Subscription Plans

We offer innovative consolidated architecture + flexible plans to help you get maximum operational efficiency and unmatched ROI.

SOCRadar offers four different subscription plans (Standard, Professional, Enterprise, and Premium) that will fit your digital risk and threat monitoring requirements. The available features (or the nature of features) vary in each plan for different product types. Below, compare subscription plans for any product.

Take your SOCRadar XTI experience to the next level with the Premium Plan.

More users, credits, resources, and intelligence.

Feature Standard Professional Enterprise Premium
Platform access 1 user 3 users 20 users Talk to sales
On-time email alerting
2FA login support
IP restriction for portal access
(White listing)
Platform support 8/17 UTC via platform 8/17 UTC via platform and email 7/24 via platform, email, and phone
SOCRadar user training Video material Video material On-demand
Role-based notification management
Customer success support
Quarterly Every 2 months
Analyst support
(False-positive elimination)
Integration Incident integration Incident/Threat feeds & IOCs integration
Scheduled automated reporting
Certified threat intelligence analyst training
Dedicated analyst support
Asset optimization
New release feature training
Feature Standard Professional Enterprise Premium
Threat investigation
(Threat Hunting)
* queries/month ** queries/month ******* queries/month Talk to sales
Manual malware analysis * upload/month ** uploads/month ******* uploads/month
Cyber trends deck
Threat hunting rules
Historical threat intelligence data
Automated malware analysis
Vulnerability tracking
CyberSec news and subscription
Regional intelligence
Deep web and darknet news
Cyber threat report access
Threat actor monitoring & reporting
Threat feeds / IOCs portal access
Threat feeds / IOCs integration
(Endpoint security solutions, SIEM, etc.)
Basic integration
(CSV support)
Feature Standard Professional Enterprise
PII detection (Employee & customer credentials)
VIP protection Breach credential detection Breach credential detection Breach credential detection
Phishing domain detection and tracking Domain detection only
Integrated Takedown
(for phishing domains, rogue mobile apps, and Github accounts)
Requires Credit Purchase
Requires Credit Purchase
Social media monitoring Twitter only
(Up to 5 additional keywords)
Twitter only Twitter only
Critical information disclosure Only repo visibility monitoring
Reputation monitoring
Darknet / Deep web and hacker channel monitoring
(+ Darknet / Deep web credits)
Paste sites only Paste sites, hacker forums, IM platforms, etc. Paste sites, hacker forums, IM platforms, etc.
(+ Darknet / Deep web credits)
Fraud detection (Credit card detection)
+including IRC and telegram channels
Impersonating social media account detection Instagram/YouTube/Twitter Instagram/YouTube/Twitter
Facebook, Telegram
Rogue/fake mobile application detection
Code repository, public storage, and malware analysis platform monitoring
Suspicious content monitoring on surface web
Feature Standard Professional Enterprise Premium
Digital asset* discovery and monitoring Monthly Weekly Daily Talk to sales
Network vulnerability intelligence
SSL vulnerability intelligence
Third-party library vulnerability intelligence
Mobile application security check
Network security monitoring
Mail server security check Once a quarter Once a month
Website security check Once a quarter Once a month
DDoS protection check Once a quarter Once a month
SSL security monitoring
Vulnerability validation
(Analyst support)
Active vulnerability scan Once a month

* Digital assets include domains, subdomains, related domains, SSL certificates, websites, IP addresses, ports, DNS records, technologies, mobile apps, social accounts, perimeter devices, appliances, cloud services, websites, and login pages.

Trusted by the world’s leading organizations​