Security Experts:

Connect with us

Hi, what are you looking for?


Cloud Security

Eureka Emerges From Stealth With Cloud Data Security Platform

Israel-based startup Eureka on Wednesday announced emerging from stealth mode with a cloud data security posture management platform and $8 million in seed funding.

Israel-based startup Eureka on Wednesday announced emerging from stealth mode with a cloud data security posture management platform and $8 million in seed funding.

Founded by Liat Hayun (CEO) and Asaf Weiss (CTO), Eureka aims to address the data security challenges faced by organizations that are migrating to the cloud.

Cloud data security company EurekaThe company’s platform — advertised as easy to deploy and use — is designed to secure all data in enterprise cloud data stores.

The solution provides real time and comprehensive visibility into existing data stores, it enables organizations to define and manage data security policies, and alerts them of any policy violations.

Eureka’s platform works with all public cloud providers. The solution is “non-intrusive and read only” to ensure the integrity of customer environments, the company said.

The seed funding round was led by YL Ventures, with participation from several cybersecurity executives and serial entrepreneurs, including Microsoft’s Edna Conway, Google Cloud’s David Hannigan, and Andy Ellis, former CSO of Akamai.

“We can’t avoid multi-cloud environments no matter how chaotic they are for our data security,” said Hannigan, who is director of product security assurance at Google Cloud. “Eureka is both enabling companies to securely place and leverage their data in the cloud environments of their choice and dramatically easing its management by engineers, security and compliance teams. The fact that they’re accomplishing this in a single platform is game-changing,”

Related: Enterprise Data Privacy Startup Piiano Emerges From Stealth Mode

Related: SaaS Security Company Grip Security Emerges From Stealth

Related: Valence Emerges From Stealth to Address Business App Connectivity Risks

Related: Emerges From Stealth With Authorization Policy Management Platform

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.


Twenty-one cybersecurity-related M&A deals were announced in December 2022.

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.


More than 450 cybersecurity-related mergers and acquisitions were announced in 2022, according to an analysis conducted by SecurityWeek