Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Funding/M&A

TPG Capital Acquires Majority Stake in PAM Solutions Provider Centrify

Private equity firm TPG Capital on Thursday announced that it has agreed to acquire a majority stake in privileged access management (PAM) solutions provider Centrify.

Founded in 2004, Santa Clara, Calif.-based Centrify provides a platform designed to enforce least privilege access at scale, across enterprise networks.

Private equity firm TPG Capital on Thursday announced that it has agreed to acquire a majority stake in privileged access management (PAM) solutions provider Centrify.

Founded in 2004, Santa Clara, Calif.-based Centrify provides a platform designed to enforce least privilege access at scale, across enterprise networks.

TPG will acquire the stake from Thoma Bravo, the private equity investment firm that bought a majority interest in Centrify in 2018. Terms of the agreement were not disclosed.

In connection to the transaction, Art Gilliland will become Centrify’s CEO, replacing Flint Brenton.

Centrify’s PAM solutions leverage Zero Trust principles to allow users to access the applications they need without sharing accounts. The platform helps organizations automate and integrate privileged access controls, reduce risks, and ensure compliance.

The PAM solutions provider serves thousands of customers from the banking, defense, energy, healthcare, manufacturing, and retail sectors.

TPG has been involved in the evolving cybersecurity space for years, with investments in organizations such as Digital.ai, Expanse, McAfee, MX Technologies, Planview, Tanium, and Zscaler.

“Every organization today is investing in its own digital armor, and its ability to secure privileged access to critical systems and infrastructure is essential to that defense. Many of the largest and most security-conscious organizations in the world trust Centrify’s industry-leading PAM technology to guard their most important accounts,” Gilliland said.

Advertisement. Scroll to continue reading.

Related: CrowdStrike Pushes Zero Trust With $96 Million Acquisition of Preempt Security

Related: Offensive Security Acquires Cybersecurity Training Project VulnHub

Related: Accenture Acquires Critical Infrastructure Protection Firm Revolutionary Security

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.