Sysdig Secure Pricing

Prices Tailored to Your Needs
Browse products that make the most sense for your organization at any scale, and then contact us to get started today.
All of our plans include:
- Scale to thousands of nodes
- Notification Channels
- RBAC support
Sysdig Secure
In the cloud, every second counts. We’re the industry’s only cloud security platform that delivers the breadth of coverage and depth of insights required to protect your cloud environments. Secure every second with Sysdig.
Comprehensive security solution for containers, Kubernetes, hosts, and serverless. Manage vulnerabilities, detect and respond to threats, and validate compliance.
Containers/Kubernetes/Hosts: Host-based licensing
Serverless: Task-based licensing
Vulnerability Management
- Container and host scanning
- In-use vulnerability prioritization
- CI/CD pipeline and registry integrations
- Continuous vulnerability monitoring at runtime
Detection and Response
- Threat detection for containers/Kubernetes, hosts, and serverless (AWS Fargate, Google Cloud Run)
- Out-of-the-box runtime policies (cryptomining, drift control, MITRE ATT&CK, etc.)
- Incident response and forensics
Posture Management
- Kubernetes and host posture management
- Compliance
- Infrastructure as code security
Detect and respond to threats in real time across containers, Kubernetes, hosts, and cloud.
Containers/Kubernetes/Hosts: Host-based licensing
Serverless: Task-based licensing
Cloud: Per events processed licensing
Detection and Response
- Threat detection for containers/Kubernetes, hosts, and serverless (AWS Fargate, Google Cloud Run)
- Cloud log-based detection (AWS, GCP, Azure)
- Identity detections (Okta)
- Supply chain detections (Github)
- Out-of-the-box runtime policies
- Incident response and forensics
Prioritize the most significant cloud risks. Combine context from runtime insights in real-time posture-drift detections and in-use permissions with static checks that flag misconfigurations and known vulnerabilities.
Per compute resources-based licensing
Posture and Permissions Management
- Cloud security posture management
- Cloud infrastructure entitlements management
- Cloud compliance
- Cloud Attack Graph (attack paths, risk prioritization)
- Live asset inventory
Detection and Response
- Cloud log-based detection (AWS, GCP, Azure), including Okta/Github detection
- Out-of-the-box cloud threat detection policies
Vulnerability Management
- Cloud vulnerability management (agentless)
Service and Support
We have your back, from deployment onward to ensure you’re achieving the outcomes that matter most to you.
Level-3 Technical Expertise
Email and Case Portal
Self-Service and Knowledge Base
Critical Incident Response in Hours
Simplified Service Offering
Secure. Scalable. Reliable.
Visit Trust CenterTake the Next Step!
See how you can secure every second in the cloud.