header 4 | header 5 | ||||
---|---|---|---|---|---|
plan 1 | plan 2 | plan 3 | plan 4 | plan 5 | |
Feature name 1 | X | ||||
Y | Aligned right | Aligned center | Aligned left | ||
something | |||||
check_circle_outline | |||||
cancel | |||||
New small empty table | |
Features | Discovery Edition | Professional Edition | Advanced Edition | Enterprise Edition |
End client customers | check_circle | check_circle | check_circle | check_circle |
Internal use | check_circle | check_circle | check_circle | check_circle |
Assessment quickstart | check_circle | check_circle | check_circle | check_circle |
Service provider in-app branding | Custom logo | Custom logo | Custom logo | Custom logo |
Service provider PDF report branding | Custom logo | Custom logo | Custom logo | Custom logo |
Vanity hosting URL | vCISO.app | vCISO.app | vCISO.app | vCISO.app |
Google Workspace IdP Federation | check_circle | check_circle | check_circle | check_circle |
Multifactor authentication | OATH-TOTP Mobile Authenticator | OATH-TOTP Mobile Authenticator | OATH-TOTP Mobile Authenticator | OATH-TOTP Mobile Authenticator |
User identity domain enforcement | – | – | – | – |
Discovery Edition | Professional Edition | Advanced Edition | Enterprise Edition |
---|---|---|---|
Essential tools to show clients what security they have for service providers looking to convert clients to invest in the cybersecurity they need | Comprehensive cyber compliance tools for service providers building advanced tiers of cybersecurity that comply with industry standards | Our most powerful cyber compliance workflows for service providers that need to engineer and prove cyber compliance for third parties and regulators | Audit-grade compliance delivery and assessor workflows for service providers preparing for or administering third party certifications |
Free for select partners | Monthly per organization | Monthly per organization | Annual per organization |
Tools included •CIS Controls •Gap Analysis •Custom Profiles | Tools included •Industry Compliance Standard Controls •Gap Analysis •Custom Profiles •Implementation Management •Service Desk •Implementation Reports | Tools included •Everything in Professional •Policy Management •Compliance Reports •CSV Exports •Egress APIs •FortMesa Trustmark | Tools included •Everything in Advanced •Assessment Management |
Features | Discovery Edition | Professional Edition | Advanced Edition | Enterprise Edition |
Vanity hosting URL | vCISO.app | vCISO.app | vCISO.app | vCISO.app |
Google Workspace IdP Federation | check_circle | check_circle | check_circle | check_circle |
Multifactor authentication | OATH-TOTP Mobile Authenticator | OATH-TOTP Mobile Authenticator | OATH-TOTP Mobile Authenticator | OATH-TOTP Mobile Authenticator |
User identity domain enforcement | – | – | check_circle | check_circle |
Notifications | In-App, Browser, Email, Slack | In-App, Browser, Email, Slack | In-App, Browser, Email, Slack | In-App, Browser, Email, Slack |
Custom provider security plan profiles | Up to 2 active | Up to 2 active | Unlimited | Unlimited |
CIS Controls Framework | CIS Controls Groups (IG) 1-3 | CIS Controls Groups (IG) 1-3 | CIS Controls Groups (IG) 1-3 | CIS Controls Groups (IG) 1-3 |
Industry Control Frameworks | – | ACSC, CJIS, CMMC, FedRAMP, HIPAA, NCSC, NIST, SOC2, POPIA | ACSC, CJIS, CMMC, FedRAMP, HIPAA, NCSC, NIST, SOC2, POPIA | ACSC, CJIS, CMMC, FedRAMP, HIPAA, NCSC, NIST, SOC2, POPIA |
Rapid gap analysis | check_circle | check_circle | check_circle | check_circle |
Discovery Edition | Professional Edition | Advanced Edition | Enterprise Edition |
---|---|---|---|
Essential tools to demonstrate vulnerability detections | Comprehensive vulnerability management tooling for service providers looking to target and deliver risk-based vulnerability remediation SLAs | Our most powerful vulnerability management workflows for service providers that need risk accept and advanced data analytics capabilities | Audit-grade vulnerability workflows for unlimited devices for service providers looking to provide vulnerability management to clients of any size |
Free for select partners | Monthly per device | Monthly per device | Annual per organization |
Tools included •Asset Inventory •Vulnerability Inventory •Risk-based Vuln Prioritization | Tools included •Asset Management •Vulnerability Management •Service Desk •PDF Reports | Tools included •Everything in Professional •Risk Accept •CSV Exports •Egress APIs | Tools included •Everything in Advanced •Unlimited Devices |