Simple, transparent pricing that grows with you.
Other needs? Contact us
Automated subdomain discovery based on root domains | |||
Service port scanning | |||
SSL certificate scanning | |||
Comprehensive link review, including hidden links | |||
Authentication-required service audit | |||
Technology version identification |
Detect various types of vulnerabilities, especially top 10 OWASP, SQL Injection, XSS, Out-Of-Band, SSRF, etc. | |||
Detect services/apps with outdated or unpatched versions | |||
Support scanning services using modern frameworks like React, Angular, Vue, Java, PHP, ASP.NET, Ruby on Rails, Python, Golang, etc. |
Centrally manage detected vulnerabilities | |||
Detailed reporting on severity and location of vulnerabilities | |||
Statistics and general analysis on the status of all enterprise assets | |||
Automatically suggest or implement vulnerability resolutions | |||
Automatically suggest or implement safe patches and updates from third parties | |||
Manage vulnerability statuses and severity levels | |||
Asset tagging management | |||
Export reports for each scan cycle | |||
Automatically export reports for scheduled scan cycles | |||
Add and manage individual assignments for vulnerability resolution |
Security evaluation for detected subdomains | |||
Regular security assessment reports | |||
Email alerts and notifications |
Custom asset scan profiles | |||
Authenticated scanning | |||
Scheduled periodic scans | |||
CI/CD integration via API | |||
Maximum scans per month | Pay-as-you-go | Unlimited | Unlimited |
Maximum concurrent scans | 1 | 2 | 3 |
Maximum pending scans | 100 | 1000 | 1000 |
Maximum scheduled scans | 0 | 75 | 300 |
Support methods | Email | Email, Phone | Email, Phone, Dedicated Account Manager |
Everything you need to know about the product and billing.