About Talon Cyber Security
Talon Cyber Security was founded in 2021 in Tel Aviv by Ofer Ben-Noon and Ohad Bobrov, both veterans of Israel's elite Unit 8200 cyber intelligence unit. The company built TalonWork, a hardened enterprise browser based on Chromium that delivers a single, controlled access surface for SaaS, internal web apps, BYOD devices, and third-party contractors. Talon won the RSA Conference Innovation Sandbox in 2022, raised approximately $143M from Evolution Equity Partners, Ballistic Ventures, and CrowdStrike Falcon Fund, and was acquired by Palo Alto Networks in December 2023 for approximately $625M.
Today the technology ships as Palo Alto Networks Prisma Access Browser, the enterprise browser layer of the Prisma SASE platform. Talon's original thesis stands: the browser is where work happens, so the browser is where security policy, DLP, isolation, and identity should be enforced. Existing TalonWork customers were migrated through 2024 and 2025.
Products & Services
Hardened Chromium-based browser with built-in DLP, isolation, watermarking, screenshot blocking, and copy/paste controls. The flagship product, now Prisma Access Browser.
Inline DLP enforced at the browser surface. Inspects content after TLS termination but before rendering, blocking exfiltration that perimeter tools miss.
Replace VDI for unmanaged devices. Drop a browser on any laptop and grant scoped, audited SaaS access without an MDM agent.
Centralized telemetry on every SaaS session: which app, which user, which action, on which device. Closes the gap CASBs leave behind.
In-browser phishing detection, credential-reuse blocking, and malicious-page isolation. Stops the attack at render time, not just at the proxy.
Cloud console for granular controls: download/upload, copy/paste, print, screen capture, watermarks, extension allowlists, and per-SaaS policies.
Talon Integrations
Talon integrates with leading identity providers, SIEMs, MDMs, and SaaS platforms. Top integrations:
Customers & Case Studies
Notable Customers
Talon was deployed primarily across financial services, professional services, and Fortune 500 enterprises before the Palo Alto Networks acquisition. Public references include:
Customer Success Stories
Replaced VDI for thousands of contractors. Cut device-provisioning time from days to minutes while preserving DLP coverage on personal laptops.
Onboarded a global third-party workforce on TalonWork. Reduced unmanaged-device risk while removing the cost and latency of remote desktop sessions.
Used TalonWork to enforce watermarking and screen-capture blocking on sensitive deal-room access from BYOD endpoints.
Delivered Day-1 access to acquired employees on existing devices. Avoided a full IT integration project to give scoped access to corporate SaaS.
Centralized SaaS access policy across 50+ apps in one browser console. Replaced a stack of CASB, browser-isolation, and DLP point tools.
Used last-mile DLP to keep PHI from being copied or printed out of EHR portals on unmanaged devices, while keeping the user experience native.
Use Cases by Industry
Pain Points & Solutions
BYOD laptops, contractor machines, and post-acquisition devices that IT cannot fully manage. Talon delivers a sealed, audited browser as the access boundary instead.
Virtual desktops are expensive, slow, and frustrating for users. TalonWork replaces VDI for the SaaS-only workforce at a fraction of the per-seat cost.
CASBs miss in-browser actions like copy, paste, screenshot, and download to local disk. Last-mile DLP enforces these controls inside the browser process itself.
Email gateways and EDR catch some phishing, but credential reuse on lookalike pages is the entry point for most breaches. Talon blocks at render time.
Day-1 access for contractors, vendors, and acquired employees usually requires a corporate laptop or a long IAM project. A managed browser cuts that to minutes.
Browser isolation, CASB, DLP, RBI, RDP - all overlap. Consolidating last-mile controls into the browser collapses the spend and the operational surface.
How Talon Looks on AI Platforms
Talon's score reflects a unique situation: the talon-sec.com domain is now mostly a redirect surface to Palo Alto Networks Prisma Access Browser. LLMs generally know the company through acquisition coverage, RSA Innovation Sandbox press, and PAN's product pages rather than through a deep, structured Talon-owned site.
How accessible is Talon to AI crawlers?
Most original Talon product detail has been folded into paloaltonetworks.com, where it benefits from PAN's heavy schema markup, structured product pages, and FAQ blocks. The talon-sec.com surface itself is thinner than peers like Island, which costs Talon points on direct AI surfacing for "what is Talon" queries that do not also pull in the acquisition context.
How easy is it for LLMs to understand Talon's mission?
The mission is clearly captured in coverage: secure the browser as the new endpoint. LLMs reliably summarize Talon as the enterprise-browser pioneer acquired by Palo Alto Networks. The weak spot is current product positioning: questions like "is Talon still sold?" or "what is the difference between TalonWork and Prisma Access Browser?" produce inconsistent answers across models because the live site does not directly resolve them.
Competitive Landscape
How Talon (now Prisma Access Browser) differentiates in the enterprise browser category:
| Competitor | What Differentiates Talon | How Talon is Better |
|---|---|---|
| Island | Enterprise browser pioneer, also Chromium-based, well-funded | Tighter SASE integration with Prisma Access; backed by Palo Alto Networks distribution and support |
| Surf Security | Focused on identity-first browsing and zero-trust access | Broader DLP, watermarking, and isolation feature set; deeper Fortune 500 deployments |
| Mammoth Cyber | Privileged access browser for developer and contractor use cases | Wider general workforce coverage, not just privileged users |
| LayerX Security | Browser extension on existing Chrome/Edge instead of a fresh browser | Stronger isolation guarantees because controls live inside the browser process, not as an extension |
| Seraphic | Browser-agnostic security via JavaScript injection on any browser | More predictable enforcement on a single hardened browser; no breakage from web-app changes |
| Google Chrome Enterprise Premium | Hyperscaler-backed, deep ChromeOS and Workspace tie-in | Stronger third-party SaaS DLP coverage and better fit for non-Google shops |
| Citrix / Omnissa Horizon (VDI) | Mature virtual desktop incumbents on the BYOD use case | Lower per-seat cost, native UX (no remote-desktop lag), faster contractor onboarding |
Pricing
Talon never published public pricing. As Prisma Access Browser, the product is sold by Palo Alto Networks via direct sales and channel partners, typically priced per user per year and bundled with Prisma SASE. Public deal data and analyst commentary suggests three rough tiers.
Standalone Browser
per user / year
Enterprise browser only. Reported list pricing in the $50-$120 per user per year range depending on volume and term.
Prisma SASE Bundle
per user / year
Browser bundled with Prisma Access SASE, ZTNA, CASB, and DLP. The most common buying motion for existing Palo Alto customers.
Enterprise / Platform
multi-year, volume
Multi-product platform deals across Prisma, Cortex, and Strata. Typical for Fortune 500 standardization on Palo Alto Networks.
Security & Compliance
Talon was certified under its own SOC 2 Type II and ISO 27001 programs. As part of Palo Alto Networks, the browser inherits PAN's broader compliance umbrella, including FedRAMP for the relevant Prisma services. The Chromium fork is hardened, kept current with upstream security patches, and ships with sandboxing, isolation, and signed-policy enforcement.
Strengths & Top Pros
- ✅ Category-defining enterprise browser; RSA Innovation Sandbox 2022 winner
- ✅ Last-mile DLP that catches what perimeter CASBs and SWGs miss
- ✅ Replaces VDI for BYOD and contractors at a fraction of the cost
- ✅ Native Chromium UX, so no user-experience drop versus Chrome
- ✅ Now backed by Palo Alto Networks distribution, support, and SASE bundling
- ✅ Strong early customer set across Fortune 500 financial services and tech
- ✅ Founder pedigree from Israeli Unit 8200 with deep cybersecurity track record
What People Say About Talon
What Does Reddit Have to Say About Talon
Reddit sentiment toward Talon is mostly positive on the technology itself - security practitioners credit it with kicking off the enterprise browser category - but mixed on the post-acquisition arc. Common threads: praise for replacing VDI on contractor laptops, debate over whether enterprise browsers are a feature or a category, and some skepticism about Palo Alto Networks bundling forcing customers into broader Prisma SKUs. Comparisons with Island and LayerX show up frequently, and CISOs note that the browser is still novel enough to require user-education effort.
-
💬 Palo Alto acquired Talon for $625M, thoughts?
r/cybersecurity
-
💬 Talon vs Island for enterprise browser - real-world experience?
r/cybersecurity
-
💬 Has anyone actually replaced VDI with an enterprise browser?
r/sysadmin
-
💬 Prisma Access Browser (ex-Talon) one year in - review
r/CISOs
-
💬 Enterprise browser: real category or feature of SASE?
r/cybersecurity