Salesforce to buy Informatica for $8 billion to bolster AI data tools
Salesforce said on Tuesday it would buy Informatica for about $8 billion, betting on the data management platform to sharpen its competitive edge in the booming artificial intelligence market.
The cloud-software giant is returning to big-ticket M&A after years on the sidelines, driven by scrutiny from activist investors pressing for better profitability. Last year it shelved deal talks with Informatica after the companies failed to agree on deal terms.
The negotiations picked up steam again in early April, when a handful of potential buyers, including private equity firms and other companies, approached Informatica around the same time, according to a person familiar with the sale process.
Thoma Bravo and Cloud Software Group were part of the five interested buyers of the asset, that person and another person familiar with the process said. Thoma Bravo declined to comment, while Cloud Software Group was not immediately available to comment. Buying Informatica, in its biggest deal since its nearly $28 billion acquisition of Slack Technologies in 2021, would help Salesforce expand its data management tools as it doubles down on AI-powered products. The deal would also allow Salesforce to tighten control over how business data is managed and used, an essential step as it races to embed generative AI deeper into its products.
"Salesforce and Informatica will create the most complete, agent-ready data platform in the industry," said Salesforce CEO Marc Benioff, adding the deal will strengthen its position in the $150 billion-plus data enterprise market. The company has been offering AI agents - programs that can handle routine work without human supervision - to businesses for recruiting and customer service. It has closed more than 1,000 paid deals for "Agentforce," its platform for creating AI-powered virtual representatives.
Salesforce is paying $25 for each share of Informatica, a premium of about 30% to Informatica's closing price on May 22, the day before news of renewed talks emerged.
Informatica shares were up 5.8% in afternoon trading at $23.86, while Salesforce was up 1.78%.
Salesforce expects to close the deal in early next fiscal year starting February through a mix of cash and new debt. The deal is expected to boost its operating margin from the second year after closing.
Scotiabank analysts said the move could help Salesforce catch-up with software rivals as "data management software is now most often sold as part of mega-vendor tool kits". The business software company has been a prolific dealmaker, buying data analytics firm Tableau Software in 2019 for $15.7 billion in stock, and Slack in 2021 in its biggest deal.
Those deals drew scrutiny in 2023 when activist investors, including ValueAct Capital and Elliott Management, pressed for changes to improve profitability.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Time of India
11 hours ago
- Time of India
Hackers abuse modified Salesforce app to steal data, extort companies, Google says
By AJ Vicens Hackers are tricking employees at companies in Europe and the Americas into installing a modified version of a Salesforce-related app, allowing the hackers to steal reams of data, gain access to other corporate cloud services and extort those companies, Google said on Wednesday. The hackers - tracked by the Google Threat Intelligence Group as UNC6040 - have "proven particularly effective at tricking employees" into installing a modified version of Salesforce 's Data Loader, a proprietary tool used to bulk import data into Salesforce environments, the researchers said. The hackers use voice calls to trick employees into visiting a purported Salesforce connected app setup page to approve the unauthorized, modified version of the app, created by the hackers to emulate Data Loader. If the employee installs the app, the hackers gain "significant capabilities to access, query, and exfiltrate sensitive information directly from the compromised Salesforce customer environments," the researchers said. The access also frequently gives the hackers the ability to move throughout a customer's network, enabling attacks on other cloud services and internal corporate networks. Technical infrastructure tied to the campaign shares characteristics with suspected ties to the broader and loosely organized ecosystem known as "The Com," known for small, disparate groups engaging in cybercriminal and sometimes violent activity, the researchers said. A Google spokesperson did not share additional details about how many companies have been targeted as part of the campaign, which has been observed over the past several months. A Salesforce spokesperson told Reuters in an email that "there's no indication the issue described stems from any vulnerability inherent in our platform." The spokesperson said the voice calls used to trick employees "are targeted social engineering scams designed to exploit gaps in individual users' cybersecurity awareness and best practices." The spokesperson declined to share the specific number of affected customers, but said that Salesforce was "aware of only a small subset of affected customers," and said it was "not a widespread issue." Salesforce warned customers of voice phishing , or "vishing," attacks and of hackers abusing malicious, modified versions of Data Loader in a March 2025 blog post.

The Hindu
13 hours ago
- The Hindu
Hackers abuse modified Salesforce app to steal data, extort companies, Google says
Hackers are tricking employees at companies in Europe and the Americas into installing a modified version of a Salesforce-related app, allowing the hackers to steal reams of data, gain access to other corporate cloud services and extort those companies, Google said on Wednesday. The hackers, tracked by the Google Threat Intelligence Group as UNC6040, have 'proven particularly effective at tricking employees' into installing a modified version of Salesforce's Data Loader, a proprietary tool used to bulk import data into Salesforce environments, the researchers said. The hackers use voice calls to trick employees into visiting a purported Salesforce connected app setup page to approve the unauthorised, modified version of the app, created by the hackers to emulate Data Loader. If the employee installs the app, the hackers gain 'significant capabilities to access, query, and exfiltrate sensitive information directly from the compromised Salesforce customer environments,' the researchers said. The access also frequently gives the hackers the ability to move throughout a customer's network, enabling attacks on other cloud services and internal corporate networks. Technical infrastructure tied to the campaign shares characteristics with suspected ties to the broader and loosely organized ecosystem known as 'The Com,' known for small, disparate groups engaging in cybercriminal and sometimes violent activity, the researchers said. A Google spokesperson told Reuters that roughly 20 organizations have been affected by the UNC6040 campaign, which has been observed over the past several months. A subset of those organisations had data successfully exfiltrated, the spokesperson said. A Salesforce spokesperson told Reuters in an email that 'there's no indication the issue described stems from any vulnerability inherent in our platform.' The spokesperson said the voice calls used to trick employees 'are targeted social engineering scams designed to exploit gaps in individual users' cybersecurity awareness and best practices.' The spokesperson declined to share the specific number of affected customers, but said that Salesforce was "aware of only a small subset of affected customers," and said it was "not a widespread issue." Salesforce warned customers of voice phishing, or "vishing," attacks and of hackers abusing malicious, modified versions of Data Loader in a March 2025 blog post.


Time of India
a day ago
- Time of India
Google says hackers are using fake Salesforce app to attack businesses
Hackers are targeting employees at companies across Europe and the Americas using a sophisticated social engineering campaign involving a modified Salesforce app, 's cybersecurity arm has said. Tired of too many ads? go ad free now According to Google's Threat Intelligence Group (GTIG), the attackers—identified as UNC6040—have been 'particularly effective' in deceiving corporate users into installing a fake version of Salesforce Data Loader , a legitimate tool used for importing large datasets into Salesforce environments. How hackers are targeting large companies The team at Google explains that the hackers impersonate official Salesforce representatives and are calling employees to direct them to a fake app setup page. There, users are tricked into authorising a malicious version of the Data Loader app that mimics the original software. Once installed, the app grants attackers significant access to sensitive corporate data. Google researchers noted that the hackers can exfiltrate confidential information, query internal systems, and in many cases, pivot to attack other cloud services and internal networks. As per the researchers, technical indicators suggest that the campaign has ties to 'The Com', a loosely organised cybercriminal ecosystem known for orchestrating both online fraud and real-world violence. What Google and Salesforce have to say A Google spokesperson told news agency Reuters that at least 20 organisations have been affected by the UNC6040 operation over the past several months, with some suffering successful data breaches and extortion attempts. Meanwhile, Salesforce, stated that the issue does not stem from any vulnerability in its platform. A company spokesperson emphasised that the attacks rely on voice phishing (vishing) tactics and exploit gaps in employee cybersecurity awareness. Tired of too many ads? go ad free now 'There's no indication the issue described stems from any vulnerability inherent in our platform,' the spokesperson said, adding that the number of affected customers is small and the threat is not considered widespread. Salesforce had previously issued a warning in March 2025, cautioning users about vishing attacks and the risks posed by malicious versions of Data Loader. Stay ready with these 7 essential medical gadgets as COVID cases rise