Tala Security company logo

The profile is currenly unclaimed by the seller. All information is provided by CB Insights.


Founded Year



Debt - II | Alive

Total Raised


Last Raised

$1.52M | 2 yrs ago

About Tala Security

Tala Security protects enterprise apps and end-users against data breaches and fraud. The firm's solution is agentless, automated, requires no changes to the app and has no impact on the end-user experience.

Tala Security Headquarters Location

200 Brown Road Suite 208

Lafayette, California, 9454,

United States


ESPs containing Tala Security

The ESP matrix leverages data and analyst insight to identify and rank leading companies in a given technology landscape.

Healthcare / Cybersecurity

Companies in this market defend mobile and web applications from attacks such as online fraud, distributed denial of service (DDoS) attacks, web scraping, and malicious code injection.

Tala Security named as Highflier among 5 other companies, including Imperva, Netsparker, and Source Defense.

Predict your next investment

The CB Insights tech market intelligence platform analyzes millions of data points on venture capital, startups, patents , partnerships and news mentions to help you see tomorrow's opportunities, today.

Expert Collections containing Tala Security

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Tala Security is included in 1 Expert Collection, including Cybersecurity.



4,937 items

Tala Security Patents

Tala Security has filed 5 patents.

The 3 most popular patent topics include:

  • Computer network security
  • Computer security
  • Computer security exploits
patents chart

Application Date

Grant Date


Related Topics




Computer network security, Computer security, Software testing, Computer security exploits, Web frameworks


Application Date


Grant Date



Related Topics

Computer network security, Computer security, Software testing, Computer security exploits, Web frameworks



Latest Tala Security News

Tala Security Integrates with Fastly’s Compute@Edge Platform to Deliver High-Performance, Automated Implementation of its Data Security and Privacy Platforms

Apr 27, 2021

April 27, 2021 08:00 ET Tala Security MILPITAS, Calif., April 27, 2021 (GLOBE NEWSWIRE) -- Starting today, Tala Security customers can integrate with Fastly to leverage the full capabilities of Tala Protect and Tala Detect products to provide the actionable insights needed to immediately address data leakage and vulnerabilities using Fastly’s Compute@Edge serverless compute offering. This quick, automated installation process delivers all of Tala’s core capabilities, including multiple layers of protection via standards like CSP, SRI, iFrame Sandboxing, Permissions policy and Noncing. Tala Security provides the most comprehensive data security and privacy platform for enterprise web applications. This integration with Fastly gives customers a high-performance, automated way to secure and enable the modern web, with zero footprint on the customer’s server location. With Tala protecting millions of web sessions, the new Fastly integration gives customers additional options for rapid onboarding to protect against advanced client-side attacks. “The biggest benefit to customers with this integration is the zero footprint,” said Sanjay Sawhney, VP of Engineering at Tala, pointing to Fastly’s use of web assembly vs JavaScript frameworks. “This is our most high performing serverless compute environment. Fastly’s low-latency Compute@Edge provides a highly secure and performant platform to enhance forward-thinking security solutions.” The Tala + Fastly integration is currently available. Highlighted benefits include: Automated deployment of all Tala Security controls Zero footprint in the customer’s environment Highly scalable and high performing About Tala Security Tala prevents sensitive data theft and client-side attacks like Magecart, XSS, code injections and session redirects. Our data security and privacy platform protect hundreds of millions of browser sessions every month from critical and growing threats, such as data leakage, cross-site scripting (XSS), Magecart, website supply-chain attacks, clickjacking and others. It does this by automating the deployment and dynamic adjustment of browser-native, standards-based security controls such as Content Security Policy (CSP), Subresource Integrity (SRI), HTTP Strict Transport Security (HSTS) and other web security standards. The activation of browser-native security controls provides comprehensive security without requiring any changes to the application code and with almost no impact to website performance. Tala serves large website operators in verticals such as financial services, online retail, payment processing, hi-tech, fintech and education. Learn more at www.talasecurity.io   Contact

Tala Security Web Traffic

Page Views per User (PVPU)
Page Views per Million (PVPM)
Reach per Million (RPM)
CBI Logo

Tala Security Rank

  • When was Tala Security founded?

    Tala Security was founded in 2016.

  • Where is Tala Security's headquarters?

    Tala Security's headquarters is located at 200 Brown Road, Lafayette.

  • What is Tala Security's latest funding round?

    Tala Security's latest funding round is Debt - II.

  • How much did Tala Security raise?

    Tala Security raised a total of $14.22M.

  • Who are the investors of Tala Security?

    Investors of Tala Security include TechOperators, Jackson Square Ventures, Stonehenge Capital, Steve Bennet, Michael Brown and 5 more.

  • Who are Tala Security's competitors?

    Competitors of Tala Security include Yottaa, Source Defense, Kasada, JScrambler, Arkose Labs and 14 more.

You May Also Like

Kasada Logo

Kasada is a provider of automated threat detection services. Kasada's flagship product Polyform protects websites and web applications from automated, or bot, attacks, from credential stuffing to click fraud, account takeover, and scraping, in turn ensuring digital marketing and web analytics are accurate. The firm serves the construction, hospitality, technology, sports, and real estate industries. It was founded in 2015 and is based in Chippendale, Australia.

Arkose Labs Logo
Arkose Labs

ArkoseLabs provides online fraud prevention technology combining user risk assessment and enforcement challenges.

Imperva Logo

Imperva seeks to improve endpoint and network security by directly protecting high-value applications and data assets in physical and virtual data centers. The firm develops an integrated security platform that provides the visibility and control needed to neutralize attack, theft, and fraud from inside and outside the organization, mitigate risk, and streamline compliance. The firm serves the insurance, technology, hospitality, academic, and healthcare industries. It was founded in 2000 and is based in Redwood City, California.

Namogoo Logo

Namogoo is a Digital Journey Continuity platform that enables online businesses to deliver a distraction-free customer journey by identifying and removing unauthorized product ads injected into consumer web sessions that divert the customer journey and hurt conversion rates.

Source Defense Logo
Source Defense

Source Defense is a real-time SAAS solution that protects online websites from attacks originating from third-party scripts. It uses a real-time sandbox isolation technology to provide a client-side website security solution focused on preventing malicious activity originating from website supply chain vendors. The company was founded in 2014 and is based in Rosh-Ha’ayin, Israel.

Wallarm Logo

Wallarm provides an application security platform which combines active threat verification engine and a NG-WAF. It applies machine learning to traffic to adaptively generate security rules and verifies the impact of malicious payloads in real time.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.