Pricing
Intelligence Worth Your Attention.
Begin with our free Community edition. Unlock heat maps, attack paths, and playbooks when you’re ready to act. Cancel anytime.
Freemium
Perfect for individual analysts exploring better intelligence.
Free/Forever
Features
Full threat library access
Basic search
Lite
Perfect for threat researchers, cyber threat analysts and security professionals who want contextual Adversary tradecraft and Tactic, Technique and Procedural (TTP) understanding.
$149/Month
Per User (ex. GST/VAT)
Features
Everything in Freemium
Advanced search
Find every technique, tactic and procedure (TTP) for every report, actor, malware, tool & campaign
Full Mitre Att&ck context from every report, down to the page
Entity Level Mitre Att&CK heatmaps
Professional
For red and blue teams, consultancies and threat intelligence professionals ready to turn intelligence into threat-informed outcomes.
Conact Sales
Features
Everything in Lite
3 Constellations™
Cross-entity MITRE ATT&CK Heat Maps
Attack Path Generator
Run Execution Playbooks (Threat Hunts, Table-top Exercises, Attack Simulation Plans & more)
API Access
Compare What Matters
Features
Freemium
Lite
Professional
Core Features
Threat Library Access
Advanced Search Capabilities
—
MITRE ATT&CK Analysis & Context
—
MITRE ATT&CK Heatmaps
—
Entity Level only.
Constellations™
Preview Only
7 day trial
Up to 3
Attack Path Navigator
—
—
Execution Playbooks
—
—
Yes
Automation & Integration
Automated Alerts
—
In development
SSO/SAML
—
In development
Premium Intelligence Integrations
—
—
In-development
Team Features
Licensing
Per User
Per User
Per User
Collaboration
—
—
Support & Success
Support Level
Community
Basic
Basic
Training
Docs Only
Docs Only
Docs & On-Demand
Feature Releases
—
—
Early Access
Frequently Asked Questions
Yes! Currently the platform utilizes AI more under the hood than just a bolt-on agent. In saying that, our plan in the near future we will be to deploy our own agent trained on our threat library!
We're not trying to replicate traditional platforms. We're building something fundamentally different - accessible, relevant and focused on threat informed-outcomes, not just intelligence analysis.
Most platforms require you to configure and manage raw data feeds, then spend hours processing indicators and building context. Elezar processes finished open-source reports that already contain the analysis, context, and attribution—we extract and map relevant TTPS to Mitre ATT&CK, IOCs, and threat attribute information so you get foundational intelligence, not raw data.
We focus specifically on finished open-source threat intelligence reports—comprehensive analyses published by security researchers because its a rich source of untapped intelligence. Being able to leverage the global security community, including vendors, allows us to have a broader collection of threat intelligence rather than just a single provider. In addition, and their finished reports represent real practitioner experiences with complete context and analysis.
Finished threat intelligence means complete, analyzed reports rather than raw indicators or data feeds. We process security research papers, incident analyses, campaign reports, and threat assessments—intelligence that includes context, attribution, and actionable insights, not just lists of IOCs or technical indicators.
Our platform is architected and AI Driven. We exclusively process finished threat intelligence reports from authoritative sources—established security researchers, incident response teams, and recognized threat intelligence publications. Unlike platforms that ingest raw feeds, we focus on curated, analyzed reports that have already been researched and validated by the security community.
No. We only process finished, published threat intelligence reports from established sources. This means comprehensive analyses from security blogs, research institutions, incident response reports, and recognized threat intelligence publications—not social media posts, forums, or unverified claims.
We process new finished reports within hours of publication if the source is in our collection library. Security researchers often publish detailed campaign analyses and threat assessments faster than commercial vendors can produce similar intelligence. This gives you access to thoroughly researched findings as soon as they're published.
Absolutely. We extract all relevant technical indicators, MITRE ATT&CK techniques, and IOCs from finished reports, but they come with full context—you know exactly which campaign they're associated with, what threat actor used them, and how they fit into the broader attack pattern.
We process incident response reports, threat campaign analyses, malware family studies, APT group profiles, vulnerability research, and security industry publications. Essentially, any finished intelligence report that provides comprehensive analysis and actionable insights for security professionals.
This approach emphasizes that Elezar provides value-added, analyzed intelligence rather than raw data streams, which aligns with your core value proposition of eliminating manual processing work.
Turn Intelligence Into
Threat-Informed Outcomes.
Continuously prioritize what matters and execute with confidence.