# Welcome to KELA's Documentation Portal

## Products Documentation

### Investigate

<table data-view="cards"><thead><tr><th></th><th></th><th data-hidden data-card-cover data-type="files"></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td><strong>Investigate User Guide</strong></td><td>Become a cybercrime investigations champion</td><td><a href="https://752228648-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfVgQn2fnV4WyKqBmVjYi%2Fuploads%2FS4P0uPUayIeAvptjddMI%2FInvestigate%20-%20User%20Guide.png?alt=media&#x26;token=d4671988-8db3-4d0e-9f3f-eca3d7c16d84">Investigate - User Guide.png</a></td><td><a href="https://docs.ke-la.com/user-guides/">https://docs.ke-la.com/user-guides/</a></td></tr><tr><td><strong>Investigate API</strong></td><td>Explore the Investigate API documentation and references</td><td><a href="https://752228648-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfVgQn2fnV4WyKqBmVjYi%2Fuploads%2F80MyX48k5PucXXBMOPYf%2FInvestigate%20-%20API%20Documentation.png?alt=media&#x26;token=c2c2b242-1aa3-4da2-a35f-04cf8c09b492">Investigate - API Documentation.png</a></td><td><a href="https://docs.ke-la.com/api-documentation/">https://docs.ke-la.com/api-documentation/</a></td></tr></tbody></table>

### Monitor

<table data-view="cards"><thead><tr><th></th><th></th><th data-hidden data-card-cover data-type="files"></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td><strong>Monitor User Guide</strong></td><td>Learn how to efficiently configure your attack surface and monitor alerts</td><td><a href="https://752228648-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfVgQn2fnV4WyKqBmVjYi%2Fuploads%2FRjwrkxcXnt7q9kj7A6Tw%2FMonitor%20-%20User%20Guide.png?alt=media&#x26;token=f42ba003-45e9-4f3c-99eb-254a1810671e">Monitor - User Guide.png</a></td><td><a href="https://docs.ke-la.com/user-guides/radark">https://docs.ke-la.com/user-guides/radark</a></td></tr><tr><td><strong>Monitor API</strong></td><td>Explore the Monitor API documentation and references</td><td><a href="https://752228648-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfVgQn2fnV4WyKqBmVjYi%2Fuploads%2FwcQ9iPsIA8SVc18VU3LS%2FMonitor%20-%20API%20Documentation%20-%20Thumbnail.png?alt=media&#x26;token=7fda6e6d-b688-4655-ac80-d5f6c258ee66">Monitor - API Documentation - Thumbnail.png</a></td><td><a href="https://docs.ke-la.com/api-documentation/radark-api">https://docs.ke-la.com/api-documentation/radark-api</a></td></tr></tbody></table>

### Threat Landscape

<table data-view="cards"><thead><tr><th></th><th></th><th data-hidden data-card-cover data-type="files"></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td><strong>Threat Landscape User Guide</strong></td><td>Stay ahead of threats with KELA’s intelligence insights</td><td><a href="https://752228648-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfVgQn2fnV4WyKqBmVjYi%2Fuploads%2FipYAGpFl1Wh7Rhnatwey%2FThreat%20Landscape%20-%20User%20Guide%20(1).png?alt=media&#x26;token=98fd44ac-04da-4509-8369-7542c67037e0">Threat Landscape - User Guide (1).png</a></td><td><a href="https://docs.ke-la.com/user-guides/threat-landscape">https://docs.ke-la.com/user-guides/threat-landscape</a></td></tr><tr><td><strong>Threat Landscape API</strong></td><td>Explore the Threat Landscape API documentation and references</td><td><a href="https://752228648-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfVgQn2fnV4WyKqBmVjYi%2Fuploads%2FqqnwbjK6yZNB0Lvhru5Y%2FThreat%20Landscape%20-%20API%20Documentation.png?alt=media&#x26;token=5a457d47-957f-4c7c-8e4c-14c3d1e1b52a">Threat Landscape - API Documentation.png</a></td><td><a href="https://docs.ke-la.com/api-documentation/threat-landscape-api">https://docs.ke-la.com/api-documentation/threat-landscape-api</a></td></tr></tbody></table>

### Identity Guard

<table data-view="cards"><thead><tr><th></th><th></th><th data-hidden data-card-cover data-type="files"></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td><strong>Identity Guard User Guide</strong></td><td>Your ultimate defence against compromised credentials</td><td><a href="https://752228648-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfVgQn2fnV4WyKqBmVjYi%2Fuploads%2FIDnM05fKiHVlHJhVaU1L%2FIdentity%20Guard%20-%20User%20Guide.png?alt=media&#x26;token=81657ad5-ccc8-4199-b832-ccfe06300f23">Identity Guard - User Guide.png</a></td><td><a href="https://docs.ke-la.com/user-guides/identity-guard">https://docs.ke-la.com/user-guides/identity-guard</a></td></tr><tr><td><strong>Identity Guard API</strong></td><td>Explore the Identity Guard API documentation and references</td><td><a href="https://752228648-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfVgQn2fnV4WyKqBmVjYi%2Fuploads%2FkDyVHQIAno1y0Ixw8sCL%2FIdentity%20Guard%20-%20API%20Documentation.png?alt=media&#x26;token=164a25bc-fe2a-4813-902b-8eb9b3b321b6">Identity Guard - API Documentation.png</a></td><td><a href="https://docs.ke-la.com/api-documentation/identity-guard-api">https://docs.ke-la.com/api-documentation/identity-guard-api</a></td></tr></tbody></table>

### Threat Actors

<table data-view="cards"><thead><tr><th></th><th></th><th data-hidden data-card-cover data-type="files"></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td><strong>Threat Actors User Guide</strong></td><td>Explore &#x26; identify actors posing threats to your organization</td><td><a href="https://752228648-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfVgQn2fnV4WyKqBmVjYi%2Fuploads%2FybaGUnlN8hccIzcLlrqk%2FThreat%20Actors%20-%20User%20Guide.png?alt=media&#x26;token=f20a82cf-2a7a-4195-be4d-1b81d62c85f2">Threat Actors - User Guide.png</a></td><td><a href="https://docs.ke-la.com/user-guides/threat-actors">https://docs.ke-la.com/user-guides/threat-actors</a></td></tr><tr><td><strong>Threat Actors API</strong></td><td>Explore the Threat Actors API documentation and references</td><td><a href="https://752228648-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfVgQn2fnV4WyKqBmVjYi%2Fuploads%2FChBUUJQE8VYZluYtz8KY%2FThreat%20Actors%20-%20API%20Documentation.png?alt=media&#x26;token=0525996d-5b35-4066-8312-cbf706e90bfb">Threat Actors - API Documentation.png</a></td><td><a href="https://docs.ke-la.com/api-documentation/threat-actors-api">https://docs.ke-la.com/api-documentation/threat-actors-api</a></td></tr></tbody></table>

### Brand Control

<table data-view="cards"><thead><tr><th></th><th></th><th data-hidden data-card-cover data-type="files"></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td><strong>Brand Control User Guide</strong></td><td>Protect your brand from phishing, impersonation, and digital abuse</td><td><a href="https://752228648-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfVgQn2fnV4WyKqBmVjYi%2Fuploads%2FTzXUNntYOoplNUKRgq3q%2FBrand%20Control%20-%20User%20Guide.png?alt=media&#x26;token=383241af-8ae2-4d8a-938a-80d282ce67c4">Brand Control - User Guide.png</a></td><td><a href="https://docs.ke-la.com/user-guides/brand-control">https://docs.ke-la.com/user-guides/brand-control</a></td></tr><tr><td><strong>Brand Control API</strong></td><td>Explore the Brand Control API documentation and references</td><td><a href="https://752228648-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfVgQn2fnV4WyKqBmVjYi%2Fuploads%2FsZCgGT0oFmRjueNVBg9g%2FBrand%20Control%20-%20API%20Documentation.png?alt=media&#x26;token=82eae289-d123-4e0c-bc0f-fd0333fa74c8">Brand Control - API Documentation.png</a></td><td><a href="https://docs.ke-la.com/api-documentation/brand-control-api">https://docs.ke-la.com/api-documentation/brand-control-api</a></td></tr></tbody></table>

***

## Platform features

<table data-view="cards"><thead><tr><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="image">Cover image</th></tr></thead><tbody><tr><td><strong>Integrations</strong></td><td>Learn how to integrate your favourite apps with the KELA platform</td><td><a href="https://docs.ke-la.com/integrations/">https://docs.ke-la.com/integrations/</a></td><td><a href="https://752228648-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfVgQn2fnV4WyKqBmVjYi%2Fuploads%2F8QUUKRM3flhhNqcI4lr5%2Fintegrations%20-%20User%20Guide.png?alt=media&#x26;token=0c002cf6-b297-4d04-a48d-1274be12269b">integrations - User Guide.png</a></td></tr><tr><td><strong>Safe Environment</strong> </td><td>Inspect potentially malicious artifacts in a cloud based safe space</td><td><a href="https://docs.ke-la.com/platform/safe-environment">https://docs.ke-la.com/platform/safe-environment</a></td><td><a href="https://752228648-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfVgQn2fnV4WyKqBmVjYi%2Fuploads%2F45e0KZVTdnMJazpDqWZx%2Fsafe%20environment%20-%20User%20Guide.png?alt=media&#x26;token=2f970c06-6d66-4aad-a62e-272c00f529a6">safe environment - User Guide.png</a></td></tr></tbody></table>

***

## KELA Updates

<table data-view="cards"><thead><tr><th></th><th></th><th data-hidden data-card-cover data-type="files"></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td><strong>Release Notes</strong></td><td>Keep posted on KELA's most recent releases</td><td><a href="https://752228648-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfVgQn2fnV4WyKqBmVjYi%2Fuploads%2FPmvCH9EtfBy1eCYmLuLQ%2FKELA%20-%20Release%20Notes.png?alt=media&#x26;token=afbeb9da-52e7-47e6-bf41-c5c1b90c8bea">KELA - Release Notes.png</a></td><td><a href="https://docs.ke-la.com/kela-updates/">https://docs.ke-la.com/kela-updates/</a></td></tr></tbody></table>

{% hint style="info" %}
**Notice**: access to documents is subject to user authentication.
{% endhint %}
