Billing | Free | Premium | Enterprise | Ultimate | Scalability | |
Base price | | - | 375 USD/month | 1,000 USD/month | 2,667 USD/month | - |
Available period | | - | 3 months, 6 months, 1 year, 2 years, 3 years | 1 month, 3 months, 6 months, 1 year, 2 years, 3 years | | - |
Discount | | - | ≤ 6 months: No discount 1-year period: 15% off 2-year period: 30% off 3-year period: 50% off | | | - |
Asset and risk management | Solid Protection | Yes | Yes | Yes | Yes | - |
| Asset management | Yes | Yes | Yes | Yes | - |
| Asset health checks | 20 | 400 | 1,200 | 4,800 | 250 USD/300 checks/month |
| Health check tasks | 1 | 10 | 20 | 50 (can be set as unlimited) | - |
| Port scan | Yes | Yes | Yes | Yes | - |
| Emergency vulnerability scan | Yes | Yes | Yes | Yes | - |
| In-depth vulnerability scan | - | Yes | Yes | Yes | - |
| Weak password scan | - | Yes | Yes | Yes | - |
| Check of cloud resource configurations | - | Yes | Yes | Yes | - |
| Content scan (website content risk) | - | - | Yes | Yes | - |
Attack and alert handling | Log analysis | - | 1,000 GB/month | 3,000 GB/month | 10,000 GB/month | 104 USD/1,000 GB/month |
| Alert connection | Yes | Yes | Yes | Yes | - |
| Alert aggregation, event investigation, and correlation analysis | - | Yes | Yes | Yes | - |
| Joint alert handling | - | - | Yes | Yes | - |
Security management | Security report | - | Health check report | Inspection interpretations | Security expert insight report | - |
| Log shipping (to CKafka) | - | - | - | Yes | - |
| Multi-account | - | - | - | Scalable | 625 USD/account/month, with no extra charge for more than 10 accounts. If a member account has purchased the Ultimate edition, the multi-account feature is free for it. |
Feature Category | Premium | Enterprise | Ultimate |
Number of cloud assets, such as public IPs, domain names, CVMs, CLB, databases, COS, Elasticsearch Service, and other assets. | 100 | 300 | 900 or more |
Organization accounts: Whether the Tencent Cloud Organization solution is available. | No | No | Yes |
Log audit: Whether to access security product logs for analysis and management. | No | Yes | Yes |
Security guarantee in critical periods: Whether network attack and defense drills are required. | No | Yes | Yes |
Was this page helpful?