Presentation is loading. Please wait.

Presentation is loading. Please wait.

KELA Targeted Cyber Intelligence

Similar presentations


Presentation on theme: "KELA Targeted Cyber Intelligence"— Presentation transcript:

1 KELA Targeted Cyber Intelligence
We use automated technology to continuously monitor Dark Net discussions The technology only looks at sources which were manually added by our experts, all of them ex-defense forces intelligence analysts Our goal is to provide very clean intelligence - threats specifically targeting our clients, with extremely low false rates The result is clear, actionable threat intelligence, with added insights and forensics from the analyst team KELA Differentiators Extreme Targeting KELA provides only client-specific intelligence, with very low false rates, and without any redundant or generic information. Curated Sources Every Dark Net site we track is a high quality intelligence source, manually qualified by our analysts. We do not collect everything that’s out there. Real Discussions IoC’s alone will never give a complete picture. We focus on finding threats by monitoring actual human discussions. The RaDark Technology Comprehensive and tailored configuration of all possible threat vectors Completely external to the organization, looking at threats from an attacker’s view point, with not access required to the company’s network Caching of all Dark Net threats against the company for later review and forensics work Monitoring of all high ranking employees in the organization, as well as employees with administrative privileges Monitoring of 3rd parties / vendors over time for protection against threats emanating from 3rd party breaches Monitoring of vulnerabilities and attacks against the company’s products


Download ppt "KELA Targeted Cyber Intelligence"

Similar presentations


Ads by Google