Listing Thumbnail

    KELA Cyber Intelligence Platform

     Info
    Sold by: KELA 
    A leading global cyber threat intelligence firm, KELA delivers actionable insights into emerging digital threats from cybercrime sources. Its technology penetrates hidden places to monitor, analyze, and provide contextualized intelligence from attacker perspectives. Globally trusted, KELA has expertise in mitigating real risks, empowering defenders to prevent and combat digital crime.

    Overview

    An award-winning cyber threat intelligence firm, KELA mission is to support the prevention and neutralization of cyber attacks with 100% real, actionable intelligence on threats emerging from the cybercrime underground. Our success is based on uniquely integrating our proprietary automated technologies and qualified, veteran intelligence experts. Trusted worldwide, our technology infiltrates hidden underground forums, marketplaces and messaging groups and thoroughly monitors and hunts for threats to uncover and mitigate real risks and enable proactive protection. KELA revolutionary solution arms its customers with highly contextualized intelligence, as seen from the eyes of attackers, eliminating blind spots and providing proactive network defense. Key features include: Threat Landscape: Offers decision makers high-level intelligence on the ever-changing cybercrime ecosystem, including dashboards of top trends, daily highlights, and finished intelligence feed by KELA cyber intelligence experts. Investigate: Helps analysts to perform successful threat hunting and deepen their cyber investigations with contextualized intelligence insights as to attackers HTTPs, threat actor profiles and identities, hacking discussions, and more. Identity Guard: Proactive protection against compromised accounts tailored for diverse businesses. Monitors and detects compromised accounts across all organizational domains, subdomains, and SaaS accounts, utilizing data from millions of infected machines. Threat Actors: Centralizing comprehensive information on threat actors from diverse web sources, this hub facilitates thorough investigations with links to related actors. Offering deep insights through a user-friendly interface and concise threat actor summaries, it enhances decision-making. Monitor: Centralizing comprehensive information on threat actors from diverse web sources, this hub facilitates thorough investigations with links to related actors. Offering deep insights through a user-friendly interface and concise threat actor summaries, it enhances decision-making. Technical Intelligence: Available via KELA API, provides SOC teams with automated detection and monitoring of potentially compromised IPs and domains involved in cybercrime activity. Third Party Risk: Proactively monitors, evaluates, and mitigates risks from third-party vendors, enhancing your supply chain security. This essential tool strengthens organizations cybersecurity posture against external threats.

    Highlights

    • Actionable asset and identity Intelligence- Neutralize relevant threats by monitoring and acting on your essential assets.
    • Unique Security Data Lake- Access KELA's comprehensive data lake which holds a rich bank of processed intelligence, for a clear, easy view of structured data and finished intelligence insights.
    • Deep Intelligence Expertise- Cover the entire intelligence life cycle with technology and products designed by veteran intelligence experts with deep cyber defense expertise.

    Details

    Sold by

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    KELA Cyber Intelligence Platform

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (3)

     Info
    Dimension
    Description
    Cost/12 months
    Cloud Attack Surface Management
    1 seat, up to 500 FQDNs
    $65,000.00
    Cybercrime Platform
    1 seat, up to 1000 search tokens, 25 assets, 1 year historical data
    $160,000.00
    Third-Party Risk Management
    1 seat, up to 50 vendors
    $100,000.00

    Vendor refund policy

    No Refund Policy

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Vendor resources

    Support

    Vendor support

    MSSPs, LEAs, and Government agencies, please contact KELA at aws.marketplace@ke-la.com  for pricing information

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    10
    In Analytics

    Overview

     Info
    AI generated from product descriptions
    Threat Intelligence Collection
    Automated technology that infiltrates hidden underground forums, marketplaces, and messaging groups to monitor and hunt for emerging cyber threats
    Threat Actor Profiling
    Centralized comprehensive information system that aggregates and links threat actor details from diverse web sources with deep investigative insights
    Compromised Account Detection
    Proactive monitoring system that detects compromised accounts across organizational domains, subdomains, and SaaS platforms using data from millions of infected machines
    Technical Threat Monitoring
    API-based automated detection and monitoring service for identifying potentially compromised IPs and domains involved in cybercrime activities
    Supply Chain Risk Management
    Proactive monitoring and evaluation mechanism for assessing and mitigating risks associated with third-party vendors and external threat surfaces
    Web Monitoring Scope
    Advanced monitoring across surface, deep, and dark web sources, covering over 500 digital platforms
    Threat Intelligence Mechanism
    AI/ML-powered engine for contextual digital risk analysis and prediction of Initial Access Vectors
    Cyber Threat Detection
    Comprehensive monitoring for cyber threats including forums, data leak sites, and encrypted chat platforms
    Brand Protection Module
    Advanced monitoring and protection against phishing attacks, fake apps, and rogue social media profiles
    Data Leak Prevention
    Machine learning-based detection and mitigation of leaked credentials and sensitive information across digital channels
    Threat Intelligence Collection
    Comprehensive search and monitoring across thousands of sources including dark web forums, criminal marketplaces, and encrypted chat channels
    Vulnerability Intelligence
    Prioritization of vulnerabilities using enriched data including EPSS, ransomware likelihood score, social risk score, and exploit availability
    Identity Threat Monitoring
    Tracking and mitigation of identity-based threats with largest dataset for stolen credentials and account takeover prevention
    Web Intelligence Scanning
    Multi-domain intelligence gathering across deep/dark web, open web, social media, paste sites, and encrypted communication channels
    Physical Security Intelligence
    Real-time monitoring of critical events with geolocation tracking, social media aggregation, and time-based threat analysis across global locations

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    No customer reviews yet
    Be the first to review this product . We've partnered with PeerSpot to gather customer feedback. You can share your experience by writing or recording a review, or scheduling a call with a PeerSpot analyst.