Pula

Pula offer smallholder farmers to navigate climate risks by leveraging machine learning, crop cut experiments, and data points relating to weather patterns and farm losses, enabling farmers to improve their farming practices and bolster their income over time.

Information Technology FinTech Agricultue Service Industry Insurance

$20M

Latest Funding

Series B

Latest Funding Stage

2024-04-15

Funding Date

429

Employees

Kenya

Location

Nairobi, Nairobi Area

City & State

Sales-Ready Summary

Pula Advisors recently raised a $20M Series B and utilizes a tech stack including WordPress, Yoast SEO, and MailChimp, indicating a potential interest in marketing and sales tools to enhance their online presence and customer engagement.

Key Contacts
Unlock Contact Information

Upgrade to access founder details

Upgrade Now
Open Positions
View Careers Page
Hiring For
n/a
Unlock Tech Stack Data

Upgrade to access technology insights

Upgrade Now

Similar Startups

Archipelo
Archipelo  Logo

The Archipelo Developer Security Posture Management Platform provides organizations with—the underlying system of record to capture SDLC event data tied to developer actions. Archipelo empowers security, GRC, and engineering teams to proactively identify, triage, and mitigate risks before they impact your business.

Amnis
Amnis  Logo

Amnis offers services such as currency exchange, international payments, and flexible currency hedging, enabling small and medium-sized companies to strategize and execute their international payments digitally.

Workhelix
Workhelix Logo

Workhelix brings together advanced research and comprehensive data to assess organizations' generative AI opportunities and which tasks can be accelerated with available technology, enabling businesses to navigate the opportunity landscape with data and reports, rather than relying on gut and instinct.

Mimic
Mimic Logo

Mimic Networks is a cybersecurity company that provides an enterprise ransomware defense platform for security teams. The company's platform detects, deflects, and facilitates rapid recovery from ransomware attacks, aiming to serve as the last line of defense to ensure that critical data remains secure against increasingly sophisticatedcyberthreats.