Insights

Focused Threat Intelligence KELA specializes in real-time, actionable cybercrime threat intelligence sourced from underground networks, providing organizations with highly contextualized insights to proactively defend their digital assets. This focus on underground monitoring presents a unique opportunity to sell advanced threat detection solutions tailored to organizations prioritizing cybercrime prevention.

Growing Market Presence As an award-winning firm trusted globally, KELA's reputation positions it well to expand into enterprise-level clients seeking sophisticated threat intelligence. Sales efforts could target large financial institutions, tech firms, and critical infrastructure providers that require comprehensive underground monitoring capabilities for heightened security.

Tech Stack Compatibility KELA’s integration of advanced technologies such as MongoDB and sophisticated automation tools indicates openness to scalable, high-performance security solutions. This creates opportunities to upsell or partner with vendors offering complementary security platforms, automation, or cloud-based threat intelligence tools.

Industry Trends Alignment The cybercrime underground market continues to grow and evolve, increasing demand for proactive and intelligence-driven cybersecurity. Sales prospects can be identified among organizations aiming to shift from reactive to proactive defense strategies by adopting threat intelligence solutions similar to KELA’s offerings.

Potential Customer Base With a revenue range of 100 to 250 million dollars and a relatively compact team, KELA operates in a niche yet lucrative segment. SaaS providers, cybersecurity service integrators, and enterprise security teams in similar revenue brackets present prime opportunities for strategic partnerships and tailored threat intelligence products.

KELA Tech Stack

KELA uses 8 technology products and services including MongoDB, Font Awesome, Google Fonts API, and more. Explore KELA's tech stack below.

  • MongoDB
    Database
  • Font Awesome
    Font Scripts
  • Google Fonts API
    Font Scripts
  • MobX
    Javascript Libraries
  • imagesLoaded
    Javascript Libraries
  • FancyBox
    Javascript Libraries
  • 6sense
    Marketing Automation
  • Magnific Popup
    Web Tools And Plugins

Media & News

KELA's Email Address Formats

KELA uses at least 2 format(s):
KELA Email FormatsExamplePercentage
FirstL@ke-la.comJohnD@ke-la.com
77%
First.Last@ke-la.comJohn.Doe@ke-la.com
14%
LastF@ke-la.comDoeJ@ke-la.com
7%
FirstLast@ke-la.comJohnDoe@ke-la.com
1%
FirstML@ke-la.comJohnMD@ke-la.com
1%

Frequently Asked Questions

Where is KELA's headquarters located?

Minus sign iconPlus sign icon
KELA's main headquarters is located at 21 Ha-Arba'a St. (22nd floor), Tel Aviv, IL. The company has employees across 4 continents, including AsiaEuropeNorth America.

What is KELA's phone number?

Minus sign iconPlus sign icon
You can contact KELA's main corporate office by phone at . For more prospecting data, LeadIQ has access to up-to-date and accurate contact information within our platform. Find, capture, and sync contact data to your CRM and sales tools in one click.

What is KELA's stock symbol?

Minus sign iconPlus sign icon
KELA is a publicly traded company; the company's stock symbol is LBAI.

What is KELA's official website and social media links?

Minus sign iconPlus sign icon
KELA's official website is kelacyber.com and has social profiles on LinkedIn.

What is KELA's NAICS code?

Minus sign iconPlus sign icon
KELA's NAICS code is 5415 - Computer Systems Design and Related Services.

How many employees does KELA have currently?

Minus sign iconPlus sign icon
As of October 2025, KELA has approximately 129 employees across 4 continents, including AsiaEuropeNorth America. Key team members include Ceo, Representative Director Kela K.K: D. L.Cto: I. K.Vp Emea: B. R.. Explore KELA's employee directory with LeadIQ.

What industry does KELA belong to?

Minus sign iconPlus sign icon
KELA operates in the Computer and Network Security industry.

What technology does KELA use?

Minus sign iconPlus sign icon
KELA's tech stack includes MongoDBFont AwesomeGoogle Fonts APIMobXimagesLoadedFancyBox6senseMagnific Popup.

What is KELA's email format?

Minus sign iconPlus sign icon
KELA's email format typically follows the pattern of FirstL@ke-la.com. Find more KELA email formats with LeadIQ.

When was KELA founded?

Minus sign iconPlus sign icon
KELA was founded in 2015.

KELA

Computer and Network SecurityIsrael51-200 Employees

An award-winning cybercrime threat intelligence firm, KELA's mission is to provide 100% real, actionable intelligence on threats emerging from the cybercrime underground, to support the prevention of digital crimes. Our success is based on a unique integration of our proprietary automated technologies and qualified intelligence experts. Trusted worldwide, our technology infiltrates hidden underground places and thoroughly monitors, hunts, and mitigates digital crimes to uncover real risks and allow proactive protection. KELA’s tailored threat visibility, combined with cybercrime attack surface intelligence, arms you with highly contextualized intelligence, as seen from the eyes of attackers, thus enabling proactive network defense.

Section iconCompany Overview

Headquarters
21 Ha-Arba'a St. (22nd floor), Tel Aviv, IL
Phone number
Stock Symbol
LBAI
NAICS Code
5415 - Computer Systems Design and Related Services
Founded
2015
Employees
51-200

Section iconFunding & Financials

  • $100M$250M

    KELA's revenue is estimated to be in the range of $100M$250M

Section iconFunding & Financials

  • $100M$250M

    KELA's revenue is estimated to be in the range of $100M$250M

Ready to create more pipeline?

Get a demo and discover why thousands of SDR and Sales teams trust
LeadIQ to help them build pipeline confidently.

© LeadIQ, Inc. All rights reserved.