Here you'll find all you need to know to get you going with our products
Investigate User Guide
Become a cybercrime investigations champion
Investigate API
Explore the Investigate API documentation and references
Monitor User Guide
Learn how to efficiently configure your attack surface and monitor alerts
Monitor API
Explore the Monitor API documentation and references
Threat Landscape User Guide
Stay ahead of threats with KELA’s intelligence insights
Threat Landscape API
Explore the Threat Landscape API documentation and references
Identity Guard User Guide
Your ultimate defence against compromised credentials
Identity Guard API
Explore the Identity Guard API documentation and references
Threat Actors User Guide
Explore & identify actors posing threats to your organization
Threat Actors API
Explore the Threat Actors API documentation and references
Brand Control User Guide
Protect your brand from phishing, impersonation, and digital abuse
Brand Control API
Explore the Brand Control API documentation and references
Integrations
Learn how to integrate your favourite apps with the KELA platform
Safe Environment
Release Notes
Keep posted on KELA's most recent releases
Notice: access to documents is subject to user authentication.