KELA Group

KELA Group

KELA's Radark real-time Darknet threat intelligence console automatically tracks Darknet threats, giving immediate notification of compromised company-specific information.

Radark automatically tracks Darknet threats, giving immediate notification of compromised company-specific information – employee or customer details, email addresses, passwords and many more. Built in keywords in several languages and new sources added by our analysts every day ensure that Radark gives you only the highest quality Darknet information.

In the process, KELA will map the most relevant attack vectors and leak sources. This targeted cyber intelligence enables our clients to get a completely external viewpoint of their situation and vulnerabilities in order to prevent data breaches at the earliest possible stage.

By mapping client vulnerabilities and identifying hacker intent, we're able to prevent data breaches by advising our clients on how to strengthen their defenses.

Contact Information

Directory of Suppliers

SenseCy

SenseCy

SenseCy enables continuous monitoring and early identification of cyber threats through a unique methodology called Virtual HUMINTâ„¢ coupled with strong dedicated technology.

European Defence Agency (EDA)

European Defence Agency (EDA)

EDAs mission is to improve European defence capabilities. Programme areas include Cyber Defence.

SecSolution

SecSolution

Secsolution.com is an Italian online magazine for professional security technologies and solutions covering both physical and electronic security.

Data Centre News (DCN)

Data Centre News (DCN)

Data Centre News (DCN) is a news based, digital publication for data centre and IT professionals. In this rapidly evolving sector it

Scale Computing

Scale Computing

Scale Computing integrates storage, servers, and virtualization software. Solutions offered include Disaster Recovery & DRaaS.

Glenbrook Partners

Glenbrook Partners

Glenbrook is a payments industry strategy consulting and research firm with expertise in all areas including payments security and risk management.

International Computer Science Institute (ICSI)

International Computer Science Institute (ICSI)

ICSI is a leading independent, nonprofit center for research in computer science. Research areas include network security and privacy.

Cronus Cyber Technologies

Cronus Cyber Technologies

Cronus Cybot performs automatic penetration testing all year round, including continuous vulnerability assessment for full control of your network.

Equilibrium Security Services

Equilibrium Security Services

Equilibrium Security Services is a specialist cyber security company providing a full spectrum of IT security solutions.

Recorded Future

Recorded Future

Recorded Future arms security teams with threat intelligence powered by patented machine learning to lower risk.

CorreLog

CorreLog

CorreLog delivers security information and event management (SIEM) combined with deep correlation functions.

CyberOwl

CyberOwl

CyberOwl's early warning system uses a probabilistic framework to systematically aggregate uncertain and disparate security events to provide real-time visibility of threats to every asset.

CyberRed

CyberRed

IoT Cyber Security: SMB and Smart Homes. Software-only solution to stop attacks, ransomware and others.

Fornetix

Fornetix

Key Orchestration by Fornetix is an advanced encryption key management ecosystem that automates the key lifecycle across the entire enterprise with groundbreaking precision and speed.

Context Information Services

Context Information Services

Context is a leading cyber security consultancy with a comprehensive portfolio of cyber advisory and advanced technical services.