cyber-security/
  17. CyberArk buys Israeli cyber detection Cybertinel – The Israel High Tech & Investment Report, accessed January 16, 2026, https://www.ishitech.co.il/1115ar11.htm
  18. CyberArk to Acquire Viewfinity, Extending Privileged Account Security Solution to Limit Progression of Malware-based Attacks, accessed January 16, 2026, https://investors.cyberark.com/news/news-details/2015/CyberArk-to-Acquire-Viewfinity-Extending-Privileged-Account-Security-Solution-to-Limit-Progression-of-Malware-based-Attacks/default.aspx
  19. Agata Solutions 2026 Company Profile: Valuation, Investors, Acquisition | PitchBook, accessed January 16, 2026, https://pitchbook.com/profiles/company/100761-13
  20. Axrghhgjjhbb | PDF | Computing | Software Engineering – Scribd, accessed January 16, 2026, https://www.scribd.com/document/906479590/Axrghhgjjhbb
  21. Palo Alto’s $25 Bn Acquisition of CyberArk – M&A Watch, accessed January 16, 2026, https://mnawatch.com/financial-reports/palo-altos-25-bn-acquisition-of-cyberark
  22. The $80 billion year: Israel’s biggest tech exits of 2025 | Ctech, accessed January 16, 2026, https://www.calcalistech.com/ctechnews/article/hkzohvfnbx
  23. CyberArk deal worth $2b to Israeli state coffers – Globes English – גלובס, accessed January 16, 2026, https://en.globes.co.il/en/article-cyberark-deal-worth-2b-to-israeli-state-coffers-1001517665
  24. Palo Alto CEO seeks to reassure CyberArk staff ahead of $25 billion deal – CTech, accessed January 16, 2026, https://www.calcalistech.com/ctechnews/article/rkkb8xyxbl
  25. CyberArk expands R&D center in Beersheba | The Jerusalem Post, accessed January 16, 2026, https://www.jpost.com/business-and-innovation/tech-and-start-ups/article-704323
  26. Beer Sheva – CTech, accessed January 16, 2026, https://www.calcalistech.com/tags/Beer_Sheva
  27. CyberArk Software Ltd Locations – Headquarters & Offices – GlobalData, accessed January 16, 2026, https://www.globaldata.com/company-profile/cyberark-software-ltd/locations/
  28. Cyberark Software Ltd – Detailed Introduction, Company Background, Business Scope, Financial Data, and Market Performance | TradingKey, accessed January 16, 2026, https://www.tradingkey.com/markets/stocks/nasdaq-cybr/company
  29. CyberArk alumni’s Malanta raises $10M Seed round to stop cyberattacks before they start, accessed January 16, 2026, https://www.calcalistech.com/ctechnews/article/bkdklby1zx
  30. AWS to open Israel regional datacenter in 2023 – Globes English – גלובס, accessed January 16, 2026, https://en.globes.co.il/en/article-aws-to-open-israel-regional-datacenter-in-2023-1001374232
  31. AWS Launches Infrastructure Region in Israel – Business Wire, accessed January 16, 2026, https://www.businesswire.com/news/home/20230731044074/en/AWS-Launches-Infrastructure-Region-in-Israel
  32. CyberArk Software Ltd. – SEC.gov, accessed January 16, 2026, https://www.sec.gov/Archives/edgar/data/1598110/000117891320000737/cybr20f2019.htm
  33. Form F-1 – SEC.gov, accessed January 16, 2026, https://www.sec.gov/Archives/edgar/data/1598110/000119312514247215/d692893df1.htm
  34. CyberArk Announces Record Fourth Quarter and Full Year 2024 Results, accessed January 16, 2026, https://www.cyberark.com/press/cyberark-announces-record-fourth-quarter-and-full-year-2024-results/
  35. Our Hearts Are Broken, but We Will Prevail – CyberArk, accessed January 16, 2026, https://www.cyberark.com/resources/blog/our-hearts-are-broken-but-we-will-prevail
  36. gcu to end relationship and contract with cyberark – GCU Students’ Association, accessed January 16, 2026, https://www.gcustudents.co.uk/thestudentvoice/gcu-to-end-relationship-and-contract-with-cyberark
  37. Cybersecurity Companies In Israel: Minimal Impacts On Operations, Drafted Employees, accessed January 16, 2026, https://www.crn.com/news/security/cybersecurity-companies-in-israel-minimal-impacts-on-operations-drafted-employees
  38. UoA faces backlash over cyber security contract with IDF-linked firm – The Gaudie, accessed January 16, 2026, https://www.gaudie.co.uk/wpress/index.php/news/2024/11/20/uoa-faces-backlash-over-cyber-ssecurity-contract-with-idf-linked-firm/

Related News & Articles