Updated Apr 22, 2026
Score 26
CyberArk logo

CyberArk

Ranked #792 of 1,000+ cybersecurity companies
Profile
INITIALIZING DATA STREAM...

Overview

Legal Name
CyberArk Software Ltd.
Founded
1999

CyberArk is the global leader in identity security.

CyberArk, the global leader in identity security focused on privileged access, protects critical assets across applications, workforces, hybrid cloud, and DevOps with proactive, compliant threat defense—now enhanced by Cybertinel’s innovative threat-detection technology and expert team.

Industries
Network Management SoftwareIT System Custom Software DevelopmentIT Consulting and OutsourcingCybersecurity
Type
Public Company
Social Media

Company Size

Employees
 
2,943
Range1,001–5,000 employees
110K+

Headquarters

Newton Centre, Ma, United States

Followers

 
318,895

Press Coverage

DateArticlePublisher
Oct 30, 2025Halper Sadeh LLC Encourages GES, MTSR, TGNA, CYBR Shareholders to Contact the Firm to Discuss Their RightsPR Newswire
Oct 29, 2025Sweet Security Brings Runtime-CNAPP Power to WindowsSweet Security
Oct 28, 2025Check Point Earnings, Revenue, Billings Top EstimatesInvestor's Business Daily
Oct 18, 2025CyberArk Named a Leader in the 2025 Gartner® Magic Quadrant™ for Privileged Access ManagementANTARA
Oct 8, 2025$HAREHOLDER ALERT: The M&A Class Action Continues to Investigate Merger – MLNK, CCRD, AMWD, and CYBRMonteverde & Associates PC
Oct 7, 2025With the US all-in on AI, buzz on AI agents gets louder and need for trust increasesBiometricUpdate.com
Sep 30, 2025CyberArk Is a Proud Participant in the Microsoft Security Store Partner EcosystemMarketScreener
Sep 29, 2025SHAREHOLDER INVESTIGATION: Halper Sadeh LLC Investigates STAA and CYBR on Behalf of ShareholdersMarketScreener
Sep 29, 2025SHAREHOLDER INVESTIGATION: Halper Sadeh LLC Investigates STAA and CYBR on Behalf of ShareholdersPR Newswire
Sep 27, 2025SHAREHOLDER INVESTIGATION: Halper Sadeh LLC Investigates STAA and CYBR on Behalf of ShareholdersHalper Sadeh LLC

1–10 of 67

Specialties

Privileged Account SecurityAdvanced Threat ProtectionInsider Threat ProtectionPrivileged Identity ManagementPrivileged Session ManagementSSH Key ManagementHighly Sensitive Information ManagementInformation Security SoftwareDevOps SecurityDevSecOpsCloud SecurityIdentity SecurityPrivileged Access Management