header 4header 5
plan 1plan 2plan 3plan 4plan 5
Feature name 1X
YAligned rightAligned centerAligned left
something
check_circle_outline
cancel
Standard Table
New small empty table
FeaturesDiscovery
Edition
Professional
Edition
Advanced
Edition
Enterprise
Edition
End client customerscheck_circlecheck_circlecheck_circlecheck_circle
Internal usecheck_circlecheck_circlecheck_circlecheck_circle
Assessment quickstartcheck_circlecheck_circlecheck_circlecheck_circle
Service provider
in-app branding
Custom logoCustom logoCustom logoCustom logo
Service provider PDF report brandingCustom logoCustom logoCustom logoCustom logo
Vanity hosting URLvCISO.appvCISO.appvCISO.appvCISO.app
Google Workspace IdP Federationcheck_circlecheck_circlecheck_circlecheck_circle
Multifactor authenticationOATH-TOTP Mobile AuthenticatorOATH-TOTP Mobile AuthenticatorOATH-TOTP Mobile AuthenticatorOATH-TOTP Mobile Authenticator
User identity domain enforcement
Discovery
Edition
Professional
Edition
Advanced
Edition
Enterprise
Edition
Essential tools to show clients what security they have for service providers looking to convert clients to invest in the cybersecurity they needComprehensive cyber compliance tools for service providers building advanced tiers of cybersecurity that comply with industry standardsOur most powerful cyber compliance workflows for service providers that need to engineer and prove cyber compliance for third parties and regulatorsAudit-grade compliance delivery and assessor workflows for service providers preparing for or administering third party certifications
Free for select partnersMonthly per organizationMonthly per organizationAnnual per organization
Tools included

•CIS Controls
•Gap Analysis
•Custom Profiles
Tools included

•Industry Compliance Standard Controls
•Gap Analysis
•Custom Profiles
•Implementation Management
•Service Desk
•Implementation Reports
Tools included

•Everything in Professional
•Policy Management
•Compliance Reports
•CSV Exports
•Egress APIs
•FortMesa Trustmark
Tools included

•Everything in Advanced
•Assessment Management
FeaturesDiscovery
Edition
Professional
Edition
Advanced
Edition
Enterprise
Edition
Vanity hosting URLvCISO.appvCISO.appvCISO.appvCISO.app
Google Workspace IdP Federationcheck_circlecheck_circlecheck_circlecheck_circle
Multifactor authenticationOATH-TOTP Mobile AuthenticatorOATH-TOTP
Mobile
Authenticator
OATH-TOTP
Mobile
Authenticator
OATH-TOTP
Mobile
Authenticator
User identity domain enforcementcheck_circlecheck_circle
NotificationsIn-App, Browser, Email, SlackIn-App, Browser,
Email, Slack
In-App, Browser,
Email, Slack
In-App, Browser,
Email, Slack
Custom provider security plan profilesUp to 2 activeUp to 2 activeUnlimitedUnlimited
CIS Controls FrameworkCIS Controls
Groups
(IG) 1-3
CIS Controls
Groups
(IG) 1-3
CIS Controls
Groups
(IG) 1-3
CIS Controls
Groups
(IG) 1-3
Industry Control FrameworksACSC, CJIS, CMMC, FedRAMP, HIPAA, NCSC, NIST, SOC2, POPIAACSC, CJIS, CMMC, FedRAMP, HIPAA, NCSC, NIST, SOC2, POPIAACSC, CJIS, CMMC, FedRAMP, HIPAA, NCSC, NIST, SOC2, POPIA
Rapid gap analysischeck_circlecheck_circlecheck_circlecheck_circle
Discovery EditionProfessional
Edition
Advanced
Edition
Enterprise
Edition
Essential tools to demonstrate vulnerability detectionsComprehensive vulnerability management tooling for service providers looking to target and deliver risk-based vulnerability remediation SLAsOur most powerful vulnerability management workflows for service providers that need risk accept and advanced data analytics capabilitiesAudit-grade vulnerability workflows for unlimited devices for service providers looking to provide vulnerability management to clients of any size
Free for select partnersMonthly per deviceMonthly per deviceAnnual per organization
Tools included

•Asset Inventory
•Vulnerability Inventory
•Risk-based Vuln Prioritization
Tools included

•Asset Management
•Vulnerability Management
•Service Desk
•PDF Reports
Tools included

•Everything in Professional
•Risk Accept
•CSV Exports
•Egress APIs
Tools included

•Everything in Advanced
•Unlimited Devices