Sysdig Pricing

Prices Tailored to Your Needs

Browse products that make the most sense for your organization at any scale, and then contact us to get started today.

All of our plans include:

  • Scale to thousands of nodes
  • Notification Channels
  • RBAC support

Sysdig Secure

Cloud, container, and Kubernetes security that closes the loop from source to run.

Container &
Kubernetes
Security

Manage vulnerabilities, detect and respond to threats and validate compliance for containers, hosts and Kubernetes.

Host - based Licensing

Workflows
  • Infrastructure as Code Security
  • Container and Host Scanning
  • Runtime security (based on Falco)
  • Kubernetes and container compliance
  • Kubernetes network security
  • Incident response & forensics
  • Cloud detection & response
Features
  • Prioritized ToDo list
  • Risk based visualizations
  • CI/CD pipeline and registry integrations
  • Continuous vulnerability monitoring at runtime
  • OOB scanning and runtime policies
  • CIS benchmarks (AWS, K8s, Docker, Linux)
  • Compliance policies (PCI, NIST 800-53, SOC2, etc)
Serverless Security

Manage vulnerabilities, detect and respond to threats and validate compliance for Container-as-a-Service Platforms.

task - based Licensing

Workflows
  • Container Scanning for Fargate, Google Cloud Run
  • Runtime security (based on Falco)
  • Container compliance
  • Incident Response & Forensics
Features
  • OOB scanning policies
  • OOB runtime policies (FIM, cryptomining, MITRE ATT&CK, etc)
  • Behavior-based detection (user, process, file, network)
  • CaaS runtime security (AWS Fargate, Google Cloud Run)
  • SIEM integrations
  • Forensics capture
Cloud Security

Manage cloud configuration risk and detect threats across AWS, GCP and Azure.

per compute resources - based Licensing

Workflows
  • Cloud Security Posture Management
  • Cloud threat detection
  • Cloud and container compliance
  • Cloud Infrastructure Entitlements Management
  • Cloud Registry scanning
Features
  • Prioritized ToDo list
  • Risk based visualizations
  • CIS benchmarks (AWS, Azure, GCP, K8s, Docker, Linux) and Compliance policies (PCI, NIST 800-53, SOC2, etc)
  • SIEM integrations
  • OOB scanning policies
  • OOB cloud threat detection policies (MITRE ATT&CK, AWS, Azure, GCP)
  • Anomalous cloud and K8s activity detection

Sysdig Monitor

Kubernetes and cloud monitoring with a managed Prometheus service.

Cloud Native Monitoring

Monitoring for containers, Kubernetes, Prometheus, and cloud services.

Host - based Licensing

Time Series - based Licensing

Workflows
  • Kubernetes and container monitoring
  • Prometheus monitoring
  • Advanced system troubleshooting
  • Cost optimization
  • Cloud service monitoring
Features
  • Faster troubleshooting with a prioritized list of issues, pod details, live logs, and remediation steps.
  • Managed Prometheus service with long term storage, and automatic service detection.
  • Built-in cost data and utilization metrics with estimated cost savings analysis
  • Pre-built dashboards and alerts for Kubernetes, applications, and cloud services
  • Full support for PromQL and Prometheus recording rules to maintain industry standards
  • Detailed system call captures and per-process metrics for root cause analysis
  • Affordable custom metrics collection with visibility into who is generating them

Service and Support

We have your back, from deployment onward to ensure you’re achieving the outcomes that matter most to you.

Sysdig proved to us very early on that it was willing to work alongside us to support us, give us materials so we can continue to learn on our own, share insights through webinars, and help ensure we get the most out of the Sysdig platform, as well as help us meet all of our ongoing challenges.
Security Architect at Beekeeper
Looking for extra support?

Our DevOps and security experts offer deep product expertise and best practice guidance.

Secure. Scalable. Reliable.

Visit Trust Center
Take the Next Step!

Get a demo from one of our experts!