Through the Lens - Cybersecurity

RESEARCH New Edge Analytics

Is Cyber the Next Leg Up for IaaS?

Cyber is a tricky business.

Over the last decade, cyber powerhouse Palo Alto Networks (NASDAQ:PANW) has pursued an acquisition strategy that is best understood not as opportunistic deal-making, but as deliberate construction of an ecosystem. Rather than relying solely on internal R&D to extend its product line, the company consistently used acquisitions to assemble a portfolio of cybersecurity software applications that integrate tightly with its core firewall and network security platforms.

In doing so, Palo Alto Networks brought not only new technologies into the firm, but also engineering talent, operating cultures, and a network of many of the most influential executives in the industry. With this comes established customer relationships that accelerated its evolution from a firewall company into a broad, subscription-driven cybersecurity platform.

Let’s Get the Relevant Jargon Out of the Way First

“Hyperscalers” — Alphabet, Amazon, Meta, Microsoft and Oracle.

“Platformization” — The strategic transition from managing a fragmented toolbox of individual, single-purpose software applications (point solutions) to adopting a unified, integrated platform that serves as a central, foundational hub.

“Agentic AI” — An artificial intelligence application that runs and is optimized to run alongside the specific application you’re using or is implemented in your compute framework. Agent AI acts as a “digital worker” or “colleague”.

“Observability” — A well-established category of cybersecurity applications that can find a live threat, then make it visible to network engineers and automated systems, allowing the ability to trace the bad actor even if its form morphs while inside the network.

“Identity Security” — In early days, cybersecurity applications were applied to machines, endpoints and servers. Lately, identity means machines, users and AI agents that operate inside the network firewall regardless of where the function is located in the stack.

“SaaS” — Software as a Service. A cloud-based software application that you don’t buy. It’s a subscription with the vendor with no compute ownership. Like subscribing to Hulu or Peacock on your TV except (this is a metaphor) it’s a software application, not streaming content. ChatGPT is a SaaS application.

“IaaS” — Infrastructure as a Service. A vendor controls your total compute experience, end-to-end, and owns all the underlying components of modern cloud networks: fiber circuits, data centers, submarine cable, network operations, and racks of equipment hosting data and software applications. In the 1990’s we would have called these ISP’s - “Internet Service Providers”.

Over a Decade of Tuck-In Acquisitions

There’s an inflection point, beginning in the last twelve months, where PANW ‘went big’ and completed the acquisition of Chronosphere, a next generation Observability platform for $3.35B. A recent asset sale prior to Chronosphere made by IBM to PANW bolstered the customer portfolio in that space. Then CyberArk (NASDAQ:CYBR) was announced, completed on February 11, 2026 for $25B, two months ahead of initial guidance. The latter is financed with cash and PANW stock. They inked the deal to bolster their Identity Security platform in a world where the AI threats escalate almost daily, and fringe networks are increasingly vulnerable. Like desktop applications, security platforms need AI Agents.

These are blockbuster deals compared with their acquisition history. Picking up CYBR for $25B is already an order of magnitude bigger than the Chronosphere deal at $3.35 billion. And the Chronosphere deal was already an order of magnitude bigger than PANW’s deal size over the past decade, $400m on average. These tuck-ins, privately funded, were successful exits for the VC-financed cyber community.

Modern network security is broadly considered an ecosystem, and it represents a fundamental shift from fragmented security apps. This results, in a maturing industry, to an integrated platform of cybersecurity solutions. Don’t exclude the “people factor”, the engineers who are building the ecosystem and the management teams with deep ties across the cloistered cybersecurity community. It’s a relatively modest niche in the business of Information Technology where management know each other and/or worked together at times along their career path.

The Notion of Acquisitions to Build an Ecosystem

But is this about growth or defensive posturing facing the Hyperscalers? Is PANW scaling by choice – or by necessity? Not sure, but probably both. Let’s use PANW as a proxy for cyber applications that Hyperscalers might want to buy. PANW is buying Chronosphere and CyberArk, at much higher consideration than the average of the deals they’ve done in more than the last ten years. It indicates they decided to add larger, horizontal acquisitions before a Microsoft or Google decide to spend their cash and beat them to it, such as buying Check Point or Fortinet for example. This ultimately would make a big cyber company part of the developing Infrastructure as a Service (IaaS) model for Hyperscalers.

Palo Alto Networks’ early success was anchored in next-generation firewall technology, but the company’s leadership recognized early that network security alone would not remain a sufficient control point in enterprise IT environments. As workloads migrated to the cloud, applications became distributed, and “Identity” replaced physical location as the primary security flash point. Identity can be a human, a machine, a database application, and lately some AI Agent running on networks live on the network. The firm faced a strategic choice: remain a best-in-class firewall vendor or expand into a broader security platform that accommodates Identity threats.

The acquisition path Palo Alto Networks chose suggests a clear answer. Rather than attempting to build every adjacent capability organically, the company found emerging cybersecurity niches and selectively acquired companies that were already credible players with a narrowly defined cyber solution. These acquisitions were rarely about scale. A catalog of the companies PANW acquired and solutions they served are in Table 1.

In the late 1990’s and early 2000’s, specialized cyber software applications lived on separate physical or virtual servers whose code and operations swirled around the native functions of the firewall. This created silos where data was redundant between apps and soon became a management nightmare. The modern firewall ecosystem consolidates this collection of standalone applications into a single, high-performance software platform that runs in conjunction with the hardware and monitors/protects all of these data assets.

In 2018, New Edge Analytics published a group of articles about PANW as a proxy for the industry simply because of their firewall legacy. The tuck-in acquisitions PANW was making then are better called “vertical integration” now by M&A analysts, and for PANW this fits a recognizable pattern; deals ranging in size from $150m to $700m.

These were classic tuck-ins: small enough not to strain the balance sheet, but large enough to materially advance the firm’s technical roadmap. In economic terms, these deals increase control over the entire security stack and raise revenue through cross-selling. This creates a value chain and reduces time-to-market with new features, rather than requiring time spent on R&D and internal coding.

Table 1. Palo Alto Networks acquisitions and capabilities
Year Company Deal Size Core Capability Headquarters
Tuck-In Acquisitions (2015–2024)
2015Cyvera$200MEndpoint SecurityTel Aviv, Israel
2016LightCyber$100MBehavioral AnalyticsHerzliya, Israel
2017Evident.io$300MCloud Security PostureSan Mateo, USA
2018RedLock$173MCloud ComplianceTel Aviv, Israel
2019Twistlock$410MContainer SecurityHerzliya, Israel
2019Demisto$560MSOAR AutomationTel Aviv, Israel
2019PureSec$50MServerless SecurityTel Aviv, Israel
2019Zingbox$75MIoT SecuritySan Jose, USA
2019Aporeto$150MWorkload IdentitySan Jose, USA
2020CloudGenix$420MSD-WAN / SASESan Jose, USA
2020Crypsis Group$265MIncident ResponseMcLean, USA
2020Expanse$670MAttack Surface MgmtSan Francisco, USA
2021Bridgecrew$156MDevSecOpsTel Aviv, Israel
2022Cider Security$195MApplication SecurityTel Aviv, Israel
2023Dig Security$350MData SecurityTel Aviv, Israel
2023Talon Cyber Security$625MSecure BrowserTel Aviv, Israel
2024Protect AI$675MAI Model SecuritySeattle, USA
Recent Additions Affecting Capital Structure (2024–2026)
2024IBM QRadar SaaS Assets$1.14BSIEM ExpansionGlobal
2026Chronosphere$3.35BCloud ObservabilitySan Mateo, USA
2026CyberArk$25BIdentity SecurityPetah Tikva, Israel

Executive Pedigree, and Quality of Earnings

An underappreciated dimension of Palo Alto Networks’ acquisition strategy, in terms of the companies acquired, is the consistent presence of senior executives, both within PANW and among acquired companies, who trace their professional careers to the Israeli Army’s intelligence community, particularly Unit 8200. This pedigree is not relevant as a matter of geopolitics or covert activity. Its importance lies in how it shapes strategic priorities, authenticates customer credibility, and fosters peer communication to line up government contracts – which are a more stable sales pipeline than experienced with commercial customers.

At the center of this lineage is PANW founder Nir Zuk, who served in Unit 8200 prior to founding the company in 2005 and, at the time of the 2018 NEA publications, was Chief Technology Officer and a board member (a role he continues to hold). His background established early cultural norms around PANW’s signals intelligence work, and implementation of large-scale systems engineering projects.

Table 2. Executives with Unit 8200 pedigree connected to PANW
Executive Company Role InfoSec Background Acquisition Year Current / Subsequent Role
Nir ZukPalo Alto NetworksFounder; CTO (2018); Board MemberUnit 8200 (SIGINT)N/ABoard Member
Assaf RappaportCyveraCo-founder / CEOUnit 82002015Former PANW exec; Founder of Wiz
Lior DivCyveraCo-founder / PresidentUnit 82002015Former PANW exec; Founder of Wiz
Adi DarCyveraCo-founderUnit 82002015Former PANW engineering leadership
Nir GaistLightCyberCo-founder / CTOUnit 82002016Former PANW analytics leadership
Idan TendlerBridgecrewCo-founder / CEOUnit 82002021Senior leader, PANW AppSec
Daniel KrivilevichCider SecurityCo-founder / CTOUnit 82002022Senior technical leader, PANW AppSec
Dan BenjaminDig SecurityCo-founder / CEOUnit 82002023Senior leader, PANW Data Security
Ofer Ben-NoonTalon Cyber SecurityCo-founder / CEOUnit 82002023Senior leader, PANW Endpoint

The US intelligence community equivalent of Unit 8200 owning the SIGINT charter is the National Security Agency, but NSA is much larger. PANW works here too. Government contracts – particularly in the US defense and intelligence agencies – tend to be longer-term, budgeted years in advance, and less sensitive to short-term IT spending cycles. It’s public knowledge that the US is a political and military ally with Israel. It’s easy to rationalize that PANW has predictable cash flow from government contracts which improve what we call earnings quality.

From an equity analysis perspective, this distinction is material. Revenue streams with lower volatility support more durable growth projections in discounted cash-flow models and ultimately lead to higher valuations – an advantage (better terms) when financing acquisitions. When viewed through this lens, PANW’s pattern of integrating executives with Unit 8200 pedigree is not incidental. It’s an intentional complement to the firm’s acquisition-driven expansion across both government and commercial cybersecurity markets.

The Other Side of the Inflection Point

For nearly a decade, Palo Alto Networks deployed capital in increments measured in hundreds of millions of dollars. The objective was consistent: acquire specific capabilities, integrate them into the platform, and expand depth across the cybersecurity stack. Beginning in 2024, that pattern changed. Transactions moved from feature acquisition to capitalization strategies. The difference is not merely scale. It reflects a shift in corporate posture.

The acquisition of IBM’s QRadar SaaS assets marked the first signal of that transition. This was not a narrow technology addition. It expanded distribution and brought an installed enterprise base into the PANW Cortex ecosystem – their brand of AI-driven, cloud-native security operations. Chronosphere extended that logic into Observability, increasing telemetry depth and positioning PANW closer to infrastructure-level visibility. CyberArk moved further still, adding Identity Security at enterprise scale after closing on February 11, 2026. Identity Security is the buzz of this deal. Unlike earlier tuck-ins, CYBR required capital deployment including the use of equity. That alone signals structural change for Palo Alto. All of the prior deals were done in cash.

Figure 1. Cumulative acquisition spend, 2015–2026

Cumulative acquisition spend, 2015–2026

Capital deployment is steady through 2024, then steps up sharply in 2026 with Chronosphere and CyberArk.

The cumulative investment curve illustrates the break. Capital deployment was steady through 2024. Beginning in 2025 and into 2026, the curve turns sharply upward. The competitive landscape provides context. Hyperscalers control IaaS and increasingly embed security within compute environments. As AI workloads expand, Observability and Identity Security sit adjacent to core infrastructure. A large acquisition by a Hyperscaler in these domains would reshape competitive positioning. Scaling now reduces the probability that PANW remains confined to its historical perimeter, they have a seat at the table in other words.

This is not a departure from prior discipline. It is the logical extension of a decade spent building platform depth. The difference is that depth alone is no longer sufficient. Capital scale, distribution breadth, and balance sheet flexibility now matter. The inflection point represents maturity, not abandonment of strategy, but it introduces a new phase in which capitalization becomes as important as integration.

Through the Lens of New Edge Analytics

Is cyber really a tricky business? Well, there still is a great deal of fragmentation, some consolidation, and a lot of moving parts. And the fear of losing control of your destiny in the cyber market to a Hyperscaler isn’t entirely unfounded. In December 2025, PANW announced the intent to spend $10B in partnership with Google to migrate key internal workloads to Google Cloud. The companies said the deal is an expansion of their existing strategic partnership and will deepen their engineering collaboration. Palo Alto Networks is now using Google’s Gemini AI models to power its copilots, and it is also using Google Cloud’s Vertex AI platform.

Vertical deals optimize what PANW can sell. CyberArk and Chronosphere are horizontal integrations. Horizontal deals expand who PANW can sell to. These deals add large groups of new customers and substantially more Annual Recurring Revenue. It stabilizes cash flow. This immediately expands market share in the whole of the cybersecurity industry. The resulting aspect, scaling the platform through sheer growth in the number of customers, creates the opportunity to deploy PANW’s vertically integrated ecosystem across a much broader customer base by cross-selling in both government and commercial markets.

PANW began to pursue horizontal expansion only after it had a sufficiently deep, internally integrated platform to monetize effectively. And the ferocious adoption of AI solutions is impacting the cybersecurity industry as a whole creating a race to be a market leader.

Finally, and not to be overlooked, PANW has a history of bringing industry leaders along with the tuck-in acquisitions, and by way of that, their relationships with senior executives in the industry – simply meaning they know the space. And with that pedigree, a depth of professional relationships across the customer base and industry peers.

Taken together, the progression to larger mega deals paid for with stock suggests strategic maturity rather than strategic drift (a loss of focus) and that’s a reasonable justification to do the deals. PANW first invested in building depth – owning the technical primitives of modern cybersecurity – before committing capital to expand breadth, adding companies who already have a large and mature customer base. A motive force that’s likely to continue for them.


Copyright © 2026 New Edge Analytics. All rights reserved.

Next
Next

Through the Lens - Public Policy