<img src="https://ad.doubleclick.net/ddm/activity/src=11631230;type=pagevw0;cat=pw_allpg;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ord=1;num=1?" width="1" height="1" alt=""> Identity is the New Perimeter, but Data is Still the Target: Unpacking the CrowdStrike-SGNL Acquisition

Identity is the New Perimeter, but Data is Still the Target: Unpacking the CrowdStrike-SGNL Acquisition

Matt Howard
By Matt Howard

TABLE OF CONTENTS

    See Virtru In Action

    If you are watching the cybersecurity ticker tape today, the headline is clear: CrowdStrike (CRWD) has acquired SGNL. But, if you look past the press release, you’ll see a much larger narrative unfolding, a distinct game of "Follow the Leader" playing out between the titans of our industry, CrowdStrike and Palo Alto Networks.

    With Palo Alto Networks massive acquisition of CyberArk previously setting the stage, CrowdStrike’s move today to snap up SGNL confirms a central thesis: Identity has become the primary control plane for modern defense.

    As an expert in data-centric security, I find this consolidation fascinating, not just for what it solves, but for the massive gap it leaves wide open. Let’s unpack the strategy, the differences, and why a "better perimeter" and “stronger identity” still aren't enough to protect what actually matters: your data.

    Platform Consolidation: M&A Mimic

    Both Palo Alto Networks and CrowdStrike are aggressively pursuing platform consolidation. The thesis is simple: The C-suite wants fewer vendors and tighter integration. By folding identity capabilities into their respective security clouds, both vendors are promising to close the gap between threat detection and access privileges.

    Both deals are explicitly "Identity-First." They recognize that in an era of AI agents and non-human identities, the old school firewall is dying, or already dead. The new perimeter is the login prompt (and the API key).  This is true for both humans' and machines' identities.

    Same Strategy, Different Tactics

    While the strategic goal is identical—control the identity plane—the tactical execution differs significantly in scale and product breadth.

    1. The Scale: Platform vs. Tuck-in
      Palo Alto Networks went for the "big bang" with CyberArk, a $25 billion mega-merger absorbing an established franchise. In contrast, CrowdStrike’s acquisition of SGNL (approx. $750M) is a surgical strike. It is a start-up tuck-in designed to inject modern agility into the Falcon platform rather than absorb a legacy giant.
    1. Product Breadth: Broad Suite vs. Sharp Wedge
      CyberArk brings Palo Alto Networks a massive, sprawling portfolio: PAM, SSO, IGA, and Secrets Management. It is everything for everyone. SGNL, however, is laser-focused. It primarily serves as a runtime access enforcement layer. It specializes in Zero Standing Privilege, the idea that no one (human or AI) should hold keys longer than the millisecond required to turn the lock.

    The "Maginot Line" of Cyber Defense

    While these acquisitions are smart business moves, they suffer from the same philosophical flaw that has plagued our industry for two decades: Both the PAN/CyberArk and CRWD/SGNL combinations are fundamentally defensive, perimeter-centric controls.

    They are building higher walls and smarter gates. They are designed to answer one question: Should this user be allowed inside the domain?

    But here is the uncomfortable truth: The data doesn't stay in the domain.

    In the modern enterprise, sensitive data is designed to travel. It moves via email, lands in collaboration tools, is shared with third-party vendors, and is ingested by AI models.

    The moment an authorized user (or a compromised identity that has bypassed SGNL or CyberArk’s checks) exports that file, the security provided by these platforms evaporates. They protect the container and the door, but not the asset itself.

    The Future is Data-Centric and Offense-Focused

    We need to stop pretending that securing the identity is the same as securing the data.

    The future of security is not just about keeping intruders out (defensive security); it is about maintaining control of your data even when it is shared into the wild (offensive security).

    This is where Data-Centric Security enters the conversation. True security requires that protection and policy are wrapped around the data object itself, regardless of storage, network, or identity provider.

    At Virtru, we are championing this shift through open standards like the Trusted Data Format (TDF). Unlike the platforms offered by PAN or CRWD, TDF allows organizations to:

    1. Protect the Data, Not the Proxies: The protection travels with the data, whether it is an email, a PDF, or an AI training set.
    2. Enforce Granular Policy Everywhere: You can grant a partner access today and revoke it tomorrow, even if that partner has downloaded the data to their own laptop.
    3. Enable Secure Sharing: Business runs on sharing. We enable you to share sensitive IP outside your domain without sacrificing security, control, or privacy.

    Identity Security vs. Data Security — There's a Big Difference

    CrowdStrike's acquisition of SGNL is a win for identity hygiene and a smart counter-move to Palo Alto. It will undoubtedly make it harder for hackers to escalate privileges.

    But let’s not confuse identity security with data security.

    While the giants fight over who controls the door, the smartest organizations are focusing on the data that’s walking out of it. By integrating Virtru’s data-centric controls on top of these identity platforms, you move from a defensive posture to a position of absolute sovereignty over your data — wherever it goes.

    Matt Howard

    Matt Howard

    A proven executive and entrepreneur with over 25 years experience developing high-growth software companies, Matt serves as Virtru’s CMO and leads all aspects of the company’s go-to-market motion within the data protection and Zero Trust security ecosystems.

    View more posts by Matt Howard

    See Virtru In Action