Pricing

Intelligence Worth Your Attention.

Begin with our free Community edition. Unlock heat maps, attack paths, and playbooks when you’re ready to act. Cancel anytime.

Prices are in AUD

Freemium

Perfect for individual analysts exploring better intelligence.

Free/Forever

Features

  • Full threat library access

  • Basic search

Lite

Perfect for threat researchers, cyber threat analysts and security professionals who want contextual Adversary tradecraft and Tactic, Technique and Procedural (TTP) understanding.

$149/Month

Per User (ex. GST/VAT)

Features

  • Everything in Freemium

  • Advanced search

  • Find every technique, tactic and procedure (TTP) for every report, actor, malware, tool & campaign

  • Full Mitre Att&ck context from every report, down to the page

  • Entity Level Mitre Att&CK heatmaps

Professional

For red and blue teams, consultancies and threat intelligence professionals ready to turn intelligence into threat-informed outcomes.

Conact Sales

Features

  • Everything in Lite

  • 3 Constellations

  • Cross-entity MITRE ATT&CK Heat Maps

  • Attack Path Generator

  • Run Execution Playbooks (Threat Hunts, Table-top Exercises, Attack Simulation Plans & more)

  • API Access

Compare What Matters

Features

Freemium

Lite

Professional

Core Features

Threat Library Access

Advanced Search Capabilities

MITRE ATT&CK Analysis & Context

MITRE ATT&CK Heatmaps

Entity Level only.

Constellations™

Preview Only

7 day trial

Up to 3

Attack Path Navigator

Execution Playbooks

Yes

Automation & Integration

Automated Alerts

In development

SSO/SAML

In development

Premium Intelligence Integrations

In-development

Team Features

Licensing

Per User

Per User

Per User

Collaboration

Support & Success

Support Level

Community

Basic

Basic

Training

Docs Only

Docs Only

Docs & On-Demand

Feature Releases

Early Access

Frequently Asked Questions

Yes! Currently the platform utilizes AI more under the hood than just a bolt-on agent. In saying that, our plan in the near future we will be to deploy our own agent trained on our threat library!

We're not trying to replicate traditional platforms. We're building something fundamentally different - accessible, relevant and focused on threat informed-outcomes, not just intelligence analysis.

Most platforms require you to configure and manage raw data feeds, then spend hours processing indicators and building context. Elezar processes finished open-source reports that already contain the analysis, context, and attribution—we extract and map relevant TTPS to Mitre ATT&CK, IOCs, and threat attribute information so you get foundational intelligence, not raw data.

We focus specifically on finished open-source threat intelligence reports—comprehensive analyses published by security researchers because its a rich source of untapped intelligence. Being able to leverage the global security community, including vendors, allows us to have a broader collection of threat intelligence rather than just a single provider. In addition, and their finished reports represent real practitioner experiences with complete context and analysis.

Finished threat intelligence means complete, analyzed reports rather than raw indicators or data feeds. We process security research papers, incident analyses, campaign reports, and threat assessments—intelligence that includes context, attribution, and actionable insights, not just lists of IOCs or technical indicators.

Our platform is architected and AI Driven. We exclusively process finished threat intelligence reports from authoritative sources—established security researchers, incident response teams, and recognized threat intelligence publications. Unlike platforms that ingest raw feeds, we focus on curated, analyzed reports that have already been researched and validated by the security community.

No. We only process finished, published threat intelligence reports from established sources. This means comprehensive analyses from security blogs, research institutions, incident response reports, and recognized threat intelligence publications—not social media posts, forums, or unverified claims.

We process new finished reports within hours of publication if the source is in our collection library. Security researchers often publish detailed campaign analyses and threat assessments faster than commercial vendors can produce similar intelligence. This gives you access to thoroughly researched findings as soon as they're published.

Absolutely. We extract all relevant technical indicators, MITRE ATT&CK techniques, and IOCs from finished reports, but they come with full context—you know exactly which campaign they're associated with, what threat actor used them, and how they fit into the broader attack pattern.

We process incident response reports, threat campaign analyses, malware family studies, APT group profiles, vulnerability research, and security industry publications. Essentially, any finished intelligence report that provides comprehensive analysis and actionable insights for security professionals.

This approach emphasizes that Elezar provides value-added, analyzed intelligence rather than raw data streams, which aligns with your core value proposition of eliminating manual processing work.

Turn Intelligence Into
Threat-Informed Outcomes.

Continuously prioritize what matters and execute with confidence.