We offer a subscription service based on the number of machines you manage through your service. You are billed monthly, so you will receive a bill one month after you start your service based on the max number of machines managed within your service. We will accept your credit card at the beginning of the subscription period and that card will be billed for our services at the end of each subscription period.
Number of machines
|1-10||$10 Flat Fee
|10-50||$1 per machine
|51-100||$0.95 per machine
|101-250||$0.90 per machine
|250+||Contact us for pricing per machine
*All amounts are shown in U.S. dollars. International prices may vary.
|Analyze computer security posture to identify weaknesses. Know what settings are putting your computer at risk.|
|View reports detailing current security posture. See detailed breakdowns of security settings and the risk they introduce.|
|Track progress over time. Monitor how your security posture changes as you apply mitigations or new risks are identified.|
|Review explanations of findings and best practices. Understand why settings are insecure and what benefits mitigation can provide.|
|Mitigate vulnerabilities by improving security settings. Quickly improve your security posture by applying best practices.|
|Choose which security settings to apply for mitigation. Skip settings that you don’t like or that cause problem for you or your organization.|
|Rollback security settings to the original state (before any mitigation). If mitigations cause problems, return to your original settings as they were before any mitigations were applied.|
|Rollback security settings to last state (before latest mitigation). If you make a change and need to reverse it, return to your settings as they were before the latest mitigation.|
|Rollback security settings to a state within the last 30 days (as of a specific date). If problems arise, return to your settings as they were before the trouble started.|
|Access an online dashboard to perform scans, apply mitigations, and review history. A single web-based interface allows you to initiate scans and mitigations, rollback, review reports and history, and manage your account from anywhere.|
|Manage multiple computers under one account. Whether you have one computer or thousands, use one dashboard to manage them all at once or in groups.|
|Use interactive reports to drill down and isolate items of interest. Target computers, groups, or specific problems to manage however you see fit through an intuitive system.|
|Multiple user accounts with role-based access controls. (Coming soon!)
Add multiple users to your account and give them only the access you want them to have. Delegate and manage your organization efficiently.