Friday, February 14, 2025
Homecyber securityTenable Acquires Eureka Security To Provide Data Security Across Infrastructure

Tenable Acquires Eureka Security To Provide Data Security Across Infrastructure

Published on

SIEM as a Service

Follow Us on Google News

Tenable® Holdings, Inc., a leading Exposure Management company, has announced a definitive agreement to acquire Eureka Security, Inc., a prominent provider of data security posture management (DSPM) for cloud environments.

This strategic acquisition aims to bolster Tenable’s cloud security capabilities, providing comprehensive data security across cloud infrastructures.

Tenable’s acquisition of Eureka Security is set to close this month, marking a significant step in enhancing its cloud-native application protection platform (CNAPP).

Eureka Security’s DSPM technology offers security teams a holistic view of an organization’s cloud data security footprint, addressing policy drift and misconfigurations that pose risks to data.

By integrating these capabilities, Tenable aims to help customers identify critical evidence of cloud data risks, including the location of sensitive data, access permissions, and the severity of potential data compromises.

In the 2024 Tenable Cloud Security Outlook study, 95% of organizations reported experiencing cloud-related breaches in the past 18 months, with 92% of those breaches involving the exposure of sensitive data.

Analyze any MaliciousURL, Files & Emails & Configuration With ANY RUN Start your Analysis

This acquisition underscores Tenable’s commitment to providing robust cloud security solutions that can mitigate such risks and improve overall security posture over time.

Enhancing Visibility and Control

Shai Morag, Senior Vice President and General Manager of Cloud Security at Tenable, emphasized the importance of this acquisition in advancing cloud security innovation.

“Eureka Security’s technology will enable Tenable to provide even better prioritization of cloud risks and identify toxic combinations beyond vulnerabilities, misconfigurations, and over-privileged access to include data at risk as well,” Morag stated.

This integration will offer security teams the context and prioritization guidance to make efficient and accurate remediation decisions.

Liat Hayun, Co-founder and CEO of Eureka Security, expressed enthusiasm about joining forces with Tenable.

“Eureka Security’s data-centric approach provides the visibility, control, and automation needed to navigate the dynamic cloud landscape while ensuring the highest level of security and compliance,” Hayun said.

“Integrating our capabilities into Tenable’s CNAPP offering creates a compelling capability for customers.

Tenable also brings an expansive customer base and solid go-to-market capabilities.

We couldn’t have found a better match to help us expand our global mission to reduce cloud data risk.”

Comprehensive Cloud Security Solution

Integrating Eureka Security’s DSPM capabilities will complement Tenable’s existing cloud security solutions, including unified CNAPP, cloud security posture management (CSPM), cloud workload protection, and cloud infrastructure entitlement management (CIEM).

This comprehensive suite of tools will provide security teams with the necessary context and prioritization to address cloud security challenges effectively.

Tenable’s acquisition of Eureka Security is not expected to have a material impact on revenue this year.

However, the long-term benefits of enhanced cloud security capabilities are anticipated to strengthen Tenable’s market position and provide significant value to its customers.

About Tenable

Tenable® is a leading Exposure Management company trusted by approximately 44,000 organizations worldwide to understand and reduce cyber risk.

As the creator of Nessus®, Tenable has extended its expertise in vulnerabilities to deliver the world’s first platform capable of securing any digital asset on any computing platform.

Tenable’s customers include approximately 65% of the Fortune 500, 50% of the Global 2000, and numerous large government agencies.

This press release contains forward-looking statements about Tenable’s acquisition of Eureka Security, Inc.

These statements involve substantial risks, uncertainties, and assumptions that could cause results to differ materially from those expressed or implied.

Forward-looking statements are based on Tenable’s current plans, objectives, estimates, expectations, and intentions and inherently involve significant risks and uncertainties, many of which are beyond Tenable’s control.

This acquisition represents a pivotal moment for Tenable as it continues to push the envelope in cloud security innovation, providing customers with best-in-class capabilities to effectively manage and mitigate cloud data risks.

Looking for Full Data Breach Protection? Try Cynet's All-in-One Cybersecurity Platform for MSPs: Try Free Demo 

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

New Microsoft Windows GUI 0-Day Vulnerability Actively Exploited in the Wild

A newly discovered vulnerability in Microsoft Windows, identified by ClearSky Cyber Security, is reportedly...

Burp Suite Professional / Community 2025.2 Released With New Built-in AI Integration

PortSwigger has announced the release of Burp Suite Professional and Community Edition 2025.2, introducing...

Arbitrary File Upload Vulnerability in WordPress Plugin Let Attackers Hack 30,000 Website

A subgroup of the Russian state-sponsored hacking group Seashell Blizzard, also known as Sandworm,...

BadPilot Attacking Network Devices to Expand Russian Seashell Blizzard’s Attacks

A newly uncovered cyber campaign, dubbed "BadPilot," has been linked to a subgroup of...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Microsoft Windows GUI 0-Day Vulnerability Actively Exploited in the Wild

A newly discovered vulnerability in Microsoft Windows, identified by ClearSky Cyber Security, is reportedly...

Burp Suite Professional / Community 2025.2 Released With New Built-in AI Integration

PortSwigger has announced the release of Burp Suite Professional and Community Edition 2025.2, introducing...

Arbitrary File Upload Vulnerability in WordPress Plugin Let Attackers Hack 30,000 Website

A subgroup of the Russian state-sponsored hacking group Seashell Blizzard, also known as Sandworm,...