<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

Achieve Zero Trust in AWS 🔒 Join our hands-on workshop on February 27!

Search
Close icon
Search bar icon

CyberArk-Wiz Partnership: Cloud Security or Cloud Confusion?

StrongDM manages and audits access to infrastructure.
  • Role-based, attribute-based, & just-in-time access to infrastructure
  • Connect any person or service to any infrastructure, anywhere
  • Logging like you've never seen

Yesterday, CyberArk announced a new partnership with Wiz, where they’re touting “complete visibility and control for cloud-created identities.” I know I’ve had my fun poking holes at CyberArk in the past, but with this announcement, they’ve just handed the world a glaringly tone-deaf admission of being outdated, un-innovative, and uninterested in what enterprise security teams actually want. 

This partnership is apparently intended to establish that CyberArk has a cloud security strategy.

Spoiler alert: It doesn’t.

Enterprises are looking to fix the real gaps in cloud security, delivering access that aligns with the dynamic, continuous scaling of cloud environments. CyberArk’s attempt feels like a rushed band-aid rather than the real innovation needed to protect modern infrastructure. As I’ve said previously, security teams deserve better, and that starts by getting the truth on what CyberArk is and is not really announcing.

The Truth Behind the CyberArk Announcement

Here’s the short version: CyberArk needs help to stay relevant. They want to be seen as a cloud security vendor, and they’re hoping Wiz, the reigning Cloud Security Posture Management (CSPM) leader, will make them look like they’re ready for the cloud. The problem is that CyberArk is still clinging to an outdated, legacy version of PAM, which has historically struggled to meet the needs of today’s multi-cloud, cloud-native environments.

This partnership announcement is a distraction. The language in it, and CyberArk’s own track record, demonstrate that the company operates without an understanding of what modern PAMs should be and how they can work for modern environments. Let’s look at what can be expected.

CyberArk’s Cloud Solution: A Long, Long Way Off

First off, this partnership announcement is just that—an announcement. CyberArk may talk about big plans, but bringing a cloud-native PAM solution to market is complex work. Based on CyberArk’s track record, this “solution” could take two or three years to materialize, if it ever does. And IF it ever does, it will be laden with professional services requirements like their other offerings. Why wait years for a half-baked product when StrongDM offers true cloud-ready PAM right now?

CyberArk’s release notes over the last 14 months reveal minor updates that barely scratch the surface of innovation. The company’s DNA is not wired to rapidly build market-ready solutions that address today’s problems. By contrast, at StrongDM we use feedback from customers, prospects, analysts, market trends, and other sources to accelerate and deliver innovative capabilities. We pressure test our theories and while we hold ourselves to high standards, we also push code to ensure that our users are always using the most current fine-grained, policy-based access control capabilities. 

Complexity + Compatibility = [More] Frustration

CyberArk is known for being cumbersome to deploy. It’s a heavy, complex solution that already takes too long to get up and running. Wiz, by contrast, is an agile, modern system that delivers more innovation in a month than CyberArk has done in the past year. There’s zero guarantee that these two platforms will integrate smoothly, and that’s a nice way of saying this partnership will probably introduce new pain points rather than solving your cloud security needs.

Deploying a hybrid solution like this will be challenging, time-consuming, and more than likely to create gaps in your cloud security. StrongDM users don’t have to worry about any of that. We’re not interested in forcing two polar opposite technologies to fit together—we’ve already solved the problem with a unified, frustration-free platform. 

Database, Kubernetes, and Cloud-Native Resources? Still Unprotected

Here’s where the CyberArk-Wiz combo starts to look like a little sleight of hand. The announcement conveniently avoids mentioning that the proposed solution does not actually protect access to Kubernetes clusters, databases, or other cloud-native resources. Think of it like securing the front gate to your estate while leaving all the windows and doors wide open.

CyberArk is offering more “visibility” into cloud resources, but visibility doesn’t equal security. StrongDM gives you true control over who can access what—across your databases, Kubernetes clusters, and all the other places where security threats like to sneak in. CyberArk somehow fails to recognize that no one wants a solution that only protects half the house?

Developer Unfriendly: Complex Solutions Without the Right Documentation

Developers are significant players in the security equation, yet CyberArk has purposefully chosen to forsake developers, which is evidenced by their cumbersome products. Their documentation ignores developer needs and adds unnecessary complexity to the modern workflows in use at every startup and enterprise. The real kicker? CyberArk asks you to pay for the privilege of setting up their software.

StrongDM’s approach is different. Our platform is developer-friendly, with straightforward documentation and intuitive tools that allow your devs integrate and deploy without jumping through hoops. Cloud security shouldn’t require a master’s degree in engineering to figure out.

And note that StrongDM's platform is in use by tens of thousands of developers on a daily basis, and supports tens of millions of resources globally. 

Database Security: A Major Gap CyberArk Hasn’t Covered

Databases are prime targets for attackers—every breach headline seems to confirm that. And yet, in this partnership announcement, there’s no mention of database access management. At StrongDM, we understand that securing databases is non-negotiable, which is why we prioritize database access as part of our Zero Trust PAM solution.

In contrast, CyberArk seems to have overlooked this critical security element, proving that the partnership is just an attempt to put on a good show for the market rather than solving real customer needs.

The Bigger Picture: Why CyberArk is Losing Market Share

For years, CyberArk has struggled to retain customers. It’s no secret—they’re losing market share because of their outdated, complex platform and lack of innovation. The company’s move to partner with Wiz feels less like a meaningful solution and more like an attempt to distract customers from their shortcomings. A new partnership might grab headlines, but it doesn’t change the reality that CyberArk’s platform hasn’t kept up with the demands of modern cloud environments.

StrongDM, however, was built from the ground up to be flexible, adaptable, and, most importantly, relevant in today’s cloud-driven landscape. We don’t believe in half-hearted attempts at innovation or partnerships that simply generate hype without delivering value.

The Bottom Line

Don’t be fooled by the packaging of this release. When it comes to actually securing cloud-native environments, CyberArk has no concrete plans to improve the security health of its users. At StrongDM, we’re already delivering comprehensive, developer-friendly PAM solutions for cloud environments, Kubernetes, databases, and more—no patchwork, no forced compatibility issues, and no waiting required.

If you’re tired of PAM solutions that come with more hype than substance, give us a call. We’re here to provide the security you need right now, not in two or three years. And, we promise to protect all the doors and windows, not just the front gate.


About the Author

, Chief Executive Officer (CEO), before joining StrongDM, Tim founded Evident.io—the first real-time API-based cloud security platform. In 2018, Palo Alto Networks (PANW) acquired Evident.io, and Tim joined the executive team at PANW. As the first Chief Cloud Officer, Tim helped outline GTM and product strategy with the C-suite for the cloud business. Tim also served as the principal architect for Adobe's Cloud Team, designing and scaling elastic AWS infrastructure to spark digital transformation across the industry. Tim’s love for innovation drives his interest as an investor in true market disrupters. He enjoys mentoring startup founders and serving as an advisor.

StrongDM logo
💙 this post?
Then get all that StrongDM goodness, right in your inbox.

You May Also Like

StrongDM FAQs: Answering the Most Common Questions
StrongDM FAQs: Answering Your Most Common Questions
Managing secure access to infrastructure shouldn’t be a headache—but for most organizations, it is. That’s where StrongDM comes in. We replace clunky, outdated access solutions with a frictionless, Zero Trust approach that actually makes life easier for IT, DevOps, and security teams. In this FAQ blog post, we’re cutting through the noise to answer the most common questions about StrongDM—what it is, how it works, and why it’s the go-to platform for secure, scalable access.
How to Delete a Postgres User (dropuser & DROP USER)
How to Delete a Postgres User (dropuser & DROP USER)
When working with or administering a database, you'll need to delete, remove, or drop users at some point. This might seem like a routine task, but dropping unnecessary or old users is crucial for maintaining database security. This helps remove access points for malicious actors — both in-house and external — so only authorized individuals can perform operations on it.
The State of Zero Trust Security in the Cloud Report by StrongDM
As enterprises increasingly migrate workloads to the cloud, security strategies must adapt to meet evolving threats. Zero Trust, emphasizing identity verification and least privilege access, has become a critical framework for securing cloud environments. StrongDM’s recent survey of 600 cybersecurity professionals sheds light on the progress and challenges organizations face in adopting Zero Trust for the cloud.
15 Cybersecurity Regulations for Financial Services
15 Cybersecurity Regulations for Financial Services in 2025
In this guide, we’ll cover the 15 most important cybersecurity regulations for financial services providers. We’ll show exactly which ones—from GDPR and PCI DSS to MAS TRM, CBEST, and others—apply to your organization, and explain, in plain in English, what they are, how they impact your business, and how you can initiate a path for compliance.
HIPAA Multi-Factor Authentication (MFA) Requirements
HIPAA Multi-Factor Authentication (MFA) Requirements in 2025
The HIPAA Multi-Factor Authentication (MFA) requirement is a security measure that requires users to verify their identity using at least two different factors—such as something they know (a password), something they have (a smartphone or token), or something they are (a fingerprint)—to access systems containing electronic Protected Health Information (ePHI). This additional layer of security is designed to protect sensitive healthcare data from unauthorized access, even if one credential is compromised, and helps organizations comply with the HIPAA Security Rule.