We use cookies to ensure you get the best experience. See our platform Terms and Privacy Policy.
We offer innovative consolidated architecture + flexible plans to help you get maximum operational efficiency and unmatched ROI.
SOCRadar offers four different subscription plans (Standard, Professional, Enterprise, and Premium) that will fit your digital risk and threat monitoring requirements. The available features (or the nature of features) vary in each plan for different product types. Below, compare subscription plans for any product.
Take your SOCRadar XTI experience to the next level with the Premium Plan.
More users, credits, resources, and intelligence.
Feature | Standard | Professional | Enterprise | Premium |
---|---|---|---|---|
Platform access | 1 user | 3 users | 20 users | Talk to sales |
On-time email alerting | ✅ | ✅ | ✅ | |
2FA login support | ✅ | ✅ | ✅ | |
IP restriction for portal access
(White listing) |
✅ | ✅ | ✅ | |
Platform support | 8/17 UTC via platform | 8/17 UTC via platform and email | 7/24 via platform, email, and phone | |
SOCRadar user training | Video material | Video material | On-demand | |
Role-based notification management | ✅ | ✅ | ||
Customer success support
(On-demand) |
Quarterly | Every 2 months | ||
Analyst support
(False-positive elimination) |
✅ | ✅ | ✅ | |
Integration | Incident integration | Incident/Threat feeds & IOCs integration | ||
Scheduled automated reporting | ✅ | |||
Certified threat intelligence analyst training
(On-demand) |
✅ | |||
Dedicated analyst support | ✅ | |||
Asset optimization
(On-demand) |
✅ | |||
New release feature training | ✅ |
Feature | Standard | Professional | Enterprise | Premium |
---|---|---|---|---|
Threat investigation
(Threat Hunting) |
* queries/month | ** queries/month | ******* queries/month | Talk to sales |
Manual malware analysis | * upload/month | ** uploads/month | ******* uploads/month | |
Cyber trends deck | ✅ | ✅ | ✅ | |
Threat hunting rules | ✅ | ✅ | ✅ | |
Historical threat intelligence data | ✅ | ✅ | ✅ | |
Automated malware analysis | ✅ | ✅ | ✅ | |
Vulnerability tracking | ✅ | ✅ | ✅ | |
CyberSec news and subscription | ✅ | ✅ | ✅ | |
Regional intelligence
(ThreatShare) |
✅ | ✅ | ✅ | |
Deep web and darknet news | ✅ | ✅ | ✅ | |
Cyber threat report access | ✅ | ✅ | ✅ | |
Threat actor monitoring & reporting | ✅ | ✅ | ||
Threat feeds / IOCs portal access | ✅ | ✅ | ||
Threat feeds / IOCs integration
(Endpoint security solutions, SIEM, etc.) |
Basic integration
(CSV support) |
API, MISP, STIX and TAXII, etc. |
Feature | Standard | Professional | Enterprise | |
---|---|---|---|---|
PII detection (Employee & customer credentials) | ✅ | ✅ | ✅ | |
VIP protection | Breach credential detection | Breach credential detection | Breach credential detection | |
Phishing domain detection and tracking | Domain detection only | ✅ | ✅ | |
Integrated Takedown
(for phishing domains, rogue mobile apps, and Github accounts) |
Requires Credit Purchase
On-demand |
Requires Credit Purchase
On-demand |
✅ | |
Social media monitoring | Twitter only
(Up to 5 additional keywords) |
Twitter only | Twitter only | |
Critical information disclosure | Only repo visibility monitoring | ✅ | ✅ | |
Reputation monitoring | ✅ | ✅ | ✅ | |
Darknet / Deep web and hacker channel monitoring
(+ Darknet / Deep web credits) |
Paste sites only | Paste sites, hacker forums, IM platforms, etc. | Paste sites, hacker forums, IM platforms, etc.
+ (+ Darknet / Deep web credits) |
|
Fraud detection (Credit card detection) | ✅ | ✅ +including IRC and telegram channels |
||
Impersonating social media account detection | Instagram/YouTube/Twitter | Instagram/YouTube/Twitter
+ Facebook, Telegram (On-demand) |
||
Rogue/fake mobile application detection | ✅ | ✅ | ||
Code repository, public storage, and malware analysis platform monitoring | ✅ | ✅ | ||
Suspicious content monitoring on surface web | ✅ | ✅ |
Feature | Standard | Professional | Enterprise | Premium |
---|---|---|---|---|
Digital asset* discovery and monitoring | Monthly | Weekly | Daily | Talk to sales |
Network vulnerability intelligence | ✅ | ✅ | ✅ | |
SSL vulnerability intelligence | ✅ | ✅ | ✅ | |
Third-party library vulnerability intelligence | ✅ | ✅ | ✅ | |
Mobile application security check | ✅ | ✅ | ✅ | |
Network security monitoring | ✅ | ✅ | ✅ | |
Mail server security check | Once a quarter | Once a month | ||
Website security check | Once a quarter | Once a month | ||
DDoS protection check | Once a quarter | Once a month | ||
SSL security monitoring | ✅ | |||
Vulnerability validation
(Analyst support) |
✅ | |||
Active vulnerability scan | Once a month |
* Digital assets include domains, subdomains, related domains, SSL certificates, websites, IP addresses, ports, DNS records, technologies, mobile apps, social accounts, perimeter devices, appliances, cloud services, websites, and login pages.
Based on my experience for over 20 year, we got what we needed to move forward in terms of improving our security posture and reducing our dynamic attack surface.
It is a perfect solution for all-in-one threat intelligence and digital risk protection. We've seen that we can automate many routine SOC analyst tasks with SOCRadar while getting relevant, false-positive free alerts.
It's a great tool to monitor all potential risks to our cyber security infrastructure ranging from ransomware to credential stuffing attacks. It monitors almost every blind spot which may turn into data breaches and provide us with contextualized intelligence.