Flexible pricing that scales with your business
cyberelements’ pricing scales with your company.
Chat with our friendly team to find a solution that works for you.
Save 25% with our 36 month plans
Regular Access
32$
degressive pricing on volume
unlimited resources / applications / devices
min. 5 users
-
Zero Trust Network Access Architecture (ZTNA)*
-
Access policies based on user’s identity and context
-
Multi-Factor Authentication for users and administrators’ access**
-
Password vault for authentication secrets, automatic rotation, SSO through password injection
-
Just-in-Time access with workflows management
-
6 Edge Gateways to connect your sites & LANs onPrem
-
Priority Technical Support 24/7
Critical Access
100$
degressive pricing on volume
unlimited resources / applications / devices
min. 2 users
Everything on Regular plan
+
-
Complete traceability & session recording
-
Session surveillance and automatic intervention with alert
-
Risk index based on inactivity time in a session
-
Actions detection through the quick search feature. Multiple search criteria & possibilities for detailed forensic analysis
-
Use your organization’s tools with complete traceability
-
Credential management in automated processes (DevOps), App-to-App Password Management (AAPM)
Regular Access
44$
degressive pricing on volume
unlimited resources / applications / devices
min. 5 users
-
Zero Trust Network Access Architecture (ZTNA)*
-
Access policies based on user’s identity and context
-
Multi-Factor Authentication for users and administrators’ access**
-
Password vault for authentication secrets, automatic rotation, SSO through password injection
-
Just-in-Time access with workflows management
-
6 Edge Gateways to connect your sites & LANs onPrem
-
Priority Technical Support 24/7
Critical Access
137$
degressive pricing on volume
unlimited resources / applications / devices
min. 2 users
Everything on Regular plan
+
-
Complete traceability & session recording
-
Session surveillance and automatic intervention with alert
-
Risk index based on inactivity time in a session
-
Actions detection through the quick search feature. Multiple search criteria & possibilities for detailed forensic analysis
-
Use your organization’s tools with complete traceability
-
Credential management in automated processes (DevOps), App-to-App Password Management (AAPM)
*A Zero Trust architecture includes: a double barrier architecture, protocol break with only outgoing traffic flow without any network port opening, end-to-end encrypted tunnels. No internet exposure of applications/resources, connection to the resources is established only at the time of use, security control of devices.
**Internal mechanisms within cyberelements or integration of third-party mechanisms (TOTP, FIDO2, etc.)
On-Demand Options
Flex
Go temporary beyond the initial number of users.
Pay per use
Edge Gateway(s)
6 edge gateways are included by default.
You can add more gateways with an extra fee
Frequently Asked Questions
It's always hard to choose new solutions and platforms We're here to help you make the right decision