Google has completed the acquisition of cloud security company Wiz, bringing the Israeli-founded cybersecurity firm into its Google Cloud division. The deal, announced March 11, places Wiz technology inside one of the world’s largest cloud infrastructure platforms as Google expands its enterprise security offerings.
The Google Wiz acquisition marks one of the largest cybersecurity deals ever completed and the largest acquisition in Google’s history. The company said Wiz will become part of Google Cloud while continuing to offer its cloud security tools across multiple infrastructure providers.
Wiz develops software designed to scan large cloud environments and identify security risks inside complex infrastructure deployments. Modern cloud systems often span thousands of servers, containers, databases, and access permissions across multiple providers. Wiz software analyzes those environments and maps potential attack paths that could allow attackers to move through systems if misconfigurations or exposed credentials exist.
The platform focuses on identifying issues such as excessive permissions, exposed secrets, misconfigured storage, vulnerable workloads, and identity access problems that could allow unauthorized access to data or infrastructure. The software builds a map of how systems connect to each other so security teams can see how a single weakness might lead to a broader compromise.
Organizations running infrastructure across services such as Amazon Web Services, Microsoft Azure, and Google Cloud use tools like Wiz to analyze relationships between workloads, applications, and user permissions across large cloud environments.
The company was founded in 2020 by Assaf Rappaport, Yinon Costica, Ami Luttwak, and Roy Reznik. All four founders previously served in Unit 8200, a signals intelligence and cyber operations division within the Israel Defense Forces.
Unit 8200 is responsible for signals intelligence collection, digital surveillance, and cyber operations conducted by Israeli military intelligence. The unit focuses on intercepting communications, analyzing digital data, and developing technologies used in intelligence gathering and cyber activity.
Investigations by journalists and human rights organizations have also examined how intelligence systems associated with Unit 8200 have been used during military operations. Reporting has described AI-assisted targeting systems such as “Lavender,” which analyzed large volumes of surveillance and communications data to identify individuals suspected of militant affiliations during the Gaza conflict. Sources cited in investigative reporting said the system generated large lists of potential targets by assigning probability scores based on intelligence data.
Additional systems referenced in reporting include tools designed to analyze buildings, movement patterns, and communications activity in order to identify locations or individuals linked to suspected militant activity. The scale and automation of these systems have drawn criticism from legal experts and human rights organizations, who have raised concerns about the risks to civilians when automated analysis plays a role in military targeting decisions.
Former members of Unit 8200 have also publicly criticized aspects of the unit’s surveillance practices in the past. In a widely cited 2014 open letter, dozens of reservists said intelligence collection in Palestinian territories sometimes included extensive monitoring of civilian communications, which they argued could be used for coercion or political pressure.
Members of the unit frequently move into the private cybersecurity industry after completing military service, and a number of Israeli cybersecurity companies have been founded by former Unit 8200 personnel.
The Google Wiz acquisition has drawn attention in part because of the founders’ backgrounds and the broader pipeline connecting military intelligence programs with the global cybersecurity industry.
Google Cloud executives said the acquisition will integrate Wiz technology into the company’s security products and infrastructure protection tools. Google currently operates one of the world’s largest cloud computing platforms, providing infrastructure services used by governments, businesses, and software companies.
Cloud providers have been expanding security capabilities as organizations move sensitive systems and data into cloud infrastructure. Large enterprises now operate distributed environments spanning multiple cloud providers, internal networks, and software platforms, creating complex security challenges.
Tools designed to analyze cloud architecture, identity permissions, and system relationships have become increasingly common as organizations attempt to manage these large and complicated infrastructure environments.
With the Google Wiz acquisition finalized, Wiz technology and engineering teams will now operate within Google Cloud’s broader security portfolio. The company has said Wiz products will continue to function across multiple cloud platforms while being integrated into Google’s own security services.
The deal reflects the continuing consolidation of the cybersecurity industry as major technology companies acquire security platforms to expand their cloud infrastructure protection capabilities. As competition around artificial intelligence and large-scale cloud infrastructure intensifies, companies are increasingly moving to secure partnerships, talent, and security tools wherever they can find them, even when those connections bring controversy or draw scrutiny from critics and human rights groups. In the escalating race to dominate AI infrastructure, the pressure to gain technological advantage has pushed many companies to work with almost anyone whose technology can strengthen their position in the broader battle over cloud computing, data, and security.
- CPUID Compromise Served Malware Through Official CPU-Z and HWMonitor Downloads
- FBI and CISA Warn Iran-Affiliated Actors Are Targeting PLCs Across U.S. Critical Infrastructure
- North Korea Hackers Tied to Axios npm Package Supply Chain Attack
- Axios Supply Chain Attack Pushes RAT Malware Through npm Install
- FBI Director Hacked by Iranian Hackers in Personal Gmail Leak
Sean Doyle
Sean is a tech author and security researcher with more than 20 years of experience in cybersecurity, privacy, malware analysis, analytics, and online marketing. He focuses on clear reporting, deep technical investigation, and practical guidance that helps readers stay safe in a fast-moving digital landscape. His work continues to appear in respected publications, including articles written for Private Internet Access. Through Botcrawl and his ongoing cybersecurity coverage, Sean provides trusted insights on data breaches, malware threats, and online safety for individuals and businesses worldwide.













