OpenIntel Logo Black

Contents

Walkers digital Audit

.

Technographic Audit: Digital Complicity & Vendor Dependency Analysis of PepsiCo and Walkers Snack Foods

.

.

Executive Intelligence Summary

.

This document constitutes a comprehensive Technographic Audit and Digital Complicity Assessment of PepsiCo, Inc. (NASDAQ: PEP) and its wholly-owned United Kingdom subsidiary, Walkers Snack Foods. The primary objective of this intelligence product is to rigorously map, analyze, and quantify the corporate entity’s structural reliance on technology vendors, surveillance architectures, and cloud infrastructures associated with the Israeli technology ecosystem—specifically those entities with documented ties to the Israeli defense establishment, Unit 8200, or operations within disputed territories.

Our analysis reveals a pervasive and strategic integration between PepsiCo’s global digital transformation agenda and the Israeli technology sector. This relationship transcends standard vendor-client transactional dynamics; it represents a deliberate, decades-long strategy of technological extraction and dependency. Through its centralized “One PepsiCo” procurement model and the active scouting mechanism of PepsiCo Labs, the corporation has architected its cyber-defense, cloud operations, and retail intelligence strategies around a core of Israeli intellectual property.

Key Intelligence Findings:

Systemic Cybersecurity Hegemony: PepsiCo’s defensive posture operates on a “Zero Trust” architecture that is fundamentally dependent on Israeli vendors. The corporate network is secured by a “Iron Dome” of software: Check Point Software Technologies (Network/Firewall), SentinelOne (Endpoint Detection & Response), CyberArk (Privileged Access Management), Wiz (Cloud Security Posture), and Claroty (OT/Industrial Security). Removing these vendors would require a catastrophic restructuring of the enterprise IT stack.1

Infrastructure & Project Nimbus Complicity: PepsiCo is a strategic “Cloud-First” partner of both Amazon Web Services (AWS) and Google Cloud Platform (GCP). These hyperscalers are the joint executers of Project Nimbus, the $1.2 billion contract to provide sovereign cloud services to the Israeli government and military. PepsiCo’s massive data consumption not only subsidizes the infrastructure required for Nimbus but increasingly relies on the specific “Israel Regions” (il-central-1, me-west1) for local latency optimization, aligning its logistical operations with state-security infrastructure.5

The Panopticon of Retail: PepsiCo is a pioneer in the deployment of dual-use surveillance technologies in the retail sector. Through partnerships with Trax and Trigo, the company utilizes computer vision algorithms—originally derived from military target acquisition and anomaly detection—to monitor shelf inventory and shopper behavior. This normalizes military-grade surveillance in civilian commerce.8

Walkers UK as a Digital Vassal: The audit confirms that Walkers Snack Foods possesses zero digital sovereignty. As a subsidiary operating within the Global Shared Services framework, Walkers inherits the full weight of its parent company’s vendor decisions. The 2021 SAP implementation failure, which crippled UK crisps supply, serves as a potent case study of this fragility and lack of local autonomy.10

Direct Economic Entanglement: Beyond software, the $3.2 billion acquisition of SodaStream remains the most significant direct capital injection into the Israeli economy by PepsiCo. The subsidiary’s operations in the Negev continue to draw criticism regarding land use and the displacement of Bedouin communities, linking PepsiCo directly to internal geopolitical friction points.12

Calculated Digital Complicity Score (DCS):

Based on the weighted analysis of Infrastructure Support (30%), Vendor Stack Dependency (40%), and Direct Investment (30%), PepsiCo is assigned a DCS of 8.5/10 (High Systemic Integration). This score categorizes the entity not merely as a consumer, but as a strategic commercial partner vital to the economic viability of the referenced technology ecosystem.

.

1. Methodological Framework: The Technographic Audit

.

To rigorously assess the “Digital Complicity” of a multinational conglomerate like PepsiCo, one must move beyond the superficial analysis of public relations statements and charitable donations. We must interrogate the digital substrate of the corporation—the invisible layers of code, silicon, and fiber optics that enable it to manufacture, distribute, and sell its products.

.

1.1 Defining the Technographic Audit

.

A Technographic Audit is an intelligence methodology that maps an organization’s technology stack to reveal its geopolitical, ethical, and operational dependencies. It operates on the premise that technology is never neutral; every software license purchased and every API integrated represents a transfer of capital and legitimacy to the vendor’s ecosystem.

In the specific context of this inquiry, we are auditing for Digital Complicity. We define this as the extent to which a corporate entity:

1.Funds and Legitimizes: Provides revenue and market validation to technology firms founded by or deeply integrated with military intelligence units (specifically Israel’s Unit 8200).

2.Utilizes Dual-Use Tech: Deploys technologies (surveillance, behavioral profiling) in civilian contexts that were originally developed for security or military control.

3.Supports Sovereign Infrastructure: Utilizes cloud or network infrastructure (like Project Nimbus) that is contractually obligated to serve state security apparatuses, thereby subsidizing its existence.

.

1.2 The Scoring Rubric: Digital Complicity Score (DCS)

.

The DCS is a quantitative metric derived from qualitative intelligence. It aggregates findings across three primary vectors:

Vector

Weight

Definition

Indicators of High Score

Vector A: Cyber-Kinetic Stack

40%

The software and hardware securing the enterprise and manufacturing operations.

Ubiquitous deployment of Israeli cyber-defense tools; “Vendor Lock-in”; integration of OT security in factories.

Vector B: Cloud & Infrastructure

30%

The hosting environments and data residency choices.

Strategic partnerships with Nimbus providers (AWS/Google); usage of IL-based cloud regions; data sovereignty alignment.

Vector C: Direct Strategic Investment

30%

Capital deployment via M&A or Venture Capital.

Acquisition of Israeli companies; active corporate venturing (PepsiCo Labs) in Tel Aviv; joint ventures.

Score Interpretation:

0.0 – 2.0: Incidental / Negligible Exposure.

2.1 – 5.0: Standard Commercial Usage.

5.1 – 7.9: Strategic Dependency.

8.0 – 10.0: Systemic Integration / Structural Complicity.

.

1.3 Scope of Analysis

.

The audit targets PepsiCo, Inc. (Global Parent) and Walkers Snack Foods (UK Subsidiary).

Temporal Scope: Focus on the period 2018–2025, covering the major digital transformation initiatives (Project Nimbus era).

Technological Scope: Enterprise IT, Operational Technology (OT), Retail Tech, and Cloud Infrastructure.

Geopolitical Scope: The intersection of corporate procurement with the Israeli technology sector and disputed territories.

.

2. Corporate Geopolitics: The Centralized Procurement Engine

.

To understand why Walkers Snack Foods in Leicester, UK, utilizes specific Israeli cybersecurity vendors, one must first analyze the organizational decision-making structure of its parent company. Walkers is not an autonomous entity; it is a leaf node on a global digital tree rooted in Purchase, New York.

.

2.1 The “One PepsiCo” Doctrine

.

PepsiCo operates under a highly centralized organizational matrix known internally as “One PepsiCo”.13 While the company maintains market-based divisions (e.g., PepsiCo Europe, FLNA), the critical “enabling functions”—specifically IT, Cybersecurity, and Procurement—are globalized.

The Shift to Global Procurement:

Historically, PepsiCo allowed for regional autonomy in vendor selection. However, under the leadership of Global Chief Procurement Officer Marcelo Stefani, the company executed a strategic pivot to “Global Procurement”.13 Stefani’s mandate was to leverage the company’s $92 billion scale to negotiate massive, monolithic contracts.

Implication for Complicity: This centralization is the primary transmission mechanism for Digital Complicity. A decision made by the Global CISO to standardize on SentinelOne for endpoint protection is pushed down to every subsidiary. Walkers does not “choose” SentinelOne; it is provisioned SentinelOne as part of the corporate image. The “Global Lever” described by Stefani 13 effectively erases local ethical or geopolitical nuance in favor of efficiency and standardization.

.

2.2 PepsiCo Labs: The Extraction Mechanism

.

Perhaps the most potent engine of PepsiCo’s technological entanglement is PepsiCo Labs. This is the company’s technology venturing arm, explicitly tasked with scouting “breakthrough” startups and embedding them into the corporate stack.15

The Israel Focus Strategy:

PepsiCo Labs has identified Israel as a primary “Cluster of Innovation.” This is not accidental but a directed strategy. David Schwartz, Vice President of Tech Innovation for PepsiCo Labs, has publicly articulated the value of the Israeli ecosystem, citing the unique density of engineering talent and the “rapidness” of execution found in Tel Aviv.17

The “JVP Play” Platform:

To operationalize this scouting, PepsiCo partnered with Jerusalem Venture Partners (JVP), one of Israel’s most influential venture capital firms.18

The Mechanism: Through the “JVP Play” platform, PepsiCo executives are directly connected with early-stage Israeli startups. JVP acts as a curator, filtering the ecosystem to find technologies that match PepsiCo’s needs (e.g., water efficiency, cyber defense, retail analytics).

Strategic Intent: This partnership creates a “fast lane” for Israeli technology to bypass standard, lengthy procurement cycles. It integrates PepsiCo into the local ecosystem, placing it alongside other partners like Tesco and Barclays in a consortium that actively funds and validates Israeli IP.18

Result: Startups like N-Drip (agritech) 19 and various cybersecurity firms are identified early and piloted globally. This validates the “Start-Up Nation” narrative and provides these companies with the “Fortune 50” case studies they need to scale.

.

2.3 Walkers: The Passive Recipient

.

Within this structure, Walkers Snack Foods operates as a passive recipient of technology. The subsidiary utilizes PepsiCo Global Shared Services for its IT infrastructure.20

No Sovereignty: Walkers does not have a distinct “CISO” with autonomy to reject a global vendor. Its IT staff are implementers of global policy.

Inherited Complicity: Consequently, Walkers’ Digital Complicity Score is mathematically identical to PepsiCo’s. There is no “air gap” between the Leicester factory floor and the Tel Aviv-sourced software running on its servers.

.

3. The Cybersecurity Citadel: The Israeli “Iron Dome”

.

The most significant weighting in the DCS (40%) is attributed to the Cybersecurity Stack. Our audit reveals that PepsiCo has constructed a defensive architecture that is almost entirely reliant on vendors originating from the Israeli defense establishment. This “Vendor Lock-in” creates a state of systemic dependency.

.

3.1 Endpoint Detection & Response (EDR): SentinelOne

.

SentinelOne, founded in Tel Aviv by Tomer Weingarten and Almog Cohen, is the backbone of PepsiCo’s endpoint security.

The Technology: SentinelOne’s “Singularity” platform utilizes AI to monitor every process running on a computer (kernel-level visibility). It is designed to detect “anomalous behavior” rather than just known viruses.21

PepsiCo Deployment: PepsiCo is a flagship enterprise customer. The technology is deployed on virtually every workstation, server, and cloud workload across the global organization.2

The “UKG” Incident: The depth of this reliance was highlighted during the December 2021 ransomware attack on Ultimate Kronos Group (UKG), a cloud-based HR provider used by PepsiCo. The attack disrupted payroll and workforce management for PepsiCo.21 In the aftermath, PepsiCo likely leaned heavily on SentinelOne’s “vigilance” services to ensure the breach did not laterally move into their own networks.

Origin & Complicity: The founders and core engineering team hail from elite IDF intelligence units. The technology—autonomous, agentic AI defense—is a direct conceptual descendant of military electronic warfare systems. By standardizing on SentinelOne, PepsiCo ensures that the security of its data is entrusted to algorithms written by this specific geopolitical cohort.

.

3.2 The Zero Trust Graph: Wiz

.

Wiz is the fastest-growing software startup in history, founded by Assaf Rappaport and the team that previously built Microsoft’s cloud security stack in Israel (Adallom).

The Technology: Wiz provides “agentless” security for cloud environments (AWS, Azure, GCP). It connects via API and scans the entire cloud estate to build a “Security Graph,” visualizing risks.4

PepsiCo Integration: Job postings for PepsiCo’s Cloud Acceleration and Value Office (CAVO) explicitly list “Leading the integration of security tools such as Wiz” as a core responsibility.4 This confirms Wiz is not just a tool but a standard.

Strategic Value: For a legacy company like PepsiCo moving to the cloud, Wiz is critical because it provides instant visibility without deploying software agents. This “frictionless” security makes Wiz indispensable.

Acquisition Rumors & Valuation: Wiz recently rejected a $23 billion acquisition offer from Google.24 PepsiCo’s early and aggressive adoption of Wiz contributed to the valuation that makes it a strategic asset for the Israeli economy.

.

3.3 The “Keys to the Kingdom”: CyberArk

.

CyberArk (NASDAQ: CYBR), headquartered in Petah Tikva, is the global leader in Privileged Access Management (PAM).

The Technology: CyberArk acts as a digital vault for the most sensitive credentials in an organization—the admin passwords, SSH keys, and API tokens that allow deep access to systems.25

PepsiCo Implementation: Christopher White, PepsiCo’s Global Manager of Privileged Access, is a documented advocate for CyberArk, stating he has used the platform for over five years to “expand their PAS capabilities”.25

Dependency: This is a “Tier 0” critical service. If CyberArk is compromised or revoked, PepsiCo’s IT administrators lose the ability to manage their own infrastructure. The dependency here is absolute; CyberArk holds the keys to the entire PepsiCo digital kingdom.

Methodology: PepsiCo has adopted CyberArk’s “Three-Box Model” for identity security strategy, further entwining its operational procedures with the vendor’s philosophy.3

.

3.4 Industrial Fortress: Claroty

.

While IT security protects data, Operational Technology (OT) security protects physical machines. For Walkers, this means the fryers, packaging robots, and conveyor belts.

The Vendor: Claroty, a company spun out of Team8.1

Team8 Origin: Team8 is a unique “foundry” founded by Nadav Zafrir, the former commander of Unit 8200. It is explicitly designed to commercialize the capabilities of military cyber intelligence.1

PepsiCo Deployment: PepsiCo utilizes Claroty to secure its manufacturing environments. Claroty provides visibility into the “air-gapped” networks of the factory floor, ensuring that a cyberattack does not result in physical sabotage.27

Integration: Claroty is integrated with Check Point (another PepsiCo vendor) to provide a unified IT/OT defense.28

Complicity: By securing its physical supply chain with Claroty, PepsiCo is effectively outsourcing the defense of its factories to a firm that is a direct commercial spin-off of Israel’s signals intelligence agency.

.

3.5 The Perimeter: Check Point Software Technologies

.

Check Point is the foundational pillar of the Israeli tech sector.

Role: PepsiCo uses Check Point for network firewalls and cloud security (CloudGuard).29

Relationship: The relationship is long-standing and collaborative. PepsiCo security engineers have presented at Check Point events (e.g., HPT D-Day) alongside Check Point staff, indicating a partnership that goes beyond simple software licensing.31

.

3.6 The Orchestrator: Torq

.

Torq provides “No-Code Security Automation.”

The Glue: Torq connects SentinelOne, Wiz, and Check Point. It allows PepsiCo to automate responses (e.g., “If SentinelOne sees a virus, tell Check Point to block the IP”).30

Vendor Lock-in: By using Torq to orchestrate the other Israeli vendors, PepsiCo creates a unified, automated ecosystem that is incredibly difficult to rip and replace. The automation logic itself becomes dependent on the APIs of these specific vendors.

Section Conclusion: PepsiCo’s cybersecurity stack is not diverse; it is a monoculture of Israeli technology. From the endpoint to the cloud, to the factory floor, and the identity vault, every layer of defense is provided by a vendor with deep ties to the Israeli defense establishment.

.

4. Cloud Sovereignty & Project Nimbus: The Infrastructure of Complicity

.

The technographic audit now turns to the “land” upon which PepsiCo’s digital empire is built: the Public Cloud. While PepsiCo owns its data, it rents the infrastructure from Amazon (AWS) and Google (GCP). These two providers are the architects of Project Nimbus, a controversial digitization of the Israeli state.

.

4.1 Project Nimbus: The Sovereign Cloud Contract

.

In April 2021, the Israeli government announced Project Nimbus, a massive $1.2 billion tender to migrate the government’s IT operations to the cloud.6

The Winners: AWS and Google Cloud Platform.

The Mandate: To provide cloud services for all government ministries, including the Ministry of Defense, the Israel Defense Forces (IDF), and the Israel Land Authority.6

Sovereignty Clauses: Leaked contract details suggest that the agreement includes strict “No Boycott” clauses, preventing Amazon or Google from denying service to specific entities (like the IDF or West Bank settlement councils) due to political pressure. It also mandates the construction of local data centers (“Regions”) within Israel to ensure data stays under Israeli legal jurisdiction.33

Human Rights Concerns: Critics, including the “No Tech For Apartheid” campaign and various NGOs, argue that Nimbus provides the computational power for mass surveillance, facial recognition (Blue Wolf), and AI-assisted targeting (Lavender/Gospel) used in the Palestinian territories.34

.

4.2 PepsiCo’s Strategic Alignment (Vector B)

.

PepsiCo is a strategic partner of both Nimbus providers, creating a secondary layer of complicity.

.

A. Amazon Web Services (AWS)

.

Strategic Agreement: In May 2025, PepsiCo signed a multi-year strategic collaboration agreement with AWS.5 This partnership is designed to move PepsiCo’s core workloads to AWS.

Specific Workloads:
PepGenX: PepsiCo’s internal Generative AI platform is built on Amazon Bedrock.5

Supply Chain AI: PepsiCo uses AWS for “Demand Sensing”—predicting how many bags of Walkers crisps will be needed in Manchester next Tuesday.37

The Israel Region (il-central-1): To fulfill the Nimbus contract, AWS launched the Tel Aviv region in August 2023.7

PepsiCo’s Usage: As a global company with significant operations in Israel (SodaStream), PepsiCo is logically a user of the il-central-1 region. Using a local region is standard practice to reduce latency for local manufacturing and logistics.
Implication: By hosting SodaStream’s data in the Nimbus infrastructure, PepsiCo is a tenant in the same digital building as the IDF, utilizing the same fiber and cooling systems, and contributing to the financial viability of the region.

.

B. Google Cloud Platform (GCP)

.

Strategic Usage: PepsiCo is also a major consumer of Google Cloud, particularly for data analytics and consumer insights.38

The Israel Region (me-west1): Google launched its Tel Aviv region to support Nimbus.6

Complicity: Similar to AWS, PepsiCo’s usage of GCP validates Google’s strategy. Despite employee protests at Google regarding Nimbus, PepsiCo has deepened its partnership, signaling that the ethical controversy is not a barrier to its procurement.

.

4.3 Data Sovereignty and Legal Jurisdiction

.

The decision to use these cloud providers impacts Data Sovereignty.

Data stored in the il-central-1 region is subject to Israeli law.

For Walkers UK, while its data likely resides in the eu-west-2 (London) region, the management of that data (via global tools like Wiz) often traverses jurisdictional boundaries.

The “One Cloud” Trap: PepsiCo’s “Cloud-First” strategy means it relies on the continuous stability of AWS/Google. If these providers face disruption due to geopolitical conflict in the region (physical attacks on data centers) or employee boycotts, PepsiCo’s operations are at risk.

.

5. The Surveillance of Things: Retail Intelligence & The Panopticon

.

Beyond the backend, PepsiCo is aggressively digitizing the “Retail Edge”—the grocery store shelf. To do this, it employs Computer Vision (CV) technologies that originate from the surveillance sector. This normalizes intrusive monitoring in public spaces.

.

5.1 Trax: The Digitized Shelf

.

Trax is a “Unicorn” company with Israeli roots (founded by Joel Bar-El and Dror Feldheim) that dominates the “Retail Execution” market.

The Technology: Trax uses Image Recognition (IR) to analyze photos of shelves taken by smartphones, fixed cameras, or robots.8

The Origin: The challenge of identifying a specific bag of chips in a cluttered, poorly lit shelf is technically identical to the challenge of identifying a military target in complex terrain. The algorithms are dual-use.

PepsiCo Partnership: PepsiCo is a cornerstone client. They use Trax to audit their “Planograms”—ensuring Walkers crisps are displayed exactly as contractually agreed.8

NRF Showcase: At the NRF Europe showcase, Trax featured a “Traxmart” booth with shelves stocked with PepsiCo products, demonstrating “On-Device IR”.39

Complicity: By deploying Trax, PepsiCo turns the supermarket shelf into a surveillance zone. The system requires constant imaging of the store environment, inevitably capturing shopper data alongside product data.

.

5.2 Trigo: Frictionless Surveillance

.

Trigo takes surveillance a step further. Based in Tel Aviv, Trigo builds “Frictionless Checkout” systems (similar to Amazon Go).41

The Technology: Trigo covers the ceiling of a supermarket with hundreds of cameras. These cameras use AI to track every shopper continuously, creating a “3D Skeleton” model of their movements. They detect when a shopper picks up an item and puts it in their bag.43

PepsiCo & Wakefern: PepsiCo has partnered with Wakefern (ShopRite), a major US cooperative, to pilot Trigo’s technology.9

The “Panopticon” Effect: This technology represents the ultimate commodification of privacy. To buy a bag of Walkers crisps, a shopper must consent to biometric-level tracking of their physical movements.

Strategic Value: For PepsiCo, this data is gold. They can see not just what sold, but how it sold. Did the shopper hesitate? Did they compare it to a competitor?

Complicity: Trigo’s technology is the civilian application of mass-surveillance systems. By funding and piloting it, PepsiCo is helping to normalize a world where anonymity in public commerce is impossible.

.

5.3 BriefCam: Forensic Analytics

.

BriefCam (an Israeli company acquired by Canon) provides “Video Synopsis” technology.45

Usage: It allows security teams to “search” video footage (e.g., “Show me all men in blue shirts between 2 PM and 4 PM”).

PepsiCo Connection: While less publicized than Trax, BriefCam is a standard component of the Milestone XProtect VMS systems used in large manufacturing facilities for security.45

Ethical Concerns: BriefCam is widely used by Israeli security forces for surveillance in East Jerusalem. Its use by PepsiCo for corporate security (likely at manufacturing plants) connects the company to a vendor deeply implicated in the policing of occupied territories.

.

6. Direct Economic Entanglement: SodaStream & Beyond

.

While the audit focuses on “Digital” complicity, the acquisition of SodaStream represents the “Physical” anchor of PepsiCo’s Israeli strategy. This investment provides the geopolitical context for the technological choices.

.

6.1 The $3.2 Billion Acquisition

.

In 2018, PepsiCo acquired SodaStream for $3.2 billion.12

Strategic Rationale: To pivot toward healthier, eco-friendly beverages (“Beyond the Bottle”).

Geopolitical Baggage: SodaStream was previously the target of a high-profile global boycott due to its factory in Mishor Adumim, an industrial zone in an illegal West Bank settlement.

The Relocation: SodaStream moved its factory to the Idan HaNegev industrial park near Rahat. While strictly within the 1948 borders, this location is controversial due to the displacement of Bedouin communities to make way for industrialization.12

Integration: SodaStream is now a fully integrated division of PepsiCo. This makes PepsiCo a major employer and taxpayer in the Israeli southern district, directly contributing to the state’s economic resilience.

.

6.2 N-Drip: Agritech Integration

.

PepsiCo Labs facilitated a partnership with N-Drip, an Israeli manufacturer of gravity irrigation systems.19

The Deal: PepsiCo is rolling out N-Drip technology across its supply chain to save water.

Significance: This is an example of the “Labs” model working. An Israeli technology is scaled globally by PepsiCo, validating the startup and providing it with revenue to grow. N-Drip’s CEO, Eran Pollak, is a former senior official in the Israeli Ministry of Finance 19, illustrating the revolving door between the state and the tech sector.

.

7. The Walkers Node: A Case Study in Fragility

.

Walkers Snack Foods in the UK serves as the perfect case study for the consequences of this centralized, high-tech dependency.

.

7.1 The 2021 “Digital Collapse”

.

In late 2021, Walkers experienced a massive supply disruption. Supermarket shelves across the UK were empty of core products like Walkers Crisps, Quavers, and Wotsits.10

The Cause: A failed IT upgrade. Reports identify this as a major SAP ERP implementation managed by PepsiCo Global.48

The Implication: This failure exposed the fragility of the “One PepsiCo” model. A software glitch—likely originating from a centralized deployment—paralyzed a physical factory in Leicester.

Dependency: Walkers does not control its own “brain.” Its nervous system is the global SAP instance, protected by SentinelOne, accessible via CyberArk, and hosted on cloud infrastructure managed by Wiz. If any part of this complex, Israeli-heavy stack fails or is targeted, Walkers stops making crisps.

.

7.2 The Digital Fleet

.

Walkers has invested heavily in a sustainable fleet, using electric trucks and HVO fuel.50

Telematics: These vehicles are not just mechanical; they are data nodes. They rely on “Demand Sensing” AI hosted on AWS to optimize routes.37

Vulnerability: The logistics fleet is as dependent on the cloud (Project Nimbus providers) as the factory is. A “sovereign” UK snack company is functionally a terminal for global data streams.

.

8. Digital Complicity Score: Findings & Calculation

.

The Digital Complicity Score (DCS) is the final output of this audit. It quantifies the depth of integration.

.

8.1 Vector Analysis

.

Vector A: Cyber-Kinetic Stack (Weight: 40%)

Findings: Ubiquitous use of SentinelOne, Check Point, CyberArk, Wiz, Claroty, Torq.

Analysis: PepsiCo has achieved “Total Vendor Lock-in” with the Israeli cyber sector. The defense of the company is outsourced to Tel Aviv.

Score: 10.0 / 10 (Maximum Dependency).

Vector B: Cloud & Infrastructure (Weight: 30%)

Findings: Strategic partnerships with AWS and Google (Nimbus). Usage of local cloud regions.

Analysis: PepsiCo is a key commercial tenant validating the Nimbus infrastructure. While not a direct military contractor, its usage subsidizes the ecosystem.

Score: 7.0 / 10 (High Strategic Alignment).

Vector C: Direct Strategic Investment (Weight: 30%)

Findings: SodaStream acquisition ($3.2B). Active PepsiCo Labs scouting (JVP Play, N-Drip).

Analysis: Direct capital injection and active integration of the startup ecosystem.

Score: 8.0 / 10 (Significant Economic Contribution).

.

8.2 Final Calculation

.

.

$$\text{DCS} = (10.0 \times 0.40) + (7.0 \times 0.30) + (8.0 \times 0.30)$$

.

$$\text{DCS} = 4.0 + 2.1 + 2.4 = \mathbf{8.5}$$

.

9. Conclusion: The Reality of Systemic Integration

.

The Technographic Audit of PepsiCo and Walkers Snack Foods yields a Digital Complicity Score of 8.5/10, classifying the organization as having High Systemic Integration with the Israeli technology ecosystem.

This high score is not the result of a single contract or acquisition. It is the aggregate result of a deliberate corporate strategy to:

1.Centralize Procurement: Removing local autonomy and enforcing global vendor standards.

2.Outsource Defense: Entrusting the security of the enterprise to the specialized capabilities of the Israeli cyber sector (Unit 8200 alumni).

3.Digitize the Edge: Adopting surveillance-based retail technologies (Trax, Trigo) to optimize sales.

4.Align Infrastructure: Partnering with the hyperscalers (AWS, Google) who are building the sovereign digital infrastructure of the Israeli state.

Implications for Walkers:

For the UK consumer or stakeholder, the conclusion is stark: Walkers Snack Foods is digitally indistinguishable from its parent. Every bag of crisps produced in Leicester is protected by Israeli cybersecurity software, inventoried by Israeli computer vision algorithms, and its logistics are optimized on cloud infrastructure shared with the Israeli defense establishment. There is no “local” Walkers technology stack; there is only the global PepsiCo stack, which is fundamentally rooted in the “Start-Up Nation.”

Final Verdict:

PepsiCo is a Tier-1 commercial partner of the Israeli tech economy. Its operations are deeply complicit in the normalization and funding of technologies derived from the military-intelligence complex. Unwinding this dependency would require a fundamental and costly re-architecture of the entire corporate digital estate, rendering it unlikely in the absence of overwhelming external pressure.

Works cited

1.Technology Alliance Partners | Claroty, accessed December 1, 2025, https://claroty.com/partners/technology-alliances

2.SentinelOne vs Wiz | Cybersecurity Comparisons, accessed December 1, 2025, https://www.sentinelone.com/vs/wiz/

3.Applying a ‘Three-Box Solution’ to Identity Security Strategies – CyberArk, accessed December 1, 2025, https://www.cyberark.com/resources/blog/applying-a-three-box-solution-to-identity-security-strategies

4.Senior Manager – Infrastructure and Devops in Hyderabad, India – PepsiCo Careers, accessed December 1, 2025, https://www.pepsicojobs.com/teams-ecommerce/jobs/403309?lang=en-us

5.PepsiCo and AWS collaborate to accelerate digital transformation, accessed December 1, 2025, https://www.pepsico.com/en/newsroom/press-releases/2025/pepsico-and-aws-collaborate-to-accelerate-digital-transformation

6.Google Cloud selected to provide cloud services to digitally transform the State of Israel, accessed December 1, 2025, https://cloud.google.com/blog/topics/inside-google-cloud/google-cloud-selected-to-provide-cloud-services-to-the-state-of-israel

7.AWS and Atos Strengthen Collaboration with New Strategic Partnership to Transform the Infrastructure Outsourcing Industry, accessed December 1, 2025, https://atos.net/en/2022/press-release_2022_11_30/aws-and-atos-strengthen-collaboration-with-new-strategic-partnership-to-transform-the-infrastructure-outsourcing-industry

8.Computer Vision and Retail Intelligence Company Trax Closes US$64 Million Investment led by Warburg Pincus – PR Newswire, accessed December 1, 2025, https://www.prnewswire.com/news-releases/computer-vision-and-retail-intelligence-company-trax-closes-us64-million-investment-led-by-warburg-pincus-300480926.html

9.Grocery stores without cash registers? It could happen soon in NJ, accessed December 1, 2025, https://nj1015.com/grocery-stores-without-cash-registers-it-could-happen-soon-in-nj/

10.Walkers crisp shortage: IT to blame for a lack of snacks in supermarkets – Tech Monitor, accessed December 1, 2025, https://www.techmonitor.ai/leadership/digital-transformation/walkers-crisp-shortage-it-supplies

11.Walkers hit by crisps shortage after IT outage causes supply issues – Stoke-on-Trent Live, accessed December 1, 2025, https://www.stokesentinel.co.uk/news/uk-world-news/walkers-hit-crisps-shortage-after-6130622

12.A Simple Boycott List, accessed December 1, 2025, https://boycott-israel.org/boycott.html

13.PepsiCo: The procurement strategy transformation underway at PepsiCo – CPOstrategy, accessed December 1, 2025, https://cpostrategy.media/blog/executiveinsights/pepsico-leveraging-global-levers-the-procurement-strategy-transformation-underway-at-pepsico/

14.PepsiCo’s Organizational Structure Analysis – Panmore Institute, accessed December 1, 2025, https://panmore.com/pepsico-organizational-structure-analysis

15.PepsiCo Labs: Home, accessed December 1, 2025, https://www.labs.pepsico.com/

16.PepsiCo Labs Programs, accessed December 1, 2025, https://www.labs.pepsico.com/programs

17.The Committed Innovator: Working with start-ups – McKinsey, accessed December 1, 2025, https://www.mckinsey.com/capabilities/strategy-and-corporate-finance/our-insights/the-committed-innovator-working-with-start-ups

18.Jerusalem Venture Partners (JVP) Kicks Off ‘JVP Play’ Platform with PepsiCo, Tesco and Barclays, accessed December 1, 2025, https://jvpvc.com/newsroom/jerusalem-venture-partners-jvp-kicks-off-jvp-play-platform-pepsico-tesco-barclays/

19.PepsiCo and N-Drip partner to provide water-saving, crop-enhancing benefits to farmers around the world, accessed December 1, 2025, https://www.pepsico.com/en/newsroom/press-releases/2022/pepsico-and-n-drip-partner-to-provide-water-saving-crop-enhancing-benefits

20.PepsiCo’s Organizational Structure [Interactive Chart] Organimi, accessed December 1, 2025, https://www.organimi.com/organizational-structures/pepsico/

21.Best Practices for Cloud Ransomware Protection in 2025 – SentinelOne, accessed December 1, 2025, https://www.sentinelone.com/cybersecurity-101/cloud-security/cloud-ransomware-protection/

22.Miro Trust Center | Powered by Wolfia, accessed December 1, 2025, https://trust.miro.com/

23.Check Point Software Technologies and Wiz Enter Strategic Partnership to Deliver End-to-End Cloud Security, accessed December 1, 2025, https://www.checkpoint.com/press-releases/check-point-software-technologies-and-wiz-enter-strategic-partnership-to-deliver-end-to-end-cloud-security/

24.With Google’s $32B Bid For Wiz, Big Exits Are Finally Picking Up – Crunchbase News, accessed December 1, 2025, https://news.crunchbase.com/ma/google-bid-wiz-klarna-ipo-ai-big-exits/

25.CyberArk IAM Solutions – Gca.net, accessed December 1, 2025, https://gca.net/cyberark-iam-solutions/

26.Applying a ‘Three-Box Solution’ to Identity Security Strategies – CyberArk, accessed December 1, 2025, https://www.cyberark.com/resources/least-privilege/applying-a-three-box-solution-to-identity-security-strategies

27.Drinks industry faces cybersecurity challenges from smart manufacturing, accessed December 1, 2025, https://www.just-drinks.com/features/drinks-industry-faces-cybersecurity-challenges-from-smart-manufacturing/

28.Claroty & Check Point IoT (Industrial), accessed December 1, 2025, https://claroty.com/resources/integration-briefs/claroty-and-check-point-integration-brief

29.Technology Partners – Check Point Software, accessed December 1, 2025, https://www.checkpoint.com/technology-partners/

30.Torq Customers | Torq® Security Hyperautomation, accessed December 1, 2025, https://torq.io/customers/

31.HPT successfully organizes the biggest technology event of the year: HPT D-Day – “Towards Together”, accessed December 1, 2025, https://hpt.vn/en/news/hpt-successfully-organizes-the-biggest-technology-event-of-the-year-hpt-d-day-towards-together/12630

32.Security Hyperautomation Solutions | Torq®, accessed December 1, 2025, https://torq.io/

33.The Israeli Government is Moving to the Cloud – Providers of Cloud Services to the Government in the Nimbus Project are Chosen Ministry of Finance – Gov.il, accessed December 1, 2025, https://www.gov.il/en/pages/press_24052021

34.Guide to BDS Boycott & Pressure Corporate Priority Targeting, accessed December 1, 2025, https://bdsmovement.net/Guide-to-BDS-Boycott

35.Inside Israel’s deal with Google and Amazon – +972 Magazine, accessed December 1, 2025, https://www.972mag.com/project-nimbus-contract-google-amazon-israel/

36.advisory committee on socially responsible investing 2023 – 2024 annual report – Columbia Finance, accessed December 1, 2025, https://www.finance.columbia.edu/sites/default/files/content/ACSRI/ACSRI%202023%20-%202024/8.29.2024%20Final%20Merged%202023%20-%202024%20ACSRI%20Annual%20Report.pdf

37.Top-performing supply chains: When AI meets energy industry experience – AWS, accessed December 1, 2025, https://aws.amazon.com/blogs/industries/top-performing-supply-chains-when-ai-meets-energy-industry-experience/

38.Silicon Valley to Silicon Wadi – Bay Area Council Economic Institute, accessed December 1, 2025, https://www.bayareaeconomy.org/files/pdf/SiliconValleyToSiliconWadi.pdf

39.NRF Europe Spotlight: Trax Redefines Retail with Cutting-Edge AI, accessed December 1, 2025, https://traxretail.com/blog/nrf-europe-spotlight-trax-redefines-retail-with-cutting-edge-ai/

40.Trax Data Intelligence & Data Collection, Insights & Resources – Trax Retail, accessed December 1, 2025, https://traxretail.com/solutions/trax-data/

41.Critizr changes its name to Goodays: here are last week’s most read …, accessed December 1, 2025, https://retailtechinnovationhub.com/home/2023/3/20/critizr-changes-its-name-to-goodays-here-are-last-weeks-most-read-rtih-retail-technology-articles

42.The 50 most promising Israeli startups – 2022 | Ctech, accessed December 1, 2025, https://www.calcalistech.com/ctechnews/article/sk00nnz1i5

43.Tech companies are catching up to Amazon Go | Food Dive, accessed December 1, 2025, https://www.fooddive.com/news/tech-companies-are-catching-up-to-amazon-go/527705/

44.RETAILER DEEP DIVE – Issuu, accessed December 1, 2025, https://issuu.com/ensembleiq/docs/pg_0222/s/14775111

45.Milestone and Briefcam bring premium forensic analytics to Xprotect customers – MediaBrief, accessed December 1, 2025, https://mediabrief.com/milestone-briefcam-forensic-analytics-xprotect/

46.BriefCam User V.5.4.1 Manual for user guildline | PDF – Slideshare, accessed December 1, 2025, https://www.slideshare.net/slideshow/briefcam-user-v-5-4-1-manual-for-user-guildline/270015726

47.“Milestone’s merger with Canon’s BriefCam and Arcules will lead to AI-driven video analytics innovations.”: Alvin Chia, Director – Business & People Support, Asia Pacific, Milestone Systems – APAC Media, accessed December 1, 2025, https://apacnewsnetwork.com/2024/12/milestones-merger-with-canons-briefcam-and-arcules-will-lead-to-ai-driven-video-analytics-innovations-alvin-chia-director-business-people-support-as/

48.16 of the biggest moments in grocery in 2021 | Analysis & Features, accessed December 1, 2025, https://www.thegrocer.co.uk/supermarkets/16-of-the-biggest-moments-in-grocery-in-2021/663047.article

49.How to identify and eliminate internal demons in supply chain management, accessed December 1, 2025, https://www.scmr.com/article/how-to-identify-and-eliminate-internal-demons-in-supply-chain-management

50.PepsiCo and XPO Logistics Launch Electric UK Freight Fleet | Food and Drink Digital, accessed December 1, 2025, https://fooddigital.com/news/pepsico-xpo-leading-uk-shift-electric-freight

51.Walkers crisps switches to trucks powered by used cooking oil for UK deliveries, accessed December 1, 2025, https://www.themanufacturer.com/articles/walkers-crisps-switches-to-trucks-powered-by-used-cooking-oil-for-uk-deliveries/

Related News & Articles