Start Building Today. Enable Your Entire Team.
Start with our individual plan to gain security ops superpowers immediately. Scale up for more tokens, customized intelligence sources, deeper contextualization and deployment control.
For Individual Analysts
INDIVIDUAL
For power users and analysts. Intelligence to feed your security operations.
Intelligence
- CVEs, malware, breaches, threat actors, supply chain
- Thousands of sources, continuously correlated
Contextualization
- Investigate threats and generate reports
- 1 personal workspace
Action
- Up to 5 agents
- Daily scheduled agents
- Integrate with your existing security tools
API
- Limited API
Model
- 5M tokens/mo included
- Additional 1M tokens at $35
For Security Teams
Plan
TEAM
Bring your own Intelligence & Assets, Contextualization, and build automation in shared workspaces with your team.
Everything in Individual, plus:
Intelligence
- CVEs, malware, breaches, threat actors, supply chain
- Thousands of sources, continuously correlated
- Bring your own intelligence feeds
Contextualization
- Shared investigations across analysts
- 10 shared workspaces
- Bring your own asset context
Action
- Unlimited agents
- Daily scheduled agents
- Integrate with your existing security tools
API
- Full API (standard rate limits)
Model
- 40M tokens/mo included
- Additional 1M tokens at $30
ENTERPRISE
Your infrastructure, your models, full control for security teams with sophisticated requirements.
Everything in Scale, plus:
Intelligence
- CVEs, malware, breaches, threat actors, supply chain
- Thousands of sources, continuously correlated
- Bring your own intelligence feeds
Contextualization
- Shared investigations across analysts
- Unlimited workspaces
- Bring your own asset context
Action
- Unlimited agents
- On-demand scheduled agents
- Integrate with your existing security tools
Deployment
- Custom deployment (private cloud)
- Dedicated support and onboarding
- Advanced compliance and audit controls
- SLA guarantees
API
- Full API (dedicated rate limits)
Model
- Volume token pricing
- Bring your own models (BYOM)
For Individual Analysts
For Security Teams
Plan
INDIVIDUAL
For power users and analysts. Intelligence to feed your security operations.
Intelligence
- CVEs, malware, breaches, threat actors, supply chain
- Thousands of sources, continuously correlated
Contextualization
- Investigate threats and generate reports
- 1 personal workspace
Action
- Up to 5 agents
- Daily scheduled agents
- Integrate with your existing security tools
API
- Limited API
Model
- 5M tokens/mo included
- Additional 1M tokens at $35
TEAM
Bring your own Intelligence & Assets, Contextualization, and build automation in shared workspaces with your team.
Everything in Individual, plus:
Intelligence
- CVEs, malware, breaches, threat actors, supply chain
- Thousands of sources, continuously correlated
- Bring your own intelligence feeds
Contextualization
- Shared investigations across analysts
- 10 shared workspaces
- Bring your own asset context
Action
- Unlimited agents
- Daily scheduled agents
- Integrate with your existing security tools
API
- Full API (standard rate limits)
Model
- 40M tokens/mo included
- Additional 1M tokens at $30
ENTERPRISE
Your infrastructure, your models, full control for security teams with sophisticated requirements.
Everything in Scale, plus:
Intelligence
- CVEs, malware, breaches, threat actors, supply chain
- Thousands of sources, continuously correlated
- Bring your own intelligence feeds
Contextualization
- Shared investigations across analysts
- Unlimited workspaces
- Bring your own asset context
Action
- Unlimited agents
- On-demand scheduled agents
- Integrate with your existing security tools
Deployment
- Custom deployment (private cloud)
- Dedicated support and onboarding
- Advanced compliance and audit controls
- SLA guarantees
API
- Full API (dedicated rate limits)
Model
- Volume token pricing
- Bring your own models (BYOM)
Save 10% with annual billing. Token usage varies by model. Let's talk to learn more.
What Can You Do With Your Tokens?
Token usage depends on the complexity of the task and the model used. Here are typical ranges for common workflows.
Investigation
Research a threat, correlate across intelligence sources, and generate a report.
On the Individual plan (5M tokens), that's 25 to 100 investigations per month.
Scheduled Monitor
An agent that watches for new vulnerabilities, exposures, or threat activity on a recurring schedule.
A daily monitor at ~10K tokens/run uses ~300K tokens/month. On the Individual plan, you can run over 30 monitors and still have tokens left for investigations.
Estimates assume typical usage patterns. Actual consumption varies by model selection and task complexity.