-
RADARK
KELA’s RADARK delivers automated threat intelligence, cultivating the targeted and contextualized insights – at scale – that you need to stay ahead of attackers. Automatically monitor your environment and ensure that targeted threats are mitigated immediately to consistently maintain a strong security posture.Rated 2.54 out of 5RADARK
KELA’s RADARK delivers automated threat intelligence, cultivating the targeted and contextualized insights – at scale – that you need to stay ahead of attackers. Automatically monitor your environment and ensure that targeted threats are mitigated immediately to consistently maintain a strong security posture. -
DARKBEAST
DARKBEAST provides incident responders, threat hunters, investigators, and intelligence analyst with a robust technology to dive into the cybercrime underground and investigate through KELA’s dark web data lake. Gain Visibility into the underground operations and stay ahead of attackers, all while maintaining anonymity and abiding by any security restrictionsRated 2.58 out of 5DARKBEAST
Category: Digital Risk Monitoring Specialized Threat Analysis and Protection Threat Intelligence and Signature Feeds |DARKBEAST provides incident responders, threat hunters, investigators, and intelligence analyst with a robust technology to dive into the cybercrime underground and investigate through KELA’s dark web data lake. Gain Visibility into the underground operations and stay ahead of attackers, all while maintaining anonymity and abiding by any security restrictions -
INTELACT
INTELACT offers organizations a fully automated and targeted solution for Attack Surface Monitoring, enabling tailored configuration of client’s assets, automated monitoring of these assets in KELA’s Dark Net sources, and real-time alerting on any compromise or exposure of themRated 2.08 out of 5INTELACT
INTELACT offers organizations a fully automated and targeted solution for Attack Surface Monitoring, enabling tailored configuration of client’s assets, automated monitoring of these assets in KELA’s Dark Net sources, and real-time alerting on any compromise or exposure of them