Any change to your digital infrastructure triggers new tests by our Artificial Hackers.
Know where your assets stand, including APIs, third-party services, and external services.
Make it easy for non-technical stakeholders to understand the importance of cybersecurity.
Follow the instructions given by Artificial Hackers to reproduce and fix the identified vulnerabilities.
Get custom pentests by hackers who worked with Shopify, Verizon, Steam, and more.
Artificial Hackers learn from each vulnerability, making them better at finding new ones.
The plans scale with the number of assets.
An asset includes but is not limited to, domains, subdomains, servers, IP addresses,
or web and mobile applications in your digital infrastructure.
Pay yearly and get 2 MONTHS FREE
Launch | Pro | Premium | Custom | |
---|---|---|---|---|
Product Functions | ||||
External Attack Surface Management | ||||
Machine Ethical Hacking | ||||
Human Ethical Hacking | ||||
Vulnerability Management | ||||
Risk Exposure | ||||
Machine Ethical Hacking | ||||
Nº of Assets | up to 25 | up to 100 | up to 100 | (+) 100 |
Automated Pentesting | ||||
Pause & Resume | ||||
Scheduling Test | soon | soon | soon | soon |
Continous Smart Reconnaissance | ||||
Dynamic Application Security Testing | ||||
Testing with Authentication | ||||
Proof of Vulnerability | ||||
Automated Triaging | ||||
Automated Retesting | ||||
Human Ethical Hacking | ||||
Bank of Hours | 120h/y | (+) 120h/y | ||
Manual Pentesting | ||||
On-Demand Testing | ||||
Team of Ethical Hackers | ||||
Custom Hacking Events | ||||
Direct Channel with Ethical Hackers | ||||
Dedicated Account Manager | ||||
Manual Triaging | ||||
Manual Retesting | up to 90 days | up to 180 days | ||
Reporting | ||||
Attack Surface Map | ||||
Risk Exposure Score | ||||
Executive Compliance Reports (PDF) | ||||
Technical Compliance Reports (PDF) | ||||
Custom Compliance Reports | ||||
Support |
||||
Real Time Security Alerts | 24/7 | 24/7 | 24/7 | 24/7 |
Online Chat | Discord | Email | 8/5d | 8/5d | 8/5d | 8/5d |
Phone | 8/5d | 8/5d | ||
Payment |
||||
Credit Card | ||||
Invoice | ||||
Collaboration & Integration |
||||
Nº of Users | 3 | 7 | unlimited | unlimited |
Roles | ||||
Jira | ||||
Slack | ||||
Splunk | ||||
Webhooks | ||||
Ethiack API | ||||
Custom CI/CD | ||||
Asset Type |
||||
Domains | ||||
Web Apps | ||||
APIs | ||||
Servers & IPs | ||||
Cloud | soon | soon | ||
Mobile Apps | ||||
Private Networks | ||||
Human Resources | ||||
IoT/ OT Devices | ||||
Other Physical | ||||
Security Tests |
||||
Network Attacks | ||||
Web Exploitation | ||||
Misconfigurations | ||||
Hacking in Breadth | ||||
Hacking in Depth | ||||
Exploit Research | ||||
Social Engineering | ||||
Red Team vs Blue Team | ||||
Physical Red Team |
Eligible companies will be able to benefit up to 80% off to protect their assets 24/7, all year round.
Co-founder & VP of Engineering at Smartex
"Thanks to Ethiack's autonomous hacking, Smartex is moving towards a continuous evaluation of our digital infrastructure. We can quickly identify and address vulnerabilities even with our fast frequency of development and deployment."
Partner & CTO at BaladAPP
"We continuously receive reports on vulnerabilities, including detailed guides on exploitation and mitigation. Learning how attacks happen allows us to develop products with greater security. We had a massive transfer of knowledge. I highly recommend it."
The smallest breaches can lead to the biggest attacks.
We’ll test your defenses 24/7 and fill you in on the vulnerabilities.
Start now and keep your infrastructure safe.