As a leading global cyber threat intelligence firm, KELA delivers actionable insights from cybercrime sources into emerging threats targeting organizations. Its technology penetrates hidden places to monitor, analyze, and provide contextualized intelligence from attackers' perspectives. KELA's Monitor module supports operational security roles by automatically providing attack surface and threat management capabilities. The monitor alerts on targeted threats specifically aimed at the organization by analyzing the adversary's perspective of the organization's external attack surface and maintaining proactive network defense.
Use the monitor module app to get all of your KELA's monitor alerts directly into your Splunk instance. When configuring the app you would be able to choose which types of incidents will get pulled to Splunk.
First version - full support of KELA's Monitor module
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.