# KELA Threat Intelligence Platform Reviews
**Vendor:** Kela Research and Strategy LTD  
**Category:** [Threat Intelligence Software](https://www.g2.com/categories/threat-intelligence)
## About KELA Threat Intelligence Platform
KELA’s Unified Threat Intelligence Platform is an all-in-one solution for Cyber Threat Intelligence (CTI), External Attack Surface Management (EASM), Digital Risk Protection Services (DRPS), and Third-Party Risk Management (TPRM), delivering real-time, actionable insights. The platform protects identities, brands, digital exposure, and the supply chain, seamlessly integrating into existing security controls and acting as the first line of defense against cyber threats from the cybercriminal underground. It monitors national risks, critical infrastructure, and supports dark web and cybercrime investigations, helping organizations close security gaps and stay ahead of evolving threats. KELA serves hundreds of customers, including enterprises, MSSPs, law enforcement agencies, CERTs, and government agencies worldwide






- [View KELA Threat Intelligence Platform pricing details and edition comparison](https://www.g2.com/products/kela-threat-intelligence-platform/reviews?section=pricing&secure%5Bexpires_at%5D=2026-05-21+13%3A13%3A55+-0500&secure%5Bsession_id%5D=2420c57e-9ea3-46f4-88aa-42fde9277e3c&secure%5Btoken%5D=95ba65eba62b9b0026623cc2484e9866cf5b84c442396d336ceaa40ced343043&format=llm_user)

## KELA Threat Intelligence Platform Features
**Identification**
- Reseller Database
- Monitoring
- Violations

**Functionality**
- Monitoring - Deep Web
- Monitoring - Dark Web
- Analysis
- Ticketing
- Simple Search
- Leak Source
- Centralized Dashboard
- Real-Time Alerts

**Asset Management**
- Asset Discovery
- Shadow IT Detection
- Change Management

**Vulnerability Management - Digital Risk Protection (DRP) Platforms**
- Vulnerability Assessment
- Digital Footprint Mapping
- Fraud Detection
- Data Leak Detection
- Anti-Counterfeiting
- Brand Protection

**Orchestration**
- Asset Management
- Security Workflow Automation
- Deployment
- Sandboxing

**Enforcement**
- Communication
- Plans
- Track

**Monitoring**
- Gap Analysis
- Vulnerability Intelligence
- Compliance Monitoring
- Continuous Monitoring

**Incident Response Digital Risk Protection (DRP) Platforms**
- Threat Remediation
- Automated Reponses
- Incident Response Capabilities

**Information**
- Proactive Alerts
- Malware Detection
- Intelligence Reports

**Risk Management**
- Risk-Prioritization
- Reconnaissance
- At-Risk Analysis
- Threat Intelligence

**Reporting and Analytics - Digital Risk Protection (DRP) Platforms**
- Threat Trends Analysis
- Risk Assessment Reports
- Customizable Dashboards

**Personalization**
- Endpoint Intelligence
- Security Validation
- Dynamic/Code Analysis

**Generative AI**
- AI Text Summarization

**Generative AI**
- AI Text Summarization
- Generate Attack Scenarios
- Generate Threat Detection Rules
- Generate Threat Summaries

**Agentic AI - Threat Intelligence**
- Autonomous Task Execution
- Multi-step Planning
- Proactive Assistance
- Decision Making

## Top KELA Threat Intelligence Platform Alternatives
  - [CrowdStrike Falcon Endpoint Protection Platform](https://www.g2.com/products/crowdstrike-falcon-endpoint-protection-platform/reviews) - 4.7/5.0 (381 reviews)
  - [LastPass](https://www.g2.com/products/lastpass/reviews) - 4.5/5.0 (2,024 reviews)
  - [1Password](https://www.g2.com/products/1password/reviews) - 4.6/5.0 (1,770 reviews)

