Google Cloud Eyes Wiz Purchase


Pending regulatory approval, Google plans to acquire multi-cloud security platform provider Wiz in an all-cash deal worth $32 billion. Once the transaction closes, Wiz will be incorporated into Google Cloud’s business line.

The two companies “share a joint vision to make cybersecurity more accessible and simpler to use for organizations of any size and industry,” said Thomas Kurian, CEO of Google Cloud, during the announcement.

Wiz’s platform connects to major cloud computing offerings from Amazon, Microsoft, Oracle, and IBM. It also provides a coding environment that helps prevent cybersecurity incidents.

“These are necessary tools for you to provide what might be called an integrated SecOps platform play,” says Philip Bues, Senior Research Manager for Cloud Security at research firm IDC. “Bringing this into Google Cloud Security Command Center Enterprise, which is its cloud-native app, further strengthens the offering to the market.”

The deal also reflects how the cloud-native application environment is consolidating. Before its planned Wiz acquisition, Google Cloud acquired cloud security provider Mandiant for $5.2 billion and cybersecurity vendor Siemplify for $500 million in 2022. Wiz has also made numerous acquisitions since exiting its stealth mode in 2020. In 2024, the Israeli firm purchased security vendors Dazz and Gem Security for a reported $450 million and $350 million, respectively.

According to Bues, the cloud-native applications market is gravitating toward platforms that provide security, integration, and compliance benefits “all in one place.”

“There is an amazing correlation of data and prioritization, which saves a lot of time for the security practitioner from alert fatigue and reduces false positives,” he adds.

Bues notes that having one of the major cloud providers acquire a multi-cloud platform provider might cause some customers to do a double take. However, cloud security platform providers have democratized the market to the point where cloud providers have implemented third-party security products. “I think the two do not necessarily cancel each other out,” he says. “It just strengthens the position when you have an ecosystem involved in providing cybersecurity in the face of an ever-evolving threat landscape.”

arrow-chevron-right-redarrow-chevron-rightbutton-arrow-left-greybutton-arrow-left-red-400button-arrow-left-red-500button-arrow-left-red-600button-arrow-left-whitebutton-arrow-right-greybutton-arrow-right-red-400button-arrow-right-red-500button-arrow-right-red-600button-arrow-right-whitecaret-downcaret-rightclosecloseemailfacebook-square-holdfacebookhamburger-newhamburgerinstagramlinkedin-square-1linkedinpauseplaysearch-outlinesearchsubscribe-digitalsubscribe-printtwitter-square-holdtwitteryoutube