Overview
An award-winning cyber threat intelligence firm, KELA mission is to support the prevention and neutralization of cyber attacks with 100% real, actionable intelligence on threats emerging from the cybercrime underground. Our success is based on uniquely integrating our proprietary automated technologies and qualified, veteran intelligence experts. Trusted worldwide, our technology infiltrates hidden underground forums, marketplaces and messaging groups and thoroughly monitors and hunts for threats to uncover and mitigate real risks and enable proactive protection. KELA revolutionary solution arms its customers with highly contextualized intelligence, as seen from the eyes of attackers, eliminating blind spots and providing proactive network defense. Key features include: Threat Landscape: Offers decision makers high-level intelligence on the ever-changing cybercrime ecosystem, including dashboards of top trends, daily highlights, and finished intelligence feed by KELA cyber intelligence experts. Investigate: Helps analysts to perform successful threat hunting and deepen their cyber investigations with contextualized intelligence insights as to attackers HTTPs, threat actor profiles and identities, hacking discussions, and more. Identity Guard: Proactive protection against compromised accounts tailored for diverse businesses. Monitors and detects compromised accounts across all organizational domains, subdomains, and SaaS accounts, utilizing data from millions of infected machines. Threat Actors: Centralizing comprehensive information on threat actors from diverse web sources, this hub facilitates thorough investigations with links to related actors. Offering deep insights through a user-friendly interface and concise threat actor summaries, it enhances decision-making. Monitor: Centralizing comprehensive information on threat actors from diverse web sources, this hub facilitates thorough investigations with links to related actors. Offering deep insights through a user-friendly interface and concise threat actor summaries, it enhances decision-making. Technical Intelligence: Available via KELA API, provides SOC teams with automated detection and monitoring of potentially compromised IPs and domains involved in cybercrime activity. Third Party Risk: Proactively monitors, evaluates, and mitigates risks from third-party vendors, enhancing your supply chain security. This essential tool strengthens organizations cybersecurity posture against external threats.
Highlights
- Actionable asset and identity Intelligence- Neutralize relevant threats by monitoring and acting on your essential assets.
- Unique Security Data Lake- Access KELA's comprehensive data lake which holds a rich bank of processed intelligence, for a clear, easy view of structured data and finished intelligence insights.
- Deep Intelligence Expertise- Cover the entire intelligence life cycle with technology and products designed by veteran intelligence experts with deep cyber defense expertise.
Features and programs
Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/12 months |
---|---|---|
Cloud Attack Surface Management | 1 seat, up to 500 FQDNs | $65,000.00 |
Cybercrime Platform | 1 seat, up to 1000 search tokens, 25 assets, 1 year historical data | $160,000.00 |
Third-Party Risk Management | 1 seat, up to 50 vendors | $100,000.00 |
Vendor refund policy
No Refund Policy
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Vendor resources
Support
Vendor support
MSSPs, LEAs, and Government agencies, please contact KELA at aws.marketplace@ke-la.com for pricing information
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.