top of page
Image by Gursimrat Ganda
KELA-Logo_black-and-red.png
CDM-INFOSEC-WINNERS-2020-LARGE.png

COMPREHENSIVE CYBER INTELLIGENCE PLATFORM

PREVENT DIGITAL CRIMES WITH REAL INTELLIGENCE

 

KELA’s market-leading platform penetrates the hardest-to-reach places to automatically collect, analyze, monitor and alert on emerging threats coming from the cybercrime underground.

Based on our unique, historical security data lake, KELA’s end-to-end cyber threat intelligence platform supports organizations in preventing potential cyber attacks by making the complex world of the cybercrime simple and accessible. It consists of several modules, each designed with a unique purpose to serve the organization’s needs.

EMPOWERING SECURITY PROFESSIONALS WITH FOUR SEAMLESS MODULES FOR UNMATCHED INTELLIGENCE
 

01/
MONITOR

 

Supports operational security roles by providing attack surface and asset management capabilities. It alerts on targeted threats
specifically aimed at the
organization by analyzing the adversary's perspective of the organization's external attack surface.

02/ 
INVESTIGATE

 

Helps analysts to perform
successful threat hunting and deepen their cyber
investigations with
contextualized intelligence insights as to attackers’ TTPs, threat actor profiles and identities, hacking discussions, and more.

03/
THREAT LANDSCAPE

 

Offers decision makers high-level intelligence on the ever-changing cybercrime ecosystem, including dashboards of top trends, daily highlights, and finished
intelligence feed by KELA's
cyber intelligence experts.

04/
TECHNICAL INTELLIGENCE

 

 

Available via Snowflake
Marketplace, provides SOC teams with automated detection and monitoring of potentially compromised IPs and domains involved in cybercrime activity.

MONITOR
 

 

Security professionals are overwhelmed with false-positive alerts and hours of manual threat analysis.

The threat landscape is constantly mutating and evolving. Its most harmful operations are hidden in its darkest corners.

The Monitor module supports operational security roles by providing attack surface and asset management capabilities. It alerts on targeted threats specifically aimed at the organization by analyzing the adversary’s perspective of its external attack surface and maintaining proactive network defense.

01/
CONTEXTUALIZED INTELLIGENCE

 

  • Supports operational security roles

  • Tailored monitoring and alerting

  • Automated analysis of relevant collected data

  • Real-time targeted alerts

  • Machine-readable intelligence reports

02/ 
ACTIONABLE INTELLIGENCE

 

  • Intuitive and interactive dashboards

  • Specific remediation recommendations for targeted cybercrime threats

03/ 
COMPLETE COVERAGE

 

 

  • Monitors an organization’s entire cybercrime attack surface

  • Maps the network and watches the perimeter and domains for exposed databases, open ports and other vulnerable technologies

INVESTIGATE
 

 

KELA’s technology casts the widest net across the Internet’s hidden sources, making collection and management of intelligence highly scalable and accessible.

The Investigate module helps analysts to perform successful threat hunting and deepen their cyber investigations with contextualized intelligence insights as to attackers’ TTPs, threat actor profiles and identities, hacking discussions, and more.

01/
IN-DEPTH INVESTIGATION
 

 

  • Helps analysts to perform successful threat hunting and deepen their cyber investigations

  • Intuitive search functionality

  • Investigate any data point in real-time

  • Perform complex query searches

02/ 

SECURITY DATA LAKE

 

  • Access intelligence from database dumps, Telegram groups, botnet markets, hacking chatter and more

  • Enables anonymous and safe investigations

  • Avoid exposing your scope and obtain access to raw data

03/ 

FINISHED INTELLIGENCE

 

Gain full access to research from KELA’s world-class Cyber Intelligence Center

THREAT LANDSCAPE
 
The Threat Landscape module offers decision-makers high-level intelligence on the ever-changing cybercrime ecosystem, including dashboards of top trends, daily highlights, and finished intelligence feed by KELA’s cyber intelligence experts. It includes ransomware events, network access on sale, leaked databases, and new threats across all sectors to deliver high-level executives with effective, strategic information, thus enabling informed decisions on the next steps.

 
01/
TRENDS
 

Our dashboards offer a comprehensive overview of APT (Advanced Persistent Threat) activity, ransomware events, and network accesses available for sale. Easily view top threat actors, affected sectors, and geographic locations.

02/
DAILY HIGHLIGHTS
 

 

This segment provides detailed insights into events that have occurred over the past 24 hours. You can stay informed about each event and gain a better understanding of the evolving cyber threat landscape.

03/
INTELLIGENCE NEED
 

 

Our feed includes detailed information about a range of cybercrime events, including ransomware attacks, network accesses for sale, leaked databases, and emerging threats. Access intelligence insights and reports about the latest trends in the cybercrime underground.

TECHNICAL INTELLIGENCE
 

As part of KELA's ongoing mission to empower organizations to neutralize cyber threats, it has introduced Technical Cybercrime Intelligence. Our Intelligence is collected through automated detection of potentially compromised IPs and domains involved in cybercrime activity. Our sources include closed forums, illicit markets, automated cybercrime shops, instant messaging channels used by criminals, and more. This intelligence is available to consume via KELA’s API as a machine-readable feed and can be easily integrated into your security appliances.

Use KELA’s Technical Intelligence module to monitor the latest compromised network assets that can be exploited by threat actors for their next cyber attack. Such assets can be abused to serve as an attack infrastructure or as an attack vector such as phishing attacks, (for example, as a C2 server).


 
01/
ACTIONABLE THREAT INTELLIGENCE

 

 

Use KELA’s Technical Intelligence to get actionable cybercrime threat intelligence and protect your organization against compromised network infrastructure that can be exploited by malicious threat actors

02/ 
IMPROVED THREAT HUNTING CAPABILITIES

 

 

Leverage KELA’s Technical Intelligence to support your investigation and improve your organization’s threat-hunting capabilities

03/ 
DETECT SUSPICIOUS IPs & DOMAINS

 

 

  • Provides SOC teams with automated detection and
    monitoring of potentially compromised IPs and domains involved in cybercrime activity

  • Easily integrates into a SIEM, SOAR, or any other security
    solution

bottom of page