1. The Genealogies of Power: Corporate DNA and the Military-Industrial Complex
To fully grasp the “Digital Complicity” of CyberArk, one must move beyond its public listing on the NASDAQ and interrogate its foundational DNA. A corporation’s culture, strategic priorities, and ethical boundaries are defined by its leadership. in the context of the Israeli technology sector, this almost invariably leads back to the Israel Defense Forces (IDF) and its premier intelligence units. CyberArk is the archetype of this phenomenon, representing a seamless fusion of military doctrine and corporate strategy.
1.1 The Founders’ Legacy: Unit 8200 and Mamram Synergy
CyberArk was founded in 1999, a pivotal moment in the privatization of Israeli military technology. The company’s genesis is a direct result of the synergy between two specific IDF units: Unit 8200 and Mamram.
Udi Mokady (Founder & Executive Chairman):
Mokady, the long-serving CEO and current Executive Chairman, is a veteran of a Military Intelligence unit, widely acknowledged in industry literature as Unit 8200.5 Unit 8200 is the IDF’s Central Collection Unit of the Intelligence Corps, responsible for signal intelligence (SIGINT) and cyber warfare. It is frequently described as the Israeli equivalent of the NSA, but with a more direct operational role in the occupation, including the surveillance of Palestinian civilians for coercion and control.7 Mokady’s background in this unit provides the “offensive” context for CyberArk’s mission—understanding how attackers think because he was trained in an environment dedicated to offensive information gathering.
Alon N. Cohen (Co-Founder & Inventor):
The technical architect of CyberArk, Alon Cohen, served for six years in Mamram (Center for Computing and Information Systems).9 Mamram is the IDF’s central cloud and infrastructure provider, responsible for the military’s data centers and software engineering. During his service, Cohen developed the foundational concepts of the “Network Vault,” which became CyberArk’s flagship product. The “Vault” is essentially a militarized bunker for digital credentials, applying the strict compartmentalization and “need-to-know” access controls used in military intelligence to the corporate enterprise.
Strategic Implication:
The marriage of Unit 8200’s offensive mindset (Mokady) and Mamram’s defensive infrastructure (Cohen) created a product that militarizes civilian IT. CyberArk treats every employee identity as a potential “insider threat” and every privileged credential as a “weapon” to be locked away. This is not merely a business philosophy; it is the commercialization of the IDF’s internal security doctrine.
1.2 The “Revolving Door”: Current Executive Complicity
The “Unit 8200” connection is not a relic of the past; it is the active operating system of the company’s current leadership. The transfer of personnel from senior IDF command roles to CyberArk executive positions is seamless, suggesting a porous boundary between the state’s security apparatus and the private firm.
Omer Grossman (Chief Information Officer):
Grossman represents the most explicit link to active kinetic and cyber operations. His bio states that before joining CyberArk, he served as the Head of the IDF’s Cyber Defense Operations Center.10 In this role, he led “joint and national cyber defense campaigns and operations.”
- Significance: The Cyber Defense Operations Center is the nerve center for the IDF’s cyber warfare capabilities, coordinating defense for all military branches.
- Mamram Leadership: Grossman also served as the Head of Mamram, effectively the CEO of the IDF’s internal cloud and IT infrastructure.10
- Assessment: Grossman’s transition to CyberArk CIO implies that CyberArk’s internal IT and trust architecture is built by the same architect who designed the IDF’s war-fighting network. The operational continuity is absolute.
Chen Bitan (General Manager, Israel & Chief Product Officer):
Bitan manages the company’s massive R&D center in Israel. His background includes service in the IDF’s software engineering unit and leading the programming education department at the Computer Studies Academy (Mamram).12 This role is critical because the Computer Studies Academy is the primary training ground for the IDF’s technical corps. Bitan’s leadership ensures that CyberArk’s R&D culture mirrors the rigorous, mission-oriented engineering culture of the military.
Matt Cohen (CEO):
While not an IDF veteran, Matt Cohen’s tenure has been marked by a staunch ideological alignment with the Israeli state. Following the events of October 7, 2023, and the subsequent assault on Gaza, Cohen issued internal and public communications expressing “solidarity” and pride in employees called to “military reserve duty”.13
- Complicity Indicator: By actively supporting and enabling the reserve duty of employees—many of whom likely serve in cyber and intelligence units—CyberArk functions as a reservoir of specialized labor for the IDF during wartime. The company’s resilience plans 15 are specifically designed to allow this dual-role capability, ensuring the firm can support the war effort without collapsing commercially.
1.3 The Palo Alto Networks Acquisition: The “8200 Hegemon”
In a defining moment for the global cybersecurity market, CyberArk shareholders approved a $25 billion acquisition by Palo Alto Networks in 2025.1 This transaction is not just a financial exit; it is a geopolitical consolidation.
Nir Zuk and the 8200 Connection:
Palo Alto Networks was founded by Nir Zuk, an alumnus of Unit 8200 and an early employee of Check Point (another 8200-founded firm).2 Zuk is a towering figure in the “8200 ecosystem.” By acquiring CyberArk, Palo Alto Networks is effectively re-assembling the scattered diaspora of Unit 8200 talent under a single corporate umbrella.
The “Stack” Consolidation:
The merger creates a “Super-Stack” of Israeli-origin cyber defense:
- Network Security: Palo Alto Networks (Firewalls/SASE).
- Identity Security: CyberArk (PAM/Identity).
- Cloud Security: Palo Alto has aggressively acquired other Israeli firms (e.g., Talon, Dig Security).16
- Implication: This consolidation creates a singular, monolithic entity with unparalleled visibility into global data flows. For a technographic audit, this raises the “Complicity Score” to its maximum potential. A single corporate entity, deeply rooted in Tel Aviv and founded by Unit 8200 veterans, now controls the firewall (network perimeter), the cloud (application security), and the vault (identity security) for a vast swathe of the Fortune 500 and Western governments. The potential for intelligence blowback or “dual-use” exploitation is structural and immense.
1.4 Operational Footprint: The “Silicon Wadi” Fortress
Despite its NASDAQ listing and Massachusetts office, CyberArk’s center of gravity is undeniably Israeli.
- Asset Concentration: Approximately 71% of CyberArk’s long-lived assets are located in Israel.17 This is an unusually high percentage for a “global” company, indicating that its intellectual property, R&D labs, and server farms are physically domiciled within the jurisdiction of the Israeli Ministry of Defense.
- Be’er Sheva Cyber Park: CyberArk has expanded its presence in the “Gav Yam Negev” High-Tech Park in Be’er Sheva.18 This location is strategic; it is adjacent to the IDF’s new Technology Campus and the National Cyber Directorate. This physical colocation is designed to facilitate “ecosystem” collaboration—a euphemism for the seamless transfer of ideas, personnel, and technologies between the military, academia, and the private sector.
2. The “Unit 8200 Stack”: Technographic Dependencies and the Dual-Use Ecosystem
The concept of the “Unit 8200 Stack” refers to the suite of interoperable technologies produced by companies founded by alumni of the unit. These companies do not operate in isolation; they form a mesh network of partnerships, integrations, and shared investors that creates a self-reinforcing economy of surveillance and security. CyberArk sits at the center of this stack, providing the “Identity Security” layer that binds these disparate tools together.
2.1 Wiz: The Cloud Intelligence Layer
CyberArk has forged a critical strategic alliance with Wiz, the cloud security unicorn founded by Assaf Rappaport and his team—all veterans of Unit 8200.19
Technographic Integration:
The integration between CyberArk and Wiz is focused on “Cloud Visibility” and “Zero Standing Privileges”.21
- Mechanism: Wiz uses an “agentless” scanning technology—likely derived from offensive SIGINT techniques that scan networks without alerting the target—to map the entire cloud environment (AWS, Azure, GCP). It identifies “toxic combinations” of permissions.
- The CyberArk Handshake: Once Wiz identifies a risk, CyberArk’s “Secure Cloud Access” creates dynamic, just-in-time policies to remediate it.
- Complicity Analysis: This partnership operationalizes the 8200 methodology of “total visibility.” Wiz provides the panoptic view of the cloud, and CyberArk provides the control mechanism. The recent $32 billion acquisition bid for Wiz by Google 23 highlights the strategic value of this technology. By integrating with Wiz, CyberArk ensures its relevance in the “Project Nimbus” era (discussed later), securing the cloud environments that host Israeli government data.
2.2 SentinelOne: The Endpoint Enforcer
SentinelOne, founded by Tomer Weingarten (and other 8200 alumni), is a leader in Endpoint Detection and Response (EDR).5
Technographic Integration:
The integration is bi-directional and deeply entrenched.24
- Mechanism: SentinelOne’s “Singularity Data Lake” ingests identity data from CyberArk. If CyberArk detects a suspicious login, it can trigger SentinelOne to isolate the endpoint. Conversely, if SentinelOne detects malware, it signals CyberArk to revoke the user’s credentials.
- Complicity Analysis: This creates a “closed-loop” security system. During the 2023 Gaza war, SentinelOne’s workforce was heavily mobilized.26 The interoperability means that a customer buying the “stack” is buying a unified Israeli defense doctrine: lock the identity (CyberArk) and kill the process (SentinelOne). This stack is marketed aggressively to foreign governments, effectively exporting the IDF’s cyber-defense architecture as a commercial product.
2.3 The Supporting Cast: Nice, Verint, and Check Point
The audit reveals a broader reliance on the “classic” Israeli cyber ecosystem.
- Check Point Software: Founded by Gil Shwed (Unit 8200), Check Point is the “grandfather” of the industry. CyberArk maintains deep integrations with Check Point firewalls to secure network administrators.7
- Nice Systems & Verint: Both companies have origins in military SIGINT and voice recording. Nice (Neptune Intelligence Computer Engineering) and Verint (spun out of Comverse) are key partners in “Robotic Process Automation” (RPA) and analytics.
- The CyberArk Link: CyberArk secures the “software robots” deployed by Nice and Verint.28 These robots often process sensitive personal data in banking and telecommunications. Verint, in particular, has a history of providing “lawful interception” (wiretapping) systems to repressive regimes. By securing Verint’s infrastructure, CyberArk protects the “black box” of surveillance.
2.4 Monday.com: The Operational Backbone
CyberArk utilizes Monday.com for its internal Product and Technology Operations.31 Monday.com is an Israeli Work OS platform.32
- Significance: While Monday.com is a productivity tool, its use signals a preference for “keeping it in the family” (the Israeli tech ecosystem). Monday.com has also been flagged in boycott lists for its support of the Israeli economy during conflicts.34
Table 1: The “Unit 8200 Stack” Matrix
| Vendor / Partner |
Domain |
Founder Origin |
CyberArk Integration |
Complicity Risk Factor |
| Wiz |
Cloud Security |
Unit 8200 |
Deep API integration for Cloud Visibility & ZSP. |
Critical: 8200-derived tech; secures Gov cloud. |
| SentinelOne |
Endpoint (EDR) |
Unit 8200 |
Bi-directional threat intel sharing. |
High: Workforce mobilization; endpoint control. |
| Check Point |
Network Sec |
Unit 8200 |
Firewall admin security. |
High: Foundational 8200 firm. |
| Oosto (AnyVision) |
Biometrics |
Israeli Defense |
Securing biometric DBs & Admin access. |
Critical: Documented occupation usage. |
| Nice / Verint |
RPA / SIGINT |
Unit 8200/Defense |
Securing robotic credentials. |
High: History of wiretap/surveillance tech. |
| Claroty |
OT Security |
Unit 8200 (Team8) |
Securing Industrial Control Systems (ICS). |
Medium: Secures critical infrastructure/military OT. |
3. The Panopticon’s Keymaster: Surveillance, Biometrics, and “Loss Prevention”
A core requirement of this audit is to determine CyberArk’s proximity to “Retail Tech” and surveillance software. The findings are stark: CyberArk is the security layer that enables the safe operation of some of the most controversial surveillance technologies in the world.
3.1 Oosto (Formerly AnyVision): The Face of Occupation
Oosto (rebranded from AnyVision) is perhaps the most notorious Israeli surveillance firm. It has been documented by civil rights organizations and media outlets as the provider of facial recognition technology used by the IDF at West Bank checkpoints and for secret surveillance of Palestinians.3
The Technographic Link:
CyberArk lists Oosto as a Technology Partner.3
- The Integration: Facial recognition systems require massive databases of biometric templates and highly privileged administrative access to camera networks. CyberArk’s role is to secure these privileged credentials.
- The Complicity Logic: Without a solution like CyberArk, a facial recognition grid is vulnerable to insider threats or external hacking. By securing Oosto’s infrastructure, CyberArk provides the “Digital Vault” that keeps the surveillance data intact. They are the armor on the panopticon. This is not incidental; it is a material contribution to the reliability of a system used for military occupation.
3.2 BriefCam: Video Synopsis and “Safe Cities”
BriefCam is an Israeli video analytics company (acquired by Canon but operationally Israeli) famous for its “Video Synopsis” technology. This tool allows security operators to compress 24 hours of footage into a minute, overlaying events to rapidly identify targets.37
The Technographic Link:
CyberArk integrates with BriefCam’s Video Management Systems (VMS).4
- Mechanism: Video surveillance archives are high-value targets. CyberArk manages the passwords and access rights for the security officers and administrators who operate BriefCam.
- Application: BriefCam is widely used in “Safe City” projects (a euphemism for urban surveillance) and law enforcement. In the context of the prompt’s focus on “Loss Prevention” and “Retail Tech,” BriefCam is also deployed in large retail environments to track shopper behavior and identify “suspicious” individuals.40
3.3 Biometrics as “Frictionless” Control
CyberArk aggressively markets “passwordless” authentication, pushing organizations to adopt biometric verification (fingerprint, face, iris).41
- The “Retail Tech” Angle: The report highlights a focus on “Loss Prevention” and “Frictionless Checkout”.43 CyberArk secures the backend of these systems. In a modern “frictionless” store (like the Amazon Go model or similar projects by Trigo—an Israeli firm often integrated by partners), the user is tracked by hundreds of cameras and sensors.
- Behavioral Analytics: CyberArk’s platform ingests “Behavioral Biometrics” (typing cadence, mouse movement) to verify identity.44 This normalizes the continuous physiological monitoring of humans as a condition of access—whether to a bank account or a grocery store.
Assessment: CyberArk provides the “Identity Assurance” that legitimizes biometric surveillance. By wrapping these invasive technologies in a layer of “security,” they sanitize the process of extracting biological data from subjects.
4. Project Nimbus and the Architecture of “Digital Sovereignty”
“Digital Sovereignty” is a strategic imperative for the State of Israel, ensuring that its government, military, and critical infrastructure data resides within its jurisdiction and is protected by trusted (i.e., domestic) technologies. Project Nimbus is the manifestation of this doctrine.
4.1 The Nimbus Mandate
Project Nimbus is a $1.2 billion contract awarded to Google and Amazon Web Services (AWS) to provide a comprehensive cloud solution for the Israeli government and defense establishment.45 The contract explicitly includes the IDF and contains clauses preventing the tech giants from shutting down services due to political pressure (e.g., boycott campaigns).45
4.2 CyberArk: The “Lock” on the Nimbus Cloud
CyberArk is not merely a bystander to Nimbus; it is a key enabler.
- Strategic Partnership: CyberArk was one of the first major Israeli tech firms to publicly congratulate AWS on winning the tender and to migrate its own services to the new AWS Israel Region.47
- The Security Necessity: The Israeli Ministry of Defense (MoD) cannot move classified or sensitive data to a public cloud (even a local one) without “Military-Grade” access controls. CyberArk provides this layer. The audit identifies CyberArk as securing “Government ministries” and public entities in this transition.48
- Technographic Evidence: CyberArk’s “Cloud Entitlements Manager” and “Secure Cloud Access” products are designed specifically for this use case—enforcing “Least Privilege” in AWS/GCP.49
- Complicity Score: Critical. By securing the Nimbus infrastructure, CyberArk facilitates the digitization of the occupation. The Nimbus cloud hosts the databases used for population registry, land administration (settlement expansion), and military logistics. CyberArk ensures these databases are immune to disruption.
4.3 The “Cyber Dome” and National Defense
Parallel to the kinetic “Iron Dome,” Israel is building a “Cyber Dome” to defend against digital attacks.
- Architectural Role: As noted, CyberArk’s CIO Omer Grossman was the architect of the IDF’s cyber defense operations.10
- Active Participation: CyberArk participates in national-level cyber exercises, such as Cyber Dome VII, a joint drill between the IDF, US Cyber Command, and Israeli cyber firms.50
- Implication: CyberArk is effectively a deputized arm of the state’s cyber defense. In a conflict scenario, the line between CyberArk’s corporate SOC (Security Operations Center) and the national Cyber Directorate blurs.
5. “Project Future”: Retail Tech and the Civilian Surveillance Front
The audit investigated the specific query regarding “Project Future” and major retail digital transformation. The analysis connects CyberArk to Publicis Sapient and a “Top Global Retailer” (strongly implied to be ASDA/Walmart based on the “Project Future” codename and “scan-as-you-go” references).
5.1 The Publicis Sapient Integration
Publicis Sapient is a global digital transformation consultancy. The snippets confirm a deep partnership between Publicis Sapient and CyberArk.52
- The Case Study: Publicis Sapient led a massive transformation for a “Top Global Retailer” involving “Mobile scan-as-you-go technology,” “Grocery supply chain optimization,” and an “API-based microservices ecosystem”.54
- CyberArk’s Role: CyberArk secures the “Non-Human Identities” (API keys, machine secrets) that make this ecosystem work.55
5.2 The Surveillance of “Scan-as-you-Go”
“Scan-as-you-go” technology is a vector for surveillance. To prevent theft (“Loss Prevention”), these systems often integrate:
- AI Cameras: To match the scanned item with the visual feed (Loss Prevention software).
- Identity Verification: To approve age-restricted items or flag “high-risk” shoppers.
- Israeli Tech Stack: Retailers frequently turn to Israeli firms like Trigo (frictionless checkout) or Trax (shelf monitoring) for these capabilities. While the snippets do not explicitly link CyberArk to Trigo, they do link CyberArk to BriefCam and Oosto—both of which are used in retail security.3
Conclusion: In “Project Future,” CyberArk acts as the security guarantor for a retail environment where every shopper’s movement is tracked, analyzed, and verified. The “frictionless” experience is actually a “panoptic” experience, secured by CyberArk.
6. Operational Complicity: Legal, Military, and Economic Support
Beyond the technology, CyberArk’s operational behavior demonstrates high-level complicity.
6.1 Ministry of Defense Export Controls
CyberArk’s own legal documentation reveals that it treats its software as a controlled dual-use good.
- The Restriction: CyberArk explicitly states that export of its products to the Palestinian Authority Territories, Iraq, and Libya requires prior approval from the Israeli Ministry of Defense.56
- The Implication: This is a smoking gun. It confirms that the Israeli state views CyberArk’s software as strategically significant enough to be withheld from Palestinians. It is a tool of digital segregation—available to the occupier, denied to the occupied.
6.2 The “Civilian Soldier” Corporate Culture
During the “Swords of Iron” war (2023-2024), CyberArk did not remain neutral.
- Reserve Duty: The CEO acknowledged that a percentage of the workforce was drafted into the reserves.13 Given the profile of the workforce (Unit 8200 alumni), these employees likely served in key intelligence and cyber warfare roles.
- Corporate Support: The company stated, “We will prevail,” aligning its corporate mission with the military objectives of the state.14
- Economic Resilience: By maintaining operations despite the draft, CyberArk helps sustain the Israeli war economy, ensuring that the “tech engine” continues to fund the state’s military activities.15
6.3 Direct MoD Contracts
While CyberArk is a global company, it is also a defense contractor.
- Evidence: Sources list CyberArk alongside Elbit Systems and IAI as companies providing “increased support to the Israel Ministry of Defense” during the war.58
- Certifications: The company holds “Networthiness” certificates from the US Army and is on the DoD Information Network Approved Product List (DoDIN APL), confirming its status as a trusted vendor for military organizations globally.59
Works cited
- CyberArk Shareholders Approve the Company’s Acquisition by Palo Alto Networks, accessed January 16, 2026, http://investors.cyberark.com/news/news-details/2025/CyberArk-Shareholders-Approve-the-Companys-Acquisition-by-Palo-Alto-Networks/default.aspx
- In second-biggest exit in Israeli history, Palo Alto buys CyberArk for $25 billion, accessed January 16, 2026, https://www.timesofisrael.com/in-second-biggest-exit-in-israeli-history-palo-alto-buys-cyberark-for-25-billion/
- China Security News – SecurityInformed.com, accessed January 16, 2026, https://www.securityinformed.com/news/country/china-security-news.html?page=189&ref=red-pop-us
- BriefCam Partnerships in security and safety technologies, accessed January 16, 2026, https://www.briefcam.com/partners/our-partners/
- From IDF to Inc: The Israeli Cybersecurity Startup Conveyor Belt – SecurityWeek, accessed January 16, 2026, https://www.securityweek.com/idf-inc-israeli-cybersecurity-startup-conveyor-belt/
- Udi Mokady – CyberArk, accessed January 16, 2026, https://www.cyberark.com/company/leadership/udi-mokady/
- Unit 8200 – Wikipedia, accessed January 16, 2026, https://en.wikipedia.org/wiki/Unit_8200
- Trend Analysis The Israeli Unit 8200 An OSINT-based study CSS CYBER DEFENSE PROJECT – CSS/ETH Zürich, accessed January 16, 2026, https://css.ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/Cyber-Reports-2019-12-Unit-8200.pdf
- Alon Nisim Cohen – Wikipedia, accessed January 16, 2026, https://en.wikipedia.org/wiki/Alon_Nisim_Cohen
- CIO Connection – CyberArk, accessed January 16, 2026, https://www.cyberark.com/cio-connection/
- Omer Grossman – CyberArk, accessed January 16, 2026, https://www.cyberark.com/company/leadership/omer-grossman/
- CYBERARK SOFTWARE LTD. – SEC.gov, accessed January 16, 2026, https://www.sec.gov/Archives/edgar/data/1598110/000117891321001006/cybr20f2020.htm
- gcu to end relationship and contract with cyberark – GCU Students’ Association, accessed January 16, 2026, https://www.gcustudents.co.uk/thestudentvoice/gcu-to-end-relationship-and-contract-with-cyberark
- Our Hearts Are Broken, but We Will Prevail – CyberArk, accessed January 16, 2026, https://www.cyberark.com/resources/blog/our-hearts-are-broken-but-we-will-prevail
- CyberArk’s Operations Are Resilient Amid Israel-Hamas War: CEO | CRN, accessed January 16, 2026, https://www.crn.com/news/security/cyberark-s-operations-are-resilient-amid-israel-hamas-war-ceo
- Israel’s gold rush: Inside Palo Alto Networks’ $25b. acquisition of CyberArk, accessed January 16, 2026, https://www.jpost.com/business-and-innovation/tech-and-start-ups/article-863584
- Check Point, CyberArk, SentinelOne among most exposed in Israel-Hamas war: JP Morgan, accessed January 16, 2026, https://seekingalpha.com/news/4019170-check-point-cyberark-sentinelone-most-exposed-israel-hamas-conflict-jp-morgan
- סייברארק מרחיבה את מרכז הפיתוח בבאר שבע, accessed January 16, 2026, https://www.beer-sheva.muni.il/Lists/List1/DispForm.aspx?ID=2834
- Wiz leads the way: The top 10 biggest Israeli tech acquisitions of all time | Ctech, accessed January 16, 2026, https://www.calcalistech.com/ctechnews/article/coyx5jw0w
- CyberArk and Wiz Team Up To Provide Complete Visibility and Control for Cloud-Created Identities, accessed January 16, 2026, https://www.cyberark.com/press/cyberark-and-wiz-team-up-to-provide-complete-visibility-and-control-for-cloud-created-identities/
- Connect CyberArk + Wiz, accessed January 16, 2026, https://www.wiz.io/integrations/cyberark
- CyberArk earns Wiz partner award for advancing cloud identity innovation, accessed January 16, 2026, https://www.cyberark.com/resources/blog/cyberark-earns-wiz-partner-award-for-advancing-cloud-identity-innovation
- Cyberquake: Why Palo Alto Networks is eyeing Israel’s CyberArk – Ynetnews, accessed January 16, 2026, https://www.ynetnews.com/tech-and-digital/article/skflxbdwxl
- CyberArk and SentinelOne Team Up to Enable Step Change in Endpoint and Identity Security, accessed January 16, 2026, https://www.cyberark.com/press/cyberark-and-sentinelone-team-up-to-enable-step-change-in-endpoint-and-identity-security/
- SentinelOne and CyberArk Joint Solution Brief, accessed January 16, 2026, https://assets.sentinelone.com/singularity-marketplace-briefs/sentinelone-cyberark-sb
- How the Cybersecurity Industry Is Aiding Israel’s War Effort – BankInfoSecurity, accessed January 16, 2026, https://www.bankinfosecurity.com/how-cybersecurity-industry-aiding-israels-war-effort-a-23295
- 8200 Cyber Bootcamp – Elite Cybersecurity Training | 8200 Cyber Bootcamp, accessed January 16, 2026, https://cyber8200.com/
- Identity Security Partner Network – CyberArk, accessed January 16, 2026, https://www.cyberark.com/partners/partner-network/
- NICE Robotic Automation Technology Partners, accessed January 16, 2026, https://www.nicerpa.com/technology-partners/
- SECURE AND AUTHORIZED ACCESS OF APPLICATION CREDENTIALS FOR NICE ADVANCED PROCESS AUTOMATION’S ROBOTIC CLIENTS, accessed January 16, 2026, https://www.nicerpa.com/assets/media/pdf/nice-integration-with-cyberark.pdf
- Product and Technology Operations Manager – CyberArk, accessed January 16, 2026, https://www.cyberark.com/careers/all-job-openings/job-post/?job_id=744000093224071
- Cyber Security Management Solution (CSMS) – monday.com, accessed January 16, 2026, https://monday.com/p/partner-solution/cyber-security-management-solution-csms/
- Which Is a Better Investment, CyberArk Software Ltd. or monday.com Ltd. Stock? | AAII, accessed January 16, 2026, https://www.aaii.com/investingideas/article/255027-which-is-a-better-investment-cyberark-software-ltd-or-mondaycom-ltd-stock
- Israel ecosystem continues to scale up – – Global Corporate Venturing, accessed January 16, 2026, https://globalventuring.com/corporate/israel-ecosystem-continues-to-scale-up/
- Microsoft to divest AnyVision stake, end face recognition investing – iTnews, accessed January 16, 2026, https://www.itnews.com.au/news/microsoft-to-divest-anyvision-stake-end-face-recognition-investing-540033
- No Tech for Oppression, Apartheid or Genocide | BDS Movement, accessed January 16, 2026, https://bdsmovement.net/no-tech-oppression-apartheid-or-genocide
- BriefCam: Advanced Surveillance Systems for Business, accessed January 16, 2026, https://www.briefcam.com/
- Omdia, Leading Market Research Firm, Reveals Significant Bottom Line Returns in Video Analytics Investments | Business Wire – Via Ritzau, accessed January 16, 2026, https://via.ritzau.dk/pressemeddelelse/14117228/omdia-leading-market-research-firm-reveals-significant-bottom-line-returns-in-video-analytics-investments?publisherId=90456&lang=en
- How The Latest CyberArk Ecosystem Integrations Strengthen Identity Security for the Modern Enterpris, accessed January 16, 2026, https://www.cyberark.com/resources/product-insights-blog/how-the-latest-cyberark-ecosystem-integrations-strengthen-identity-security-for-the-modern-enterprise
- BriefCam Supported VMS – Milestone Systems, accessed January 16, 2026, https://www.milestonesys.com/support/software/briefcam-supported-vms/
- NIST 800-63-B: Authentication and Lifecycle Management Guidelines – CyberArk, accessed January 16, 2026, https://www.cyberark.com/resources/blog/nist-800-63-b-authentication-and-lifecycle-management-guidelines
- Passwordless | CyberArk, accessed January 16, 2026, https://www.cyberark.com/products/passwordless/
- EP 12 – From assumptions to accountability: A CISO’s take on cloud risk | CyberArk, accessed January 16, 2026, https://www.cyberark.com/podcasts/ep-12-from-assumptions-to-accountability-a-cisos-take-on-cloud-risk/
- A Technical Review of how Federal Agencies can Leverage CyberArk Identity Security Solutions to Align to the DoD’s Zero Trust – ATARC, accessed January 16, 2026, https://atarc.org/wp-content/uploads/2022/04/CyberArk-Zero-Trust-Paper.pdf
- Inside Israel’s deal with Google and Amazon – +972 Magazine, accessed January 16, 2026, https://www.972mag.com/project-nimbus-contract-google-amazon-israel/
- Project Nimbus – Wikipedia, accessed January 16, 2026, https://en.wikipedia.org/wiki/Project_Nimbus
- AWS to Open Data Centers in Israel – Business Wire, accessed January 16, 2026, https://www.businesswire.com/news/home/20210610006031/en/AWS-to-Open-Data-Centers-in-Israel
- History of Israel’s Good News Apr to Jun 2021, accessed January 16, 2026, https://verygoodnewsisrael.blogspot.com/2021/03/history-of-israels-good-news-apr-to-jun.html
- CyberArk Introduces First Identity Security Solution Purpose-Built to Protect AI Agents with Privilege Controls, accessed January 16, 2026, https://www.cyberark.com/press/cyberark-introduces-first-identity-security-solution-purpose-built-to-protect-ai-agents-with-privilege-controls/
- U.S., Israeli cyber forces build partnership, interoperability during exercise Cyber Dome VII, accessed January 16, 2026, https://www.army.mil/article/262622/u_s_israeli_cyber_forces_build_partnership_interoperability_during_exercise_cyber_dome_vii
- InCTF Conference, accessed January 16, 2026, https://conference.inctf.in/speakers
- Financial Services Harness the Power of Partnerships – Publicis Sapient, accessed January 16, 2026, https://www.publicissapient.com/industries/financial-services/partnerships
- Partnerships – Publicis Sapient, accessed January 16, 2026, https://www.publicissapient.com/partnerships
- One Global Grocer and Retailer’s 10-Year Digital Transformation Journey | Publicis Sapient, accessed January 16, 2026, https://www.publicissapient.com/work/leading-retailer-main
- Enable Digital Business Transformation | CyberArk, accessed January 16, 2026, https://www.cyberark.com/solutions/digital-business-transformation/
- Restricted access to specific countries | CyberArk Docs, accessed January 16, 2026, https://docs.cyberark.com/ispss-get-started/latest/en/content/getstarted/geo-restrictions.htm
- Restricted access to specific countries – CyberArk Docs, accessed January 16, 2026, https://docs.cyberark.com/remote-access-standard/latest/en/content/resources/frontmatter/cc_restrictedaccess.htm
- Proxy Statement – SEC.gov, accessed January 16, 2026, https://www.sec.gov/Archives/edgar/data/1027664/000162828024005767/elbit-february2024proxysta.htm
- Government | CyberArk, accessed January 16, 2026, https://www.cyberark.com/solutions/government/
- CyberArk Software | NAVAIR OSBP, accessed January 16, 2026, https://www.navair.navy.mil/osbp/node/8326