We use cookies to ensure you get the best experience. See our platform Terms and Privacy Policy.
We offer innovative consolidated architecture + flexible plans to help you get maximum operational efficiency and unmatched ROI.
SOCRadar offers three different subscription plans (Standard, Professional, or Enterprise) that will fit your digital risk and threat monitoring requirements. The available features (or the nature of features) vary in each plan for different product types. Below, compare subscription plans for any product.
Feature | Standard | Professional | Enterprise |
---|---|---|---|
Platform access | 1 user | 3 users | Unlimited |
On-time email alerting | ✅ | ✅ | ✅ |
2FA login support | ✅ | ✅ | ✅ |
IP restriction for portal access
(White listing) |
✅ | ✅ | ✅ |
Incident response playbook | ✅ | ✅ | ✅ |
Platform support | 8/5 via platform, no SLA | 8/5 via platform and email | 7/24 via platform, email, and phone |
SOCRadar user training | Video material | On-demand | On-demand |
Role-based alert receiving support | ✅ | ✅ | |
Incident API integration | ✅ | ✅ | |
Regional multilingual threat research
(Chinese, Russian, Arabic, etc.) |
✅ | ✅ | |
False positive elimination support | ✅ | ✅ | |
Dedicated analyst support | ✅ | ||
Monthly customer success support
(On-demand) |
✅ | ||
Certified threat intelligence analyst training
(On-demand) |
✅ | ||
SOCRadar integration
(Firewall, EDR, SOAR, SIEM) support (On-demand) |
✅ | ||
Scheduled automated reporting | ✅ |
Feature | Standard | Professional | Enterprise |
---|---|---|---|
Threat investigation | 10 queries/month | 100 queries/month | 1500 queries/month |
Historical threat intelligence data | ✅ | ✅ | ✅ |
Threat analysis | 1 upload/month | 2 uploads/month | 10 uploads/month |
Vulnerability tracking | ✅ | ✅ | ✅ |
CyberSec news and subscription | ✅ | ✅ | ✅ |
Local Threatshare | ✅ | ✅ | ✅ |
Deep web and darknet news | ✅ | ✅ | ✅ |
Knowledge Reports page access | ✅ | ✅ | ✅ |
Threat feeds / IOCs portal access | ✅ | ✅ | |
Threat actor monitoring & reporting | ✅ | ✅ | |
SIEM/Firewall/IPS/EDR/SOAR integration | Basic integration
(CSV support) |
STIX & TAXII support | |
Full API integration support | ✅ | ||
Threat actors / APT groups feed | ✅ |
Feature | Standard | Professional | Enterprise |
---|---|---|---|
Breached employee credentials and PII detection | Credentials only | Credentials only | Credentials
+ PII detection |
Breached customer credentials detection | ✅ | ✅ | ✅ |
Breached VIP credentials detection | ✅ | ✅ | ✅ |
Phishing domain detection | Domain detection | Domain detection | Real-time domain and subdomain detection
+ Takedown (3 credits) |
Phishing domain tracking | ✅ | ✅ | ✅ |
Code repository monitoring | Only company repository | Leakeage monitoring | Leakeage monitoring |
Social media monitoring | Twitter only
(Up to 5 keywords) |
✅ | ✅ |
Bad reputation detection | ✅ | ✅ | ✅ |
Darknet / Deep web monitoring | Paste sites only | Darknet / Deep web monitoring | Darknet / Deep web monitoring
+ 500 Credits |
Breached credit card detection | ✅ | ✅ | |
Google dorks monitoring | ✅ | ✅ | |
S3 bucket leak detection | ✅ | ✅ | |
Trello leak detection | ✅ | ✅ | |
Impersonating social media account detection | Instagram/YouTube/Twitter | Instagram/YouTube/Twitter
+ (On-demand) |
|
Rogue/fake mobile application detection | ✅ | ✅ | |
Bug bounty sites monitoring | ✅ | ✅ | |
VirusTotal monitoring | ✅ | ✅ | |
Hybrid analysis monitoring | ✅ | ✅ | |
Hacker channels monitoring | Discord/Telegram/IRC/ICQ |
Feature | Standard | Professional | Enterprise |
---|---|---|---|
Digital asset* discovery and monitoring | Monthly | Weekly | Daily |
Critical open port discovery | ✅ | ✅ | ✅ |
Expired/Vulnerable SSL certificate discovery | ✅ | ✅ | ✅ |
SSL grading/rating | ✅ | ✅ | ✅ |
DNS zone transfer detection | ✅ | ✅ | ✅ |
Mail server monitoring
(DMARC, SPF, reputation) |
✅ | ✅ | ✅ |
Mail server open relay detection | ✅ | ✅ | ✅ |
External (Internet-facing) service vulnerability detection | ✅ | ✅ | |
Cloud service vulnerability detection | ✅ | ✅ | |
Network perimeter device vulnerability detection | ✅ | ✅ | |
3rd party library vulnerability detection | ✅ | ✅ | |
CMS vulnerability detection | ✅ | ✅ | |
VIP / C-level personal and corporate email discovery | ✅ | ||
Active scan support | ✅ | ||
Vulnerability validation
(Analyst support) |
✅ |
* Digital assets include domains, subdomains, related domains, SSL certificates, websites, IP addresses, ports, DNS records, technologies, mobile apps, social accounts, perimeter devices, appliances, cloud services, websites, and login pages.
Based on my experience for over 20 year, we got what we needed to move forward in terms of improving our security posture and reducing our dynamic attack surface.
It is a perfect solution for all-in-one threat intelligence and digital risk protection. We've seen that we can automate many routine SOC analyst tasks with SOCRadar while getting relevant, false-positive free alerts.
It's a great tool to monitor all potential risks to our cyber security infrastructure ranging from ransomware to credential stuffing attacks. It monitors almost every blind spot which may turn into data breaches and provide us with contextualized intelligence.