Compare Plans
Detailed feature comparison to help you choose the right plan for your business
MonthlyYearlySAVE 20%
| Price (USD) | Company Monitoring $399/mo Monitor your company's external attack surface | MOST POPULAR Underwriter Portfolio $799/mo Full underwriting platform with insurance KPIs | API ONLY $299/mo API integration for seamless security data automation |
|---|---|---|---|
| API | |||
| Key Features | |||
Manage organization with APIs | ✓ | ✓ | ✓ |
10,000 APIs requests monthly | ✓ | ✓ | ✓ |
Share API keys with your team | ✓ | ✓ | ✓ |
Up to 10 API keys per package | ✓ | ✓ | ✓ |
API Documentation available | ✓ | ✓ | ✓ |
API Test platform available | ✓ | ✓ | ✓ |
| Users & IAM | |||
| User Management Features | |||
Add Users | ✓ | ✓ | ✕ |
Delete Users | ✓ | ✓ | ✕ |
Disable Users | ✓ | ✓ | ✕ |
Edit Users | ✓ | ✓ | ✕ |
| Dashboard | |||
| Access to all companies | |||
Access to all companies | ✕ | ✓ | ✕ |
| Overview | |||
Summary Metrics | ✓ | ✓ | ✕ |
Status Updates | ✓ | ✓ | ✕ |
Key Performance Indicators (KPIs) | ✓ | ✓ | ✕ |
| Company details | |||
Company Information | ✓ | ✓ | ✕ |
Contact Details | ✓ | ✓ | ✕ |
Operational Overview | ✓ | ✓ | ✕ |
| Peer Analytics | |||
Comparative Analysis | ✓ | ✓ | ✕ |
Benchmarking Reports | ✓ | ✓ | ✕ |
Industry Standards Comparison | ✓ | ✓ | ✕ |
| Organization | |||
| Subsidiaries | |||
Subsidiary Details | ✓ | ✓ | ✕ |
Performance Matrix | ✓ | ✓ | ✕ |
Risk Assessment | ✓ | ✓ | ✕ |
| Rating\'s Tree | |||
Hierarchical Structure | ✓ | ✓ | ✕ |
Rating Criteria | ✓ | ✓ | ✕ |
Score Breakdown | ✓ | ✓ | ✕ |
| Attack Surface | |||
Attack Vectors | ✓ | ✓ | ✕ |
Vulnerability Points | ✓ | ✓ | ✕ |
Risk Exposure | ✓ | ✓ | ✕ |
| Infrastructure | |||
| Infrastructure Assets | |||
Asset Inventory | ✓ | ✓ | ✕ |
Configuration Details | ✓ | ✓ | ✕ |
Asset Health | ✓ | ✓ | ✕ |
| Application Assets | |||
Application List | ✓ | ✓ | ✕ |
Usage Statistics | ✓ | ✓ | ✕ |
Security Status | ✓ | ✓ | ✕ |
| SBOMs(Software Bill Of Materials) | |||
Component Inventory | ✓ | ✓ | ✕ |
Version Tracking | ✓ | ✓ | ✕ |
Vulnerability Mapping | ✓ | ✓ | ✕ |
| Assets Upload | |||
Upload Interface | ✓ | ✕ | ✕ |
Data validation | ✓ | ✕ | ✕ |
Integration Support | ✓ | ✕ | ✕ |
| Network | |||
| Infrastructure | |||
Network Components | ✓ | ✓ | ✕ |
Connectivity Details | ✓ | ✓ | ✕ |
Health Monitoring | ✓ | ✓ | ✕ |
| Topology | |||
Network Map | ✓ | ✓ | ✕ |
Topological Analysis | ✓ | ✓ | ✕ |
Node Details | ✓ | ✓ | ✕ |
| Risk | |||
| Rating Details | |||
Rating Metrics | ✓ | ✓ | ✕ |
Historical Ratings | ✓ | ✓ | ✕ |
Trend Analysis | ✓ | ✓ | ✕ |
| Findings Details | |||
Detailed Findings | ✓ | ✕ | ✕ |
Impact Analysis | ✓ | ✕ | ✕ |
Remediation Suggestions | ✓ | ✕ | ✕ |
| Remediations | |||
Action Plans | ✓ | ✕ | ✕ |
Implimentation Tracking | ✓ | ✕ | ✕ |
Effectiveness Evaluation | ✓ | ✕ | ✕ |
| Vulnerability Detection | |||
Detection Methods | ✓ | ✕ | ✕ |
Real-time Alerts | ✓ | ✕ | ✕ |
False Positive Management | ✓ | ✕ | ✕ |
| Vulnerability Catalog | |||
Known Vulnerabilities | ✓ | ✓ | ✕ |
Severity Ratings | ✓ | ✓ | ✕ |
Patch Information | ✓ | ✓ | ✕ |
| Events | |||
| Company History | |||
Historical Events | ✓ | ✓ | ✕ |
Impact Analysis | ✓ | ✓ | ✕ |
Timeline Visualization | ✓ | ✓ | ✕ |
| Global Latest News | |||
Recent News | ✓ | ✓ | ✕ |
Market Impact | ✓ | ✓ | ✕ |
Relevance Scoring | ✓ | ✓ | ✕ |
| Insurance / ML | |||
| Incident Prediction | |||
Predictive Models | ✓ | ✓ | ✕ |
Incident Scenarios | ✓ | ✓ | ✕ |
Probability Analysis | ✓ | ✓ | ✕ |
Cyber Attack | ✓ | ✓ | ✕ |
Human/System Error | ✓ | ✓ | ✕ |
Physical Attack | ✓ | ✓ | ✕ |
| Data Loss Prediction | |||
Data Breach Scenarios | ✓ | ✓ | ✕ |
Loss Impact | ✓ | ✓ | ✕ |
Cyber Attack | ✓ | ✓ | ✕ |
Physical Or Human Error | ✓ | ✓ | ✕ |
Other Factor | ✓ | ✓ | ✕ |
| Tail Risk Estimation | |||
Risk Models | ✓ | ✓ | ✕ |
Extreme Event Scenarios | ✓ | ✓ | ✕ |
Probability Distribution | ✓ | ✓ | ✕ |
Value at Risk | ✓ | ✓ | ✕ |
Expected Shortfall | ✓ | ✓ | ✕ |