Choose your subscription option
Our pricing plans are designed to cater to a variety of needs, ensuring that you find the perfect fit for your requirements and budget. We offer flexible options with transparent costs, so you can make an informed decision.
Compare plans
![]() |
![]() |
![]() |
||
---|---|---|---|---|
Monitoring | Underwriter | API only | ||
Price (USD) |
$
999
/mo
|
$
1,999
/mo
|
$
299
/mo
|
|
Getting started with Attack Surface Management | Getting started with Cyber Insurance KPIs Management | Getting started with Cyber Insurance API Integration for Seamless Automation. | ||
$Rank Token | ||||
Token Rewards for
Fixing vulnerabiliies |
||||
Token Rewards
for
Remediating issues |
||||
Airdrops &
Rewards
Program |
||||
API | ||||
Key Features | ||||
Manage organization with
APIs
|
||||
10.000 APIs requests
monthly
|
||||
Share API keys with your
team
|
||||
Up to 10 API keys per
package
|
||||
API Documentation
available
|
||||
API Test platform
available
|
||||
Users & IAM | ||||
User Management Features | ||||
Add Users
|
||||
Delete Users
|
||||
Disable Users
|
||||
Edit Users
|
||||
Dashboard | ||||
Access to all companies | ||||
Overview | ||||
Summary Metrics
|
||||
Status Update's
|
||||
Key Performance Indicators
(KPIs)
|
||||
Company details | ||||
Company Information
|
||||
Contact Details
|
||||
Operational Overview
|
||||
Peer Analytics | ||||
Comparative Analysis
|
||||
Benchmarking Report's
|
||||
Industry Standard's
Comparision
|
||||
Organization | ||||
Subsidiaries | ||||
Subsidiary Details
|
||||
Performance Matrix
|
||||
Risk Assessment
|
||||
Rating's Tree | ||||
Hierarchical Structure
|
||||
Rating Criteria
|
||||
Score Breakdown
|
||||
Attack Surface | ||||
Attack Vector's
|
||||
Vulnerability Points
|
||||
Risk Exposure
|
||||
Infrastructure | ||||
Infrastructure Assets | ||||
Asset Inventory
|
||||
Configuration Details
|
||||
Asset Health
|
||||
Application Assets | ||||
Application List
|
||||
Usage Statistics
|
||||
Security Status
|
||||
SBOMs(Software Bill Of Materials) | ||||
Component Inventory
|
||||
Version Tracking
|
||||
Vulnerability Mapping
|
||||
Assets Upload | ||||
Upload Interface
|
||||
Data validation
|
||||
Intigration Support
|
||||
Network | ||||
Infrastructure | ||||
Network Components
|
||||
Connectivity Details
|
||||
Health Monitoring
|
||||
Topology | ||||
Network Map
|
||||
Topological Analysis
|
||||
Node Details
|
||||
Risk | ||||
Rating Details | ||||
Rating Metrics
|
||||
Historical Ratings
|
||||
Trend Analysis
|
||||
Findings Details | ||||
Detailed Findings
|
||||
Impact Analysis
|
||||
Remediation Suggestions
|
||||
Remediations | ||||
Action Plans
|
||||
Implimentation Tracking
|
||||
Effectiveness
Evaluation
|
||||
Vulnerability Detection | ||||
Detection Methods
|
||||
Real-time Alerts
|
||||
False Positive
Management
|
||||
Vulnerability Catalog | ||||
Known Vulnerabilities
|
||||
Severity Ratings
|
||||
Patch Information
|
||||
Events | ||||
Company History | ||||
Historical Events
|
||||
Impact Analysis
|
||||
Timeline Visualization
|
||||
Global Latest News | ||||
Recent News
|
||||
Market Impact
|
||||
Relevance Scoring
|
||||
Insurance / ML | ||||
Incident Prediction | ||||
Predictive Models
|
||||
Incident Scenarios
|
||||
Probability Analysis
|
||||
Cyber Attack
|
||||
Human/System Error
|
||||
Physical Attack
|
||||
Data Loss Prediction | ||||
Data Breach Scenarios
|
||||
Loss Impact
|
||||
Cyber Attack
|
||||
Physical Or Human Error
|
||||
Other Factor
|
||||
Tail Risk Estimation | ||||
Risk Models
|
||||
Extreme Event Scenarios
|
||||
Probability
Distribution
|
||||
Value at Risk
|
||||
Expected Shortfall
|