Pricing

Scope-based pricing for continuous external assurance, AI shadow visibility, and audit-ready evidence — tailored to your domains, asset volume, and compliance needs.

Plans

Built for your scope

Every engagement is scoped to domains, assets, and assurance depth. We provide transparent qualification and a clear proposal path.

Platform assurance

Teams standardising EASM

Continuous discovery, verification-first findings, drift, and reporting in one workspace. Ideal when you need defensible external assurance without a bespoke procurement cycle.

Enterprise & regulated

Complex scope & compliance

Multi-entity portfolios, insurer or regulator dialogue, SSO, extended retention, and add-ons like Recon Detection. We align to your policy, evidence, and procurement requirements.

Details

What’s Included

One platform: discovery, monitoring, Zero-Day & Emerging Threat Monitoring, intelligence, and reporting

  • External attack surface discovery (domains, subdomains, IPs, ports, URLs, APIs)
  • Continuous monitoring & drift detection
  • Near real-time zero-day exploitability impact modeling
  • Tech stack fingerprinting & version-aware correlation
  • Leaked credentials & breach visibility
  • Verification-first findings & audit-ready evidence
  • Policy-driven guardrails & scope control
  • Dashboard, reports & compliance-ready deliverables

Add-ons

Add-ons

Optional capabilities to extend your assurance and visibility

Recon Detection — Turn external noise into high-confidence, analyst-ready detection. As adversaries probe and enumerate your surface, Recon Detection maps that activity to what matters in your environment, applies clear logic, and surfaces explainable evidence your team can action fast. The result: faster triage, stronger escalation decisions, and less time lost correlating weak signals across disconnected tools.

Extend that advantage with managed zero-day monitoring, brand impersonation managed response, extended retention, and SSO/SAML + SCIM to match enterprise operating models and governance requirements.

Next step

Get a Quote

Pricing is based on scope (domains, assets) and assurance level. We’ll tailor a plan for your organisation.

Book a demo and we’ll walk you through the platform, discuss your scope, and provide a clear proposal — including Zero-Day & Emerging Threat Monitoring and continuous monitoring as part of your EASM package.

What happens next

• 30-minute walkthrough tailored to your environment and goals

• Clear scope alignment and proposal path within 1 business day

• No spam — practical follow-up tied to your request

Book a Demo

Or contact us for a direct conversation.