- We know what information hackers have on you!
Pricing
Don't Forget
Customization
You can offer to customize the following packages according to your need.
Fixed Price
Non-credit system! No extra costs such as purchasing for additional features while operating your jobs.
Pricing Tables for SMBs
CT S1
$ 500
Annually Package1 ASSET (Domain, IP, Keyword)
BUY NOW (Soon)
- All Features!
- 1 User
- Ticket Support (8/5)
CT S2
$ 1.000
Annually Package2 ASSETS (Domain, IP, Keyword)
BUY NOW (Soon)
- All Features!
- 1 User
- Ticket Support (8/5)
CT S3
$ 1.500
Annually Package3 ASSETS (Domain, IP, Keyword)
BUY NOW (Soon)
- All Features!
- 1 User
- Ticket Support (8/5)
Packages for Moderate
CT M1
Annually Package10 ASSETS (Domain, IP, Keyword)
TALK TO SALES
- All Features!
- 2 Users
- Threat DB API
- Take Down
- Ticket Support (8/5)
CT M2
Annually Package20 ASSETS (Domain, IP, Keyword)
TALK TO SALES
- All Features!
- 3 Users
- Threat DB API
- Take Down
- Ticket Support (8/5)
CT M3
Annually Package50 ASSETS (Domain, IP, Keyword)
TALK TO SALES
- All Features!
- 5 Users
- Threat DB API
- Take Down
- Ticket Support (8/5)
Packages for Enterprise
CT E1
Annually Package100 ASSETS (Domain, IP, Keyword)
TALK TO SALES
- All Features!
- 10 Users
- Threat DB API
- Take Down
- Ticket Support (8/5)
- Cyber Patrol (8/5)
- Integration Support
CT E2
Annually Package200 ASSETS (Domain, IP, Keyword)
TALK TO SALES
- All Features!
- 20 Users
- Threat DB API
- Take Down
- Ticket Support (24/7)
- Cyber Patrol (24/7)
- Integration Support
- Full API Sharing
CT E3
Annually Package500 ASSETS (Domain, IP, Keyword)
TALK TO SALES
- All Features!
- Unlimited Users
- Threat DB API
- Take Down
- Ticket Support (24/7)
- Cyber Patrol (24/7)
- Integration Support
- Full API Sharing
- VIP Intelligence
Experience
Quick Support
Best Solutions
Cost Effective
+
Projects
Many of our customers choose us again!
+
Happy Customers
To succeed, every software solution must be deeply integrated into the existing tech environment.
FAQ
What is licensing based on?
The package license/price is basically determined by the number of digital assets and support/management content.
What is the asset?
Identifies digital assets of the type of domain name, subdomain, keyword, IP address or URL.
Industries?
- Financial Services
- Retail & E-Commerce
- Government
- Defense Industry
- Telecommunication
- Critical Infrastructures
- Law Enforcement
- Public Institutions
- Universities
- Healthcare
Insurance
Energy
Is there a comparison chart with other products?
Sure! Here is Cyberthint vs. Competitor
How does Cyberthint respond to government or law enforcement requests for data?
Cyberthint does not share any personal data or logged information with any other company, organization, or individuals except as required in the following situations:
- Satisfy a valid law enforcement request, or as required by law
- Enforce applicable Terms of Service, Terms of Use, or other contractual obligations
- In case of emergency, to protect the property, safety, security, and rights of Cyberthint, its users, or the general public
- Also, any request that is received is extensively reviewed to ensure compliance with all applicable laws, and it is Cyberthint’s policy to respond as narrowly as possible to best protect our customers’ privacy.
What customer information does Cyberthint store?
Beyond customer financial information that is securely kept for billing purposes, and user passwords to allow access to the service, Cyberthint stores the following customer data:
- Saved Queries
- User-Generated Analyst Comments
- Alerts
- Reports
Cyberthint encrypts and stores this data securely. Cyberthint logs certain user actions. Logs that contain user-provided query data are automatically deleted after 14 days, and all other customer data is deleted after a subscription is terminated. Moreover, as stated above, Cyberthint has an entire infrastructure in place to ensure that this data cannot be accessed by any unauthorized party.
Does Cyberthint encrypt customer data?
To ensure the security of customer data throughout its lifecycle, Cyberthint encrypts information both at rest and when it is in motion.
Data is stored with Advanced Encryption Standard (AES) 256-bit encryption when at rest.
How does Cyberthint keep my data secure?
Cyberthint uses a combination of encryption, highly trained staff, and technical safeguards to protect our customers’ data.
Cyberthint’s information security program includes measures such as:
- Encrypted and hashed passwords
- Active DDoS mitigation
- Automated account lockouts
- Extensive facility access controls
- Multi-factor authentication
- Comprehensive threat intelligence program
- Automated security scans of our systems
- Active penetration testing
- Extensive internal security awareness program and training for employees
- Cyberthint has a dedicated product security team that scours our service for potential vulnerabilities, and helps our engineers ship secure code. Our team uses Cyberthint to automatically collect and analyze data from open, technical, and dark web sources to provide the latest information on direct and emerging threats that may impact our company.