Product categories
- Application Security
- Cloud Security
- Cyber Security Services
- Data Masking
- Data Security
- Endpoint Security
- Forensics
- Governance Risk Management & Compliance
- Infrastructure Security
- Mobile Security
- Network Security
- Password Manager
- Secure File Transfer
- Security Information and Event Management
- Transport Access Control
- User Security
- Vulnerability Assessment
-
DARKBEAST
$0.00DARKBEAST provides incident responders, threat hunters, investigators, and intelligence analyst with a robust technology to dive into the cybercrime underground and investigate through KELA’s dark web data lake. Gain Visibility into the underground operations and stay ahead of attackers, all while maintaining anonymity and abiding by any security restrictionsDARKBEAST
Category: Digital Risk Monitoring Specialized Threat Analysis and Protection Threat Intelligence and Signature Feeds |DARKBEAST provides incident responders, threat hunters, investigators, and intelligence analyst with a robust technology to dive into the cybercrime underground and investigate through KELA’s dark web data lake. Gain Visibility into the underground operations and stay ahead of attackers, all while maintaining anonymity and abiding by any security restrictions -
Desksight.ai
$30.00$29.00 for 1 year with a 2-week free trialIt is a SaaS based product which collects and analyzes the data and provides insights to help organizations be more productive and compliant. DeskSight.ai has Easy & quick sale, an average of 7-10 days of closure timelines since it is a Plug and Play product and you can be up & live in minutes. This product has a very simple U.I. and no major IT intervention is required for implementing or monitoring/handling of this solution. You can also classify users in different teams, groups, projects etc. and also, move users who have left the organization into Retired users from Active users.Desksight.ai
It is a SaaS based product which collects and analyzes the data and provides insights to help organizations be more productive and compliant. DeskSight.ai has Easy & quick sale, an average of 7-10 days of closure timelines since it is a Plug and Play product and you can be up & live in minutes. This product has a very simple U.I. and no major IT intervention is required for implementing or monitoring/handling of this solution. You can also classify users in different teams, groups, projects etc. and also, move users who have left the organization into Retired users from Active users.$29.00Was $30.00Save $1$30.00$29.00 for 1 year with a 2-week free trial -
Emsisoft Anti Malware
$9.35 – $265.00 / yearHighlights- Award-winning threat detection
- High performance
- Dual-engine technology
- Advanced smart cleaning
- Cloud Management
- Advance & Persistent Threat Prevention
- Antivirus and Anti-Malware
- EDR Capabilities
- Best Protection against Ransomware
- Anti-Ransomware
- Surf- & Banking-Protection
- Behavior Blocker
- Firewall
- Advance Malware Detection Techniques
- Free Ransomware decryption tools
Emsisoft Anti Malware
Category: Endpoint Protection and Anti-virus Endpoint Security Endpoint Threat Detection and Response Intrusion Prevention Systems / Intrusion Detection System Malware Detection and Analysis | SKU: EMSHighlights- Award-winning threat detection
- High performance
- Dual-engine technology
- Advanced smart cleaning
- Cloud Management
- Advance & Persistent Threat Prevention
- Antivirus and Anti-Malware
- EDR Capabilities
- Best Protection against Ransomware
- Anti-Ransomware
- Surf- & Banking-Protection
- Behavior Blocker
- Firewall
- Advance Malware Detection Techniques
- Free Ransomware decryption tools
-
INTELACT_1 (10 Assets) DarkNetCyberThreatIntel
$25,000.00 / yearIntelAct offers organizations a fully automated and targeted solution for Attack Surface Monitoring, enabling tailored configuration of client’s assets, automated monitoring of these assets in KELA’s Dark Net sources, and real-time alerting on any compromise or exposure of them.INTELACT_1 (10 Assets) DarkNetCyberThreatIntel
IntelAct offers organizations a fully automated and targeted solution for Attack Surface Monitoring, enabling tailored configuration of client’s assets, automated monitoring of these assets in KELA’s Dark Net sources, and real-time alerting on any compromise or exposure of them. -
INTELACT_2 (30 Assets) DarkNetCyberThreatIntel
$40,000.00 / yearIntelAct offers organizations a fully automated and targeted solution for Attack Surface Monitoring, enabling tailored configuration of client’s assets, automated monitoring of these assets in KELA’s Dark Net sources, and real-time alerting on any compromise or exposure of themINTELACT_2 (30 Assets) DarkNetCyberThreatIntel
IntelAct offers organizations a fully automated and targeted solution for Attack Surface Monitoring, enabling tailored configuration of client’s assets, automated monitoring of these assets in KELA’s Dark Net sources, and real-time alerting on any compromise or exposure of them -
INTELACT_3 (50 Assets) DarkNetCyberThreatIntel
$60,000.00 / yearIntelAct offers organizations a fully automated and targeted solution for Attack Surface Monitoring, enabling tailored configuration of client’s assets, automated monitoring of these assets in KELA’s Dark Net sources, and real-time alerting on any compromise or exposure of themINTELACT_3 (50 Assets) DarkNetCyberThreatIntel
IntelAct offers organizations a fully automated and targeted solution for Attack Surface Monitoring, enabling tailored configuration of client’s assets, automated monitoring of these assets in KELA’s Dark Net sources, and real-time alerting on any compromise or exposure of them -
INTELACT_4 (50 Assets/2users) Annual_DarkNetCyberThreatIntel
$72,000.00 / yearIntelAct offers organizations a fully automated and targeted solution for Attack Surface Monitoring, enabling tailored configuration of client’s assets, automated monitoring of these assets in KELA’s Dark Net sources, and real-time alerting on any compromise or exposure of themINTELACT_4 (50 Assets/2users) Annual_DarkNetCyberThreatIntel
IntelAct offers organizations a fully automated and targeted solution for Attack Surface Monitoring, enabling tailored configuration of client’s assets, automated monitoring of these assets in KELA’s Dark Net sources, and real-time alerting on any compromise or exposure of them -
INTELACT_5 (100 assets/4 users) Annual_DarkNetCyberThreatIntel
$96,000.00 / yearIntelAct offers organizations a fully automated and targeted solution for Attack Surface Monitoring, enabling tailored configuration of client’s assets, automated monitoring of these assets in KELA’s Dark Net sources, and real-time alerting on any compromise or exposure of themINTELACT_5 (100 assets/4 users) Annual_DarkNetCyberThreatIntel
IntelAct offers organizations a fully automated and targeted solution for Attack Surface Monitoring, enabling tailored configuration of client’s assets, automated monitoring of these assets in KELA’s Dark Net sources, and real-time alerting on any compromise or exposure of them -
INTELACT_6 (150 assets/6 users) DarkNetCyberThreatIntel
$132,000.00 / yearIntelAct offers organizations a fully automated and targeted solution for Attack Surface Monitoring, enabling tailored configuration of client’s assets, automated monitoring of these assets in KELA’s Dark Net sources, and real-time alerting on any compromise or exposure of themINTELACT_6 (150 assets/6 users) DarkNetCyberThreatIntel
IntelAct offers organizations a fully automated and targeted solution for Attack Surface Monitoring, enabling tailored configuration of client’s assets, automated monitoring of these assets in KELA’s Dark Net sources, and real-time alerting on any compromise or exposure of them -
ISMAC Pro
$17.99$15.99 per endpoint/annumWith Case Management and a Threat Intelligence Feed you'll be able to better perform cybersecurity in complex environments with a broad mix of attack surfaces such as cloud, on-premises and personal endpoints.ISMAC Pro
With Case Management and a Threat Intelligence Feed you'll be able to better perform cybersecurity in complex environments with a broad mix of attack surfaces such as cloud, on-premises and personal endpoints. -
ISMAC SOAR
$29.99$25.99 / year with a 14-day free trial and a $6,000.00 sign-up feeFor large and complex environments ISMAC SOAR will enable your team to achieve scalability of your cyberdefense efforts.ISMAC SOAR
Category: Cloud Security Compliance Management Container Security Log Management Malware Detection and Analysis Security Incident Management and Response SOAR Threat Intelligence and Signature Feeds Vulnerability Assessment | SKU: 003For large and complex environments ISMAC SOAR will enable your team to achieve scalability of your cyberdefense efforts.$25.99Was $29.99Save $4$29.99$25.99 / year with a 14-day free trial and a $6,000.00 sign-up fee -
oak9 Cloud Infrastructure Security SaaS Platform
$2,000.00oak9 lets you tailor security standards to your needs and intelligently learns the more you build, so you aren’t slowed by hundreds of false positives or non-relevant exceptions. You can focus on the functional capabilities of your application while oak9 assess every change to your application architecture against your customized security blueprint to notify you in real-time of any risks.oak9 Cloud Infrastructure Security SaaS Platform
Category: Cloud Security Compliance Management Digital Risk Monitoring Risk Assessment Vulnerability Assessment |oak9 lets you tailor security standards to your needs and intelligently learns the more you build, so you aren’t slowed by hundreds of false positives or non-relevant exceptions. You can focus on the functional capabilities of your application while oak9 assess every change to your application architecture against your customized security blueprint to notify you in real-time of any risks. -
SCRUTINY SENSOR
$8,000.00Scrutiny predicts the true nature of files by emulating the static and dynamic behavior in a crypto caged environment and simultaneously training self-learning sensors at the same time to provide accurate verdicts along with detailed analysis in seconds. Our unique approach detects both known and unknown ransomware strains without any reliance on data engrams, centralized signature databases, etc. Also, this stands out as multi-tier, more innovative, and advanced than the other ransomware detection methods available.SCRUTINY SENSOR
Category: Cloud Security Data Security Email Security Endpoint Security Industrial Security Internet of Things Security Malware Detection and Analysis |Scrutiny predicts the true nature of files by emulating the static and dynamic behavior in a crypto caged environment and simultaneously training self-learning sensors at the same time to provide accurate verdicts along with detailed analysis in seconds. Our unique approach detects both known and unknown ransomware strains without any reliance on data engrams, centralized signature databases, etc. Also, this stands out as multi-tier, more innovative, and advanced than the other ransomware detection methods available. -
Snapt NovaSense
$2,400.00 – $6,768.00 for 1 yearNovaSense threat intelligence platform
NovaSense provides thread feeds, analytics and ML-driven analysis of attackers, malware hosts, botnets, and abusers.Snapt NovaSense
Category: Malware Detection and Analysis Managed Security Service Providers Specialized Threat Analysis and Protection Threat Intelligence and Signature Feeds | SKU: NovaSense SubscriptionNovaSense threat intelligence platform
NovaSense provides thread feeds, analytics and ML-driven analysis of attackers, malware hosts, botnets, and abusers.$2,400.00 – $6,768.00 for 1 year$2,400.00 – $6,768.00 for 1 year -
Social engineering / Employee Vulnerability Assessment
$100.00Through social engineering assessments, we’ll demonstrate how well employees are complying with organizational procedures and processes.Social engineering / Employee Vulnerability Assessment
Category: Behavioral Analytics Digital Forensic Investigation and Computer Forensics Vulnerability Assessment |Through social engineering assessments, we’ll demonstrate how well employees are complying with organizational procedures and processes. -
SOCRadar Cyber Intelligence
$30,000.00$24,000.00SOCRadar provides actionable and contextualized intelligence aiming for security teams to operate efficiently. Our platform’s end-to-end automation supports SOC teams in dealing with manual and repetitive tasks that simultaneously minimize zero positives so that security analysts should focus on higher-impact projects. With SOCRadar’s early-warning system that detects attacks in the pre-exploit period, getting ahead of cyber attackers is now possible. Challenged by the understaffed teams, security leaders can effectively use SOCRadar as an extension to SOC teams.SOCRadar Cyber Intelligence
SOCRadar provides actionable and contextualized intelligence aiming for security teams to operate efficiently. Our platform’s end-to-end automation supports SOC teams in dealing with manual and repetitive tasks that simultaneously minimize zero positives so that security analysts should focus on higher-impact projects. With SOCRadar’s early-warning system that detects attacks in the pre-exploit period, getting ahead of cyber attackers is now possible. Challenged by the understaffed teams, security leaders can effectively use SOCRadar as an extension to SOC teams.