Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Eureka Emerges From Stealth With Cloud Data Security Platform

Israel-based startup Eureka on Wednesday announced emerging from stealth mode with a cloud data security posture management platform and $8 million in seed funding.

Israel-based startup Eureka on Wednesday announced emerging from stealth mode with a cloud data security posture management platform and $8 million in seed funding.

Founded by Liat Hayun (CEO) and Asaf Weiss (CTO), Eureka aims to address the data security challenges faced by organizations that are migrating to the cloud.

Cloud data security company EurekaThe company’s platform — advertised as easy to deploy and use — is designed to secure all data in enterprise cloud data stores.

The solution provides real time and comprehensive visibility into existing data stores, it enables organizations to define and manage data security policies, and alerts them of any policy violations.

Eureka’s platform works with all public cloud providers. The solution is “non-intrusive and read only” to ensure the integrity of customer environments, the company said.

The seed funding round was led by YL Ventures, with participation from several cybersecurity executives and serial entrepreneurs, including Microsoft’s Edna Conway, Google Cloud’s David Hannigan, and Andy Ellis, former CSO of Akamai.

“We can’t avoid multi-cloud environments no matter how chaotic they are for our data security,” said Hannigan, who is director of product security assurance at Google Cloud. “Eureka is both enabling companies to securely place and leverage their data in the cloud environments of their choice and dramatically easing its management by engineers, security and compliance teams. The fact that they’re accomplishing this in a single platform is game-changing,”

Related: Enterprise Data Privacy Startup Piiano Emerges From Stealth Mode

Related: SaaS Security Company Grip Security Emerges From Stealth

Advertisement. Scroll to continue reading.

Related: Valence Emerges From Stealth to Address Business App Connectivity Risks

Related: build.security Emerges From Stealth With Authorization Policy Management Platform

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.