Skip to content

Our Packages

Minimum order per year: $12K

Discover

Starting at

$3

/ per month Billed annually

Starting at

$5

/ per month Billed annually

This package includes:

Complete Visibility:

Full asset inventory across hybrid Cloud, Kubernetes, and Endpoints.

Easy Onboarding:

Seamless cloud and Kubernetes deployment setup.

Unified Management:

Manage users, policies, and roles from one platform.

Tool Integrations:

Connect with popular security tools.

Visual Mapping:

Understand relationships across all layers (process, network, IAM, application).

Audit

Starting at

$6

/ per month Billed annually

Starting at

$10

/ per month Billed annually

This package includes everything from Discover plus:

Security Risk Assessments:

Deep security posture evaluation for hybrid cloud and containers.

Compliance and Vulnerability scanning:

Continuous, real-time environment monitoring.

Exposure Management and Attack paths:

Identify and resolve attack paths due to exposure.

Alerting and Reporting:

Prioritized alerts for critical issues and configurable reporting.

Historical Analysis:

Track threats and compliance over time.

Secure

This package includes everything from Audit plus:

Runtime Protection:

Safeguard cloud workloads in real time.

Cloud Detection & Response:

Protect applications with advanced threat detection.

Anomaly Detection:

Spot and stop threats with anomaly-based detection.

Threat Intelligence:

Leverage intelligence for better decisions.

Incidence Response:

Real-time investigations and forensics.

File Monitoring:

Monitor and alert on unauthorized file changes.

Threat Remediation:

Quickly resolve threats to maintain security.

Support Plans

From basic plans to bespoke offerings, Uptycs offers the right level of support for any organization.

Compare Cloud Security Packages & Features

Capabilities
Uptycs Hybrid Cloud Security - Discover
Uptycs Hybrid Cloud Security - Audit (GRC Operations)
Uptycs Hybrid Cloud Security - Secure (Threat Operations)
Real Time Unified Asset Inventory
black-tick
black-tick
black-tick
Software Asset Catalog
black-tick
black-tick
black-tick
Automated Asset Discovery and Visualization
black-tick
black-tick
black-tick
Asset Insights and Custom Search
black-tick
black-tick
black-tick
Integrations (SOAR, SIEM, Ticketing systems, Slack, JIRA etc)
black-tick
black-tick
black-tick
Users, Policies, & Roles Management (Enterprise RBAC and SSO)
black-tick
black-tick
black-tick
Compliance/Misconfigurations/Audit Rules
black-tick
black-tick
Historical Raw Telemetry Data Retention (7 days - default)
black-tick
black-tick
Alerting, Customizing Rules and Reporting
black-tick
black-tick
Attack Path Mapping, Exposure Management and Risk Prioritization
black-tick
black-tick
Cloud Identity Entitlements for Cloud and Kubernetes Infrastructure
black-tick
black-tick
Vulnerability Management of Hosts, VMs, Containers, Serverless (functions and containers)
black-tick
black-tick
Image Security - Development Pipeline scanning (Registries, CI/CD, Deployment)
black-tick
black-tick
Secrets Scanning
black-tick
black-tick
Malware Scanning
black-tick
black-tick
Serverless Security (e.g. Serverless Function scanning)
black-tick
black-tick
IaC Scanning
black-tick
black-tick
Posture Management for Okta, Github and AzureAD
black-tick
black-tick
Ask Uptycs - AI Based Search For Your Security Infrastructure
black-tick
black-tick
Compliance/Misconfiguration/Audit remediation
black-tick
black-tick
Destination Forwarding of Risk/Compliance/Vulnerabilities (e.g. Slack, JIRA, SIEM)
black-tick
black-tick
Threat Remediation and Blocking
black-tick
Policy Enforcement and Audit using OPA (cloud workloads/images/containers)
black-tick
File Integrity Monitoring
black-tick
Behavioral Threat Detection (MITRE ATT&CK framework)
black-tick
Anomaly Detection
black-tick
Threat Protection (Stop Ransomware, Cryptomining and More Such Attacks)
black-tick
Threat Hunting
black-tick
Threat Books and Threat Intelligence
black-tick
Detection as Code (Sigma Rules)
black-tick
Forensics and Incident Response (Memory and File Carving, Threat Investigation, Activity Monitoring)
black-tick

$1K Marketplace Challenge

Struggling with securing your AWS estate? Take the Marketplace Challenge to find a better way.

Learn More
$1K Marketplace Challenge

Pricing FAQ

What constitutes a Workload and how is it licensed?
What constitutes a Cloud Workload and how is it licensed?
How does Uptycs pricing compare to competitors?
Does Uptycs offer volume discounts or custom pricing?
Are there additional fees for integrating Uptycs with other security tools?
How does Uptycs handle multi-cloud environments?

Trusted by

Group (1) 1-1
Frame 65-1
Frame 62943 1-1
Vector (2)-1 1-1
Shein_Logo_2017 1-1
Group 61952-1
Group 61738 1-1

See Uptycs in action

Find and remove critical risks in your modern attack surface - cloud, containers, and endpoints - all from a single UI and data model. Let our team of experts show you how.

Request a Live Demo