Our mission is simple and so is our pricing.
Risk scores show which assets, accounts and tenants are at risk.
Attack paths highlight realistic ways attackers might access data.
Set thresholds for annoying people based on any finding property.
Filter and sort issues based on whatever matter to you, or the auditor.
Get an instant estimate of your Plerion monthly bill based on your AWS & Azure cloud spend.
Just drag the slider below to see your price
We are providing a range vs. a singular price as every cloud environment is unique. Please get in touch to discuss the specifics.
One size fits all, no “tiers” of access
Industry term | What exactly does it do | Cloud covered | Included | |
---|---|---|---|---|
Risk engine | Identifies critical risks, validated by Plerion inside and out. | AWS | ||
Attack path | Highlights toxic risk combinations in your cloud. | AWS | ||
Misconfiguration management | Cloud Security Posture Management (CSPM) | Detects and fixes cloud misconfigurations. | AWS, Azure, GCP | |
Vulnerability management | Cloud Workload Protection Platform (CWPP) | Reduces detection and response time with enriched security data. | AWS, Azure | |
Permissions/Identity | Cloud Infrastructure Entitlement Management (CIEM) | Enforces least privilege and zero trust while balancing security. | AWS, Azure | |
Kubernetes | Kubernetes Security Posture Management (KSPM) | Secures Kubernetes clusters, applications, and configurations. | AWS, Azure, GCP | |
Cloud asset inventory | Continuously discover and track cloud assets | AWS, Azure, GCP | ||
Data security | Data Security Posture Management (DSPM) | Identifies, classifies, and protects sensitive data. | AWS | |
Breach detection | Cloud Detection and Response (CDR) | Monitors for malicious activity and anomalies in your cloud. | AWS | |
Infrastructure as code scanning | Shift Left | Provides full visibility from code to cloud. | AWS, Azure, GCP | |
View your software packages | Software Bill of Materials (SBOM) | Lists deployed software and dependencies, flagging vulnerabilities. | AWS, Azure, GCP | |
Cloud Compliance | Ensures compliance with 35+ industry frameworks | AWS, Azure, GCP | ||
Awseye threat intelligency APIs (Coming soon) | Threat intelligence | Coming soon - Open-source intelligence (OSINT) and reconnaissance service that analyzes publicly accessible data for AWS identifiers. | Coming soon |
Coverage | What exactly does it do | Included | |
---|---|---|---|
AI remediation | Configuration, Identity & entitlements | Uses generative AI to analyze, respond to, and recommend remediation of security issues across your cloud environment. | |
AI Search | Coming soon | Enables natural language queries for security insights. | |
PleriAI - your cloud security chief of staff | Coming soon | AI-driven security automation and insights. |
Coverage | What exactly does it do | Included | |
---|---|---|---|
Inbound & Outbound integrations | ServiceNow, Pagerduty, Slack, Teams, JIRA, JIRA security, AWS Security Hub, Webhook & Email | Connects with tools like Slack, JIRA, and AWS Security Hub. | |
Cloud native services | All you have turned on | Uses cloud-native services to enhance security alerts. | |
Extensive reporting | All | Provides in-depth security reports. | |
Cloud compliance builder | All | Builds cloud security baselines based on business needs. | |
Low code workflow builder | All | Allows filtering and customization of security data. | |
APIs | All | Offers programmatic access to all security findings. | |
Profile builder | All | Enables cloud security baselines tailored to your environment. | |
White-glove customer support | All customers | Access expert help via email, Slack, and dedicated support |
Coverage | What exactly does it do | Included | |
---|---|---|---|
All of the above | All of the above | All of the above | |
Multi-tenant architecture | All you have turned on | Supports multi-tenant management in a unified UI | |
Dedicated partner pricing | Contact us | Contact us |