Workflow
Machine Identity
icon
Search documents
CYBR Rides the Machine Identity Wave: Can Pricing Models Keep Pace?
ZACKS· 2025-07-02 14:50
Core Insights - CyberArk (CYBR) is experiencing significant growth in its machine identity business, with machine identities now outnumbering human identities by over 80 to 1, up from 45 to 1 a year ago, indicating a shift towards automated systems and AI [1][9] Group 1: Business Growth and Strategy - The company is facing challenges in scaling its pricing model as traditional per-identity pricing is not viable for millions of machine identities [2] - CyberArk is focusing on bundled platform deals, which are gaining traction, as machine identity products were included in nine of the top ten deals in the first quarter [2][9] - A policy shift to shorten certificate lifespans from 398 days to 47 days is expected to increase certificate turnover, driving demand for security management automation, which CyberArk is positioned to capitalize on [3][9] Group 2: Pricing and Market Potential - The ability to offer scalable and flexible pricing will be critical for CyberArk, with management indicating that while per-unit pricing may decrease, total deal sizes could grow two to three times larger than typical privileged access management deals [4] - The company’s future in machine identity appears strong if it can effectively scale its pricing model [4] Group 3: Competitive Landscape - Competitors like CrowdStrike and Okta are also evolving their platforms to meet enterprise security demands, with CrowdStrike enhancing its identity security platform using AI solutions [5] - Okta focuses on identity and access management, leveraging AI for real-time detection of identity attacks [6] Group 4: Financial Performance and Valuation - CyberArk shares have gained 17.6% year to date, compared to the Zacks Security industry's growth of 25.7% [7] - The company trades at a forward price-to-sales ratio of 13.4, which is below the industry average of 15.11 [11] - The Zacks Consensus Estimate for CyberArk's earnings in 2025 and 2026 implies year-over-year increases of 26.4% and 25.1%, respectively, although estimates have been revised downward recently [14]
Agents, Access, and the Future of Machine Identity — Nick Nisi (WorkOS) + Lizzie Siegle (Cloudflare)
AI Engineer· 2025-06-30 22:52
Agent & MCP Server Development - Cloudflare and Work OS are collaborating to promote the idea that agents acting on behalf of users need the same credentials and authorization as user-facing projects [1] - The industry is moving towards more fine-grained authorization for AI agents, potentially authorizing per-line changes, per-tool changes, or even network connections [20] - Cloudflare offers a free tier for Durable Objects, which can be used for persistent storage in agents [3] Cloudflare's Offerings - Cloudflare provides compute cloud workers, AI model hosting, vectorized inference, vector database, SQL database, durable objects, video streaming, and image optimization [2] - Cloudflare workers have bindings that allow interaction with other Cloudflare products and other companies' products [3] - Cloudflare's agents framework includes an OAuth framework for setting up authorization, enabling easy identification of the worker or agent acting on behalf of a user [5] MCP Server Demo & Use Case - A basic MCP server was built using Cloudflare and Work OS, which is available for users to check out and run [6] - The demo showcases ordering a shirt via an agent, demonstrating how agents can act on behalf of users with proper authorization [9][10][11] - The demo uses Cloudflare's key-value storage to save order data, accessible through the interface [12] - Durable Objects can store data directly on the context associated with a worker object, unique for each user [14][16] Security & Authorization - The industry emphasizes the importance of audit trails with OAuth tools to track agent interactions, including reasons for interaction, the user on whose behalf it acted, and the outcome [21] - The industry needs to consider users as deputies who have access to tools and can potentially misuse them [21]