Listing Thumbnail

    KELA Cyber Intelligence Platform

     Info
    Sold by: KELA 
    A leading global cyber threat intelligence firm, KELA delivers actionable insights into emerging digital threats from cybercrime sources. Its technology penetrates hidden places to monitor, analyze, and provide contextualized intelligence from attacker perspectives. Globally trusted, KELA has expertise in mitigating real risks, empowering defenders to prevent and combat digital crime.

    Overview

    An award-winning cyber threat intelligence firm, KELA mission is to support the prevention and neutralization of cyber attacks with 100% real, actionable intelligence on threats emerging from the cybercrime underground. Our success is based on uniquely integrating our proprietary automated technologies and qualified, veteran intelligence experts. Trusted worldwide, our technology infiltrates hidden underground forums, marketplaces and messaging groups and thoroughly monitors and hunts for threats to uncover and mitigate real risks and enable proactive protection. KELA revolutionary solution arms its customers with highly contextualized intelligence, as seen from the eyes of attackers, eliminating blind spots and providing proactive network defense. Key features include: Threat Landscape: Offers decision makers high-level intelligence on the ever-changing cybercrime ecosystem, including dashboards of top trends, daily highlights, and finished intelligence feed by KELA cyber intelligence experts. Investigate: Helps analysts to perform successful threat hunting and deepen their cyber investigations with contextualized intelligence insights as to attackers HTTPs, threat actor profiles and identities, hacking discussions, and more. Identity Guard: Proactive protection against compromised accounts tailored for diverse businesses. Monitors and detects compromised accounts across all organizational domains, subdomains, and SaaS accounts, utilizing data from millions of infected machines. Threat Actors: Centralizing comprehensive information on threat actors from diverse web sources, this hub facilitates thorough investigations with links to related actors. Offering deep insights through a user-friendly interface and concise threat actor summaries, it enhances decision-making. Monitor: Centralizing comprehensive information on threat actors from diverse web sources, this hub facilitates thorough investigations with links to related actors. Offering deep insights through a user-friendly interface and concise threat actor summaries, it enhances decision-making. Technical Intelligence: Available via KELA API, provides SOC teams with automated detection and monitoring of potentially compromised IPs and domains involved in cybercrime activity. Third Party Risk: Proactively monitors, evaluates, and mitigates risks from third-party vendors, enhancing your supply chain security. This essential tool strengthens organizations cybersecurity posture against external threats.

    Highlights

    • Actionable asset and identity Intelligence- Neutralize relevant threats by monitoring and acting on your essential assets.
    • Unique Security Data Lake- Access KELA's comprehensive data lake which holds a rich bank of processed intelligence, for a clear, easy view of structured data and finished intelligence insights.
    • Deep Intelligence Expertise- Cover the entire intelligence life cycle with technology and products designed by veteran intelligence experts with deep cyber defense expertise.

    Details

    Sold by

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    KELA Cyber Intelligence Platform

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (3)

     Info
    Dimension
    Description
    Cost/12 months
    Cloud Attack Surface Management
    1 seat, up to 500 FQDNs
    $65,000.00
    Cybercrime Platform
    1 seat, up to 1000 search tokens, 25 assets, 1 year historical data
    $160,000.00
    Third-Party Risk Management
    1 seat, up to 50 vendors
    $100,000.00

    Vendor refund policy

    No Refund Policy

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Vendor resources

    Support

    Vendor support

    MSSPs, LEAs, and Government agencies, please contact KELA at aws.marketplace@ke-la.com  for pricing information

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    10
    In Analytics

    Overview

     Info
    AI generated from product descriptions
    Underground Threat Monitoring
    Infiltrates hidden underground forums, marketplaces, and messaging groups to monitor and hunt for emerging cybercrime threats and attack indicators.
    Compromised Account Detection
    Monitors and detects compromised accounts across organizational domains, subdomains, and SaaS accounts utilizing data from millions of infected machines.
    Threat Actor Intelligence Hub
    Centralizes comprehensive information on threat actors from diverse web sources with links to related actors, threat actor profiles, identities, and hacking discussions.
    Automated Technical Intelligence API
    Provides SOC teams with automated detection and monitoring of potentially compromised IPs and domains involved in cybercrime activity through API integration.
    Third-Party Vendor Risk Assessment
    Proactively monitors, evaluates, and mitigates risks from third-party vendors to strengthen supply chain security posture.
    Multi-Source Threat Monitoring
    Monitors over 500 sources across surface, deep, and dark web including forums, data leak sites, and encrypted chat platforms to detect security risks and initial access vectors.
    Machine Learning-Based Detection
    Utilizes machine learning engine to detect and mitigate leaked credentials, secrets, and data breaches with prioritization for VIP and executive accounts.
    Modular Architecture
    Comprises three main modules (deep and dark web monitoring, data leak monitoring, and brand threat monitoring) with multiple sub-modules that can be purchased individually or in combinations based on specific use cases.
    SIEM and SOAR Integration
    Integrates with major SIEM and SOAR solution providers, Slack, and ticketing tools for streamlined alert management and incident response workflows.
    Customizable Alert Configuration
    Provides granular tagging and customizable alert rules to deliver specific actionable intelligence with instant reporting capabilities.
    Cyber Threat Intelligence Collection
    Monitoring of thousands of sources including dark web forums, criminal marketplaces, encrypted chat channels, and open web to track cyber threat actors, ransomware, and malware with finished intelligence reports and indicators of compromise.
    Vulnerability Intelligence and Prioritization
    Vulnerability database with 328,000+ records enriched with EPSS scores, ransomware likelihood scores, social risk scores, exploit availability data, and temporal analysis for vulnerability prioritization and remediation.
    Identity Threat Detection
    Monitoring and detection of stolen credentials across company and customer accounts with account takeover mitigation capabilities and proactive credential buyback functionality.
    Financial Fraud Intelligence
    Analysis and monitoring of financial fraud threats including credit card scraping, cryptocurrency analysis, check fraud mitigation, and card shop intelligence.
    Physical Security Threat Monitoring
    Real-time geolocation-based threat monitoring across global locations with social media and open source aggregation for physical security intelligence and time-based threat analysis.

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 reviews
    No customer reviews yet
    Be the first to review this product . We've partnered with PeerSpot to gather customer feedback. You can share your experience by writing or recording a review, or scheduling a call with a PeerSpot analyst.