
Shanghai Tenglong Technology
Building enterprise network security barriers from the perspective of "active security".
Date | Investors | Amount | Round |
---|---|---|---|
investor | €0.0 | round | |
investor | €0.0 | round | |
investor | €0.0 Valuation: €0.0 | round | |
* | CNY20.0m | Series A | |
Total Funding | 000k |
USD | 2023 |
---|---|
Revenues | 0000 |
EBITDA | 0000 |
Profit | 0000 |
EV | 0000 |
EV / revenue | 00.0x |
EV / EBITDA | 00.0x |
R&D budget | 0000 |
Source: Dealroom estimates
Related Content
Shanghai Tenglong Technology Co., Ltd., operating as TalentSec, is a cybersecurity firm established in May 2020. The company's core team originates from the Cyberspace Security School of Shanghai Jiao Tong University, with Wang Haotian serving as CEO. Since its founding, TalentSec has recorded four straight years of growth and has successfully secured multiple funding rounds, including a Series A in June 2024 led by Eminence Ventures.
TalentSec focuses on providing proactive information security services to a diverse client base that includes government bodies and large to medium-sized enterprises across sectors like finance, telecommunications, energy, and healthcare. Notable clients include major corporations such as China Telecom Group and Fosun Group. The company's business model is primarily subscription-based, with pricing determined by the volume of assets being secured.
The firm's service portfolio is built around the concept of active security, offering a suite of products designed for continuous and automated security testing. This includes solutions for Breach and Attack Simulation (BAS), Attack Surface Management (ASM), and Cyber Range simulations. TalentSec's product matrix features four main solutions: External Attack Surface Management (EASM), Cyber Asset Attack Surface Management (CAASM), Vulnerability Risk Monitoring, and an Intelligent Traffic Management API. The EASM product allows for the identification and dynamic risk monitoring of all public network assets, while the CAASM product facilitates asset mapping for extensive network environments. These tools provide clients with a real-time, quantifiable assessment of their security posture.
Keywords: cybersecurity, active security, attack surface management, breach and attack simulation, information security services, network security, vulnerability management, cyber range, threat detection, subscription model, enterprise security, government cybersecurity, financial sector security, BAS, ASM, EASM, CAASM, security automation, network asset discovery, risk monitoring