CYBER INTELLIGENCE

We provide comprehensive cyber intelligence solutions

We search the Darknet to identify specific, targeted threats against our client.

These can be leaked IT systems and topology, employee information, user credentials, and product vulnerabilities. In the process, KELA will essentially map the most relevant attack vectors and leak sources. This targeted cyber intelligence enables our clients to get a completely external viewpoint of their situation and vulnerabilities in order to prevent data breaches at the earliest possible stage.

Every APT starts with the reconnaissance phase

The hackers will map their target, finding employee names, relationships inside the organization, users with administrative privileges, IT systems, etc.

By knowing the hacker methodology, our system was designed to emulate this gathering process. At any given moment, the client can log into the system and see what information is available to and being discussed by the hacker community, specifically against his organization.

Solutions

External Threat Assessment

Deep-dive, expert, tailored research conducted by a team of analysts.

Radark

SaaS platform for direct targeted intelligence configured specifically for your company.

Intelligence SOC

Radark integration with a cyber Security Operations Center of your choice.

Radark prevents data breaches before they occur
by stopping APTs in the reconnaissance phase

By mapping client vulnerabilities and identifying hacker intent, we're able to prevent data breaches by advising our clients on how to strengthen their defenses.

Real-time SaaS Darknet threat intelligence console

REAL-TIME ALERTS

Automatic tracking and immediate notification of company-specific Darknet threats.

TARGETED MONITORING

Detects threats against company executives, products, and vendors.

MULTI-LINGUAL

Built-in keywords in the top hacking languages (English, Chinese, Russian, Arabic) identify all types of threats.

ACTIONABLE INTELLIGENCE

Provides specific solutions to detected threats.

HUNDREDS OF SOURCES

All Darknet sources (hacker forums, illegal markets, etc) are quality-checked by an analyst.

COMPETITIVE ANALYSIS

Compare your company's attack vulnerability to the sector benchmark.

External Threat Assessment

Analyst-led, deep-dive research for mapping all external threats

Digital Mapping

Mapping out the digital footprint of your company, preventing social engineering attack vectors.

Negative Sentiment

Analysis of negative attention regarding your company.

Past Incidents

Full mapping of past attacks and leak incidents of your company.

Competitive Analysis

Rank your position within your industry.

Geopolitical Analysis

Full analysis of geopolitical movements that affect your company.

Overall Threat Score

A comprehensive score indicating threat level in each section of the report.

Security Operations Center

Real-time, on-premises integration of Radark

COMPLETE INTEGRATION

Custom-tailored integration, specific to your needs.

FULL TRAINING PROGRAM

Professional guidance in training your analyst team by our top security experts.

24/7 SUPPORT

Full-time support team to maximize your effectiveness.

BULK MONITORING

Monitoring of hundreds of companies and government organizations.

INTERACTIVE DASHBOARD

Master dashboard for the full set of monitors, with map view and segment breakdown.

FLEXIBLE CONFIGURATION

Segment-specific crawlers / spiders, additional monitoring languages, backward search capabilities.