Salesforce Reports Customer Data Accessed Following Breach at Partner Firm Gainsight

Salesforce confirms some customer data was accessed due to a security breach at its third-party software partner, Gainsight.

Executive Summary

  • Salesforce has announced that some of its customer data was accessed following a security breach at a partner company, Gainsight.
  • The breach originated within Gainsight’s systems, not on Salesforce’s core platform, affecting data connected via software integration.
  • The incident highlights the cybersecurity risks inherent in third-party vendor relationships within the tech supply chain.
  • Salesforce is currently notifying all customers who have been impacted by the data exposure and is conducting an investigation with Gainsight.

Salesforce has confirmed that data belonging to some of its customers was improperly accessed following a security breach at Gainsight, a third-party software partner. The company is in the process of notifying affected customers about the incident, which originated outside of Salesforce’s own systems.

Third-Party Vendor Breach

Gainsight provides customer success management software that integrates directly with Salesforce’s customer relationship management (CRM) platform. The security vulnerability was discovered within Gainsight’s systems, allowing an unauthorized third party to gain access to data that was connected via the integration. The type and volume of data accessed have not yet been publicly detailed.

In a statement, Salesforce emphasized that the breach did not compromise its core network infrastructure. “The security of our customers’ data is our top priority,” a spokesperson noted. “We are actively working with Gainsight to investigate the full scope of this incident and support our affected customers.”

Supply Chain Security Concerns

The incident underscores the growing cybersecurity risks associated with third-party vendors and integrated software ecosystems. Both Salesforce and Gainsight are continuing their investigations to determine the extent of the data access and to implement further security measures to prevent future occurrences.

Add a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Secret Link