The cybersecurity industry witnessed a seismic shift last week with Palo Alto Networks' $25 billion acquisition of CyberArk. This landmark deal represents both a dramatic departure from Palo Alto's historical M&A playbook and a logical progression in their strategic vision.
Let's unpack what this means for the evolving data security landscape—and what critical piece is still missing from the puzzle.
At first glance, this acquisition appears to break with Palo Alto Networks' established pattern in two significant ways:
Yet, upon closer examination, this move was almost inevitable. CEO Nikesh Arora has consistently emphasized the "platformization" of cybersecurity—the strategic consolidation of security capabilities into comprehensive platforms that address the full spectrum of enterprise needs. This philosophy has guided Palo Alto's transformation from a firewall company into a multi-platform security provider.
"Our market entry strategy has always been to enter categories at their inflection point, and we believe that moment for Identity Security is now," Arora's statement reads.
The signs were clearly visible in December 2023 when Palo Alto "shifted left" on the data control plane by acquiring Dig Security, entering the Data Security Posture Management (DSPM) space. This move strengthened their capabilities in preventing data loss by providing visibility into where sensitive data resides and identifying vulnerabilities.
With CyberArk, they've now "shifted right" into identity access management, privileged account security, and identity governance. This represents one of the final pieces in Palo Alto's mission to consolidate the zero trust control plane, creating a comprehensive security framework that spans networks, endpoints, applications, identities, and data.
/blog%20-%20CyberArk%20and%20Palo%20Alto/Control%20Plane%20Update%20PAN%20+%20CyberArk_FINAL.png?width=574&height=548&name=Control%20Plane%20Update%20PAN%20+%20CyberArk_FINAL.png)
While the Palo Alto-CyberArk combination creates a formidable security platform that addresses many aspects of the zero trust architecture, there remains a critical capability gap that neither company addresses: enabling organizations to maintain control of sensitive data once it's shared outside their perimeter.
At Virtru, we call this capability "data grip"—the ability to apply and enforce granular policies and access controls on sensitive data as it moves beyond organizational boundaries through emails, files, and collaborative workflows.
Data grip exists at the intersection of data that has been tagged with attributes, and identities (human and machine) that have been authenticated with entitlements and need-to-know. This intersection is precisely where Virtru excels, providing organizations with persistent control of their data wherever it travels.
Recommended Reading: What is Data-Centric Security?
The foundation of Virtru's data grip capability is the Trusted Data Format (TDF), an open standard invented by Virtru co-founder Will Ackerly. TDF enables persistent protection and granular policy enforcement throughout the data lifecycle, regardless of where that data travels or how it's shared.
Unlike traditional security approaches that focus on protecting networks, devices, or applications, TDF wraps each piece of data in its own security envelope. This means the protection stays with the data itself, ensuring that access controls, encryption, and policies remain enforced even when data is shared with external partners, stored in third-party systems, or accessed from unmanaged devices.
Recommended Reading: What is the Trusted Data Format (TDF), And How Does It Work?
Data sharing is not optional—it's essential. Organizations must collaborate with partners, share information with customers, and enable data-driven innovation to remain competitive. Yet they must do so while maintaining control and compliance.
This is why data grip is so crucial. It allows organizations to:
The Palo Alto-CyberArk combination strengthens several pillars of the Zero Trust architecture, including user identity, device security, application protection, and data visibility. However, it's Virtru's TDF-powered platform that completes the data security control plane by enabling secure data sharing and collaboration beyond organizational boundaries.
As enterprises continue their digital transformation journeys, the ability to share data with others, while maintaining grip, will be a foundational component of every zero trust security strategy.
The Palo Alto-CyberArk acquisition signals a broader industry recognition that security must be identity-aware and data-centric. At Virtru, we've been championing this approach for years, and we're encouraged to see the market moving in this direction.
However, true data-centric security requires more than just knowing where your data is and who has access to it—it demands the ability to maintain control of that data throughout its entire lifecycle, even as it travels outside your walls. This is the promise of data grip, and it represents the next frontier in the evolution of zero trust security.
As organizations assess their security strategies in light of this industry-shaking acquisition, they would be wise to consider not just how they'll protect data within their environments, but how they'll maintain control of it everywhere it goes.
That's where Virtru and TDF come in, completing the zero trust control plane with the critical capability of persistent, policy-based protection for shared data.
A proven executive and entrepreneur with over 25 years experience developing high-growth software companies, Matt serves as Virtru’s CMO and leads all aspects of the company’s go-to-market motion within the data protection and Zero Trust security ecosystems.
View more posts by Matt HowardSee Virtru In Action
Sign Up for the Virtru Newsletter
/blog%20-%20Private%20Cloud%20Compute%20is%20Only%20Half%20the%20Story/PrivateCloudCompute.png)



/blog%20-%20title%2048%20november%2010/cmmcnov10.webp)
/blog%20-%20ukraine%20and%20taiwan%20HIO%20recap/UkraineTaiwanRecapBlog.webp)
/blog%20-%20data%20liberation/data-liberation-2.jpg)
/blog%20-%20ACP-240%20and%20HIGHMAST/highmast-acp-240.webp)

/blog%20-%20discord-zendesk%20breach/discord-breach.webp)
/blog%20-%20Fortra%20Zero-Day%20Exploit/fortra-goanywhere-vulnerability.webp)
Contact us to learn more about our partnership opportunities.