Agent-based crypto discovery across cloud, on-prem & hybrid environments
Tiered by scope, scan frequency, alerting, and agent count
Real-time traffic monitoring across all plans
Monthly and annual billing with production deployment paths
MonthlyYearly
Single Endpoint
Starter
$999/yr
Save $189
1 CipherScan agent for laptop deployment
Built for a single laptop or workstation with continuous traffic monitoring and a daily posture review of the machine itself.
1 AgentDaily Device ScanReal-Time Traffic
Scope
Local machine plus its live network traffic
Laptop and workstation deployment only
Monitoring
Real-time network traffic monitoring
Daily endpoint crypto posture scans
Encryption Health Report
Alerts & Coverage
Dashboard alerts
Basic cryptographic inventory and posture visibility
Coverage for core schemes including RSA, ECC, AES, TLS, and X.509 certificate usage
24-hour support SLA
Most Popular
Pro
$2,999/yr
Save $589
7 CipherScan agents across hybrid infrastructure
Expands from a single machine into cloud servers, virtual machines, IoT environments, and application platforms with broader operational visibility.
7 AgentsHourly Infra ScanWebhook Alerts
Scope
Endpoint, server, VM, IoT, and cloud infrastructure coverage
AWS, Azure, GCP, and DigitalOcean support
Deploy directly on cloud servers and virtual machines
Monitoring
Hourly infrastructure crypto posture scans
Real-time traffic monitoring across monitored infrastructure
Compliance-oriented reporting
Alerts & Coverage
Dashboard and webhook alerts
Expanded cryptographic coverage across the 10 most common PKI, certificate, and encryption patterns
24-hour support SLA
Full Stack Coverage
Business
$6,999/yr
Save $1,389
15 CipherScan agents for full-stack cryptographic governance
Extends infrastructure monitoring into source code, database schemas, and deployment pipelines so teams can catch crypto issues before and after release.
15 AgentsCode Push ScanSlack + Email + Webhook
Scope
Machine, cloud, source code, and database coverage
Database schema and encryption audits
Correlates code usage, encryption functions, and stored data protection patterns
Monitoring
Hourly machine and infrastructure posture scans
Daily source code and database crypto scans
Scan on every code push
Real-time traffic monitoring across all monitored assets
Alerts & Coverage
Email, Slack, Telegram, dashboard, and webhook alerts
CI/CD integration
Coverage across the 20 most common PKI, certificate, and encryption patterns
Migration planning and remediation guidance
24-hour support SLA
Tailored Deployment
Enterprise
Let's Talk
Custom coverage for large estates, regulated programs, and cross-team rollout
Designed for organizations that need bespoke scope, private onboarding, and deployment planning across multiple environments and business units.