Sysdig

Sysdig Secure Pricing

Prices Tailored to Your Needs

Browse products that make the most sense for your organization at any scale, and then contact us to get started today.

All of our plans include:

  • Scale to thousands of nodes
  • Notification Channels
  • RBAC support

Sysdig Secure

In the cloud, every second counts. We’re the industry’s only cloud security platform that delivers the breadth of coverage and depth of insights required to protect your cloud environments. Secure every second with Sysdig.

Workload Security

Comprehensive security solution for containers, Kubernetes, hosts, and serverless. Manage vulnerabilities, detect and respond to threats, and validate compliance.

Containers/Kubernetes/Hosts: Host-based licensing
 
Serverless: Task-based licensing

Request a Quote

Workflows

Vulnerability Management

  • Container and host scanning
  • In-use vulnerability prioritization
  • CI/CD pipeline and registry integrations
  • Continuous vulnerability monitoring at runtime

Detection and Response

  • Threat detection for containers/Kubernetes, hosts, and serverless (AWS Fargate, Google Cloud Run)
  • Out-of-the-box runtime policies (cryptomining, drift control, MITRE ATT&CK, etc.)
  • Incident response and forensics

Posture Management

  • Kubernetes and host posture management
  • Compliance
  • Infrastructure as code security
Detection and Response

Detect and respond to threats in real time across containers, Kubernetes, hosts, and cloud.

Containers/Kubernetes/Hosts: Host-based licensing
 
Serverless: Task-based licensing
 
Cloud: Per events processed licensing

Request a Quote

Workflows

Detection and Response

  • Threat detection for containers/Kubernetes, hosts, and serverless (AWS Fargate, Google Cloud Run)
  • Cloud log-based detection (AWS, GCP, Azure)
  • Identity detections (Okta)
  • Supply chain detections (Github)
  • Out-of-the-box runtime policies
  • Incident response and forensics
Cloud Security

Prioritize the most significant cloud risks. Combine context from runtime insights in real-time posture-drift detections and in-use permissions with static checks that flag misconfigurations and known vulnerabilities.

Per compute resources-based licensing

Request a Quote

Workflows

Posture and Permissions Management

  • Cloud security posture management
  • Cloud infrastructure entitlements management
  • Cloud compliance
  • Cloud Attack Graph (attack paths, risk prioritization)
  • Live asset inventory

Detection and Response

  • Cloud log-based detection (AWS, GCP, Azure), including Okta/Github detection
  • Out-of-the-box cloud threat detection policies

Vulnerability Management

  • Cloud vulnerability management (agentless)

Service and Support

We have your back, from deployment onward to ensure you’re achieving the outcomes that matter most to you.

Sysdig proved to us very early on that it was willing to work alongside us to support us, give us materials so we can continue to learn on our own, share insights through webinars, and help ensure we get the most out of the Sysdig platform, as well as help us meet all of our ongoing challenges.
Security Architect at Beekeeper
Looking for extra support?

Our DevOps and security experts offer deep product expertise and best practice guidance.

Secure. Scalable. Reliable.

Visit Trust Center

Take the Next Step!

See how you can secure every second in the cloud.