Insights

Cybersecurity Focus KELA specializes in providing real-time, actionable threat intelligence from the underground cybercrime ecosystem, making it highly attractive for organizations seeking advanced proactive security measures against digital threats.

Regulatory Expansion With ongoing mergers and regulatory approvals in progress, KELA’s expanding footprint indicates opportunities for security partnerships and joint offerings that align with financial institutions' compliance needs.

Market Niche KELA's focus on underground threat monitoring and attack surface intelligence positions it uniquely among large cybersecurity firms, creating sales potential in markets demanding specialized intelligence solutions.

Technology Edge Utilizing advanced proprietary automation and expert analysis, KELA offers a differentiated product that appeals to organizations looking for cutting-edge threat detection and prevention capabilities.

Competitive Landscape Given the company's similar tech stack and niche focus to major industry players like Symantec and Kaspersky, there is an opportunity to position KELA as a specialized or complementary provider to broader cybersecurity service portfolios.

KELA - Cyber Threat Intelligence Tech Stack

KELA - Cyber Threat Intelligence uses 8 technology products and services including Docker, Cloudflare CDN, Select2, and more. Explore KELA - Cyber Threat Intelligence's tech stack below.

  • Docker
    Containerization
  • Cloudflare CDN
    Content Delivery Network
  • Select2
    Javascript Libraries
  • Moment.js
    Javascript Libraries
  • C#
    Programming Languages
  • JavaScript
    Programming Languages
  • Lead Forensics
    Software As A Service
  • ExactMetrics
    Web Platform Extensions

KELA - Cyber Threat Intelligence's Email Address Formats

KELA - Cyber Threat Intelligence uses at least 2 format(s):
KELA - Cyber Threat Intelligence Email FormatsExamplePercentage
FirstL@ke-la.comJohnD@ke-la.com
77%
First.Last@ke-la.comJohn.Doe@ke-la.com
14%
LastF@ke-la.comDoeJ@ke-la.com
7%
FirstLast@ke-la.comJohnDoe@ke-la.com
1%
FirstML@ke-la.comJohnMD@ke-la.com
1%

Frequently Asked Questions

What is KELA - Cyber Threat Intelligence's phone number?

Minus sign iconPlus sign icon
You can contact KELA - Cyber Threat Intelligence's main corporate office by phone at . For more prospecting data, LeadIQ has access to up-to-date and accurate contact information within our platform. Find, capture, and sync contact data to your CRM and sales tools in one click.

What is KELA - Cyber Threat Intelligence's stock symbol?

Minus sign iconPlus sign icon
KELA - Cyber Threat Intelligence is a publicly traded company; the company's stock symbol is LBAI.

What is KELA - Cyber Threat Intelligence's official website and social media links?

Minus sign iconPlus sign icon
KELA - Cyber Threat Intelligence's official website is kelacyber.com and has social profiles on LinkedIn.

What is KELA - Cyber Threat Intelligence's NAICS code?

Minus sign iconPlus sign icon
KELA - Cyber Threat Intelligence's NAICS code is 5415 - Computer Systems Design and Related Services.

How many employees does KELA - Cyber Threat Intelligence have currently?

Minus sign iconPlus sign icon
As of February 2026, KELA - Cyber Threat Intelligence has approximately 139 employees across 4 continents, including AsiaEuropeNorth America. Key team members include Ceo, Representative Director Kela K.K: D. L.Cto: I. K.Vp Emea: B. R.. Explore KELA - Cyber Threat Intelligence's employee directory with LeadIQ.

What industry does KELA - Cyber Threat Intelligence belong to?

Minus sign iconPlus sign icon
KELA - Cyber Threat Intelligence operates in the Computer and Network Security industry.

What technology does KELA - Cyber Threat Intelligence use?

Minus sign iconPlus sign icon
KELA - Cyber Threat Intelligence's tech stack includes DockerCloudflare CDNSelect2Moment.jsC#JavaScriptLead ForensicsExactMetrics.

What is KELA - Cyber Threat Intelligence's email format?

Minus sign iconPlus sign icon
KELA - Cyber Threat Intelligence's email format typically follows the pattern of FirstL@ke-la.com. Find more KELA - Cyber Threat Intelligence email formats with LeadIQ.

When was KELA - Cyber Threat Intelligence founded?

Minus sign iconPlus sign icon
KELA - Cyber Threat Intelligence was founded in 2015.

KELA - Cyber Threat Intelligence

Computer and Network SecurityTel Aviv, Israel51-200 Employees

An award-winning cybercrime threat intelligence firm, KELA's mission is to provide 100% real, actionable intelligence on threats emerging from the cybercrime underground, to support the prevention of digital crimes. Our success is based on a unique integration of our proprietary automated technologies and qualified intelligence experts. Trusted worldwide, our technology infiltrates hidden underground places and thoroughly monitors, hunts, and mitigates digital crimes to uncover real risks and allow proactive protection. KELA’s tailored threat visibility, combined with cybercrime attack surface intelligence, arms you with highly contextualized intelligence, as seen from the eyes of attackers, thus enabling proactive network defense.

Section iconCompany Overview

Phone number
Stock Symbol
LBAI
NAICS Code
5415 - Computer Systems Design and Related Services
Founded
2015
Employees
51-200

Section iconFunding & Financials

  • $100M$250M

    KELA - Cyber Threat Intelligence's revenue is estimated to be in the range of $100M$250M

Section iconFunding & Financials

  • $100M$250M

    KELA - Cyber Threat Intelligence's revenue is estimated to be in the range of $100M$250M

Ready to create more pipeline?

Get a demo and discover why thousands of SDR and Sales teams trust
LeadIQ to help them build pipeline confidently.

© LeadIQ, Inc. All rights reserved.