Our mission is simple and so is our pricing.

Risk scores show which assets, accounts and tenants are at risk.
Attack paths highlight realistic ways attackers might access data.
Set thresholds for annoying people based on any finding property.
Filter and sort issues based on whatever matter to you, or the auditor.

We are providing a range vs. a singular price as every cloud environment is unique. Please get in touch to discuss the specifics.
One size fits all, no “tiers” of access
| Pleri | Coverage | What exactly does it do | Included |
|---|---|---|---|
| Cloud security | Pleri doesn't just find issues in code, they help fix them. | ||
| Cloud compliance | Pleri simplifies compliance fast, accurately, and without slowing the team down. | ||
| Vulnerability management | Pleri finds, prioritizes and remediating vulnerabilities across cloud and code. | ||
| AI Security | Pleri identifies security risks in the cloud and work to resolve them quickly, clearly, and with confidence. |
| AI Security | AI-Security | Secures AI-native applications end-to-end. From build to run so teams can ship AI features safely | AWS | |
| Industry term | What exactly does it do | Cloud covered | Included | |
|---|---|---|---|---|
| Risk engine | Identifies critical risks, validated by Plerion inside and out. | AWS | ||
| Attack path | Highlights toxic risk combinations in your cloud. | AWS & Azure | ||
| Misconfiguration management | Cloud Security Posture Management (CSPM) | Detects and fixes cloud misconfigurations. | AWS, Azure, GCP | |
| Vulnerability management | Cloud Workload Protection Platform (CWPP) | Reduces detection and response time with enriched security data. | AWS, Azure | |
| Permissions/Identity | Cloud Infrastructure Entitlement Management (CIEM) | Enforces least privilege and zero trust while balancing security. | AWS, Azure | |
| Kubernetes CSPM | Kubernetes Security Posture Management (KSPM) | Secures Kubernetes clusters, applications, and configurations. | AWS, Azure, GCP | |
| Cloud asset inventory | Continuously discover and track cloud assets | AWS, Azure, GCP | ||
| Data security | Data Security Posture Management (DSPM) | Identifies, classifies, and protects sensitive data. | AWS | |
| Breach detection | Cloud Detection and Response (CDR) | Monitors for malicious activity and anomalies in your cloud. | AWS | |
| Cloud compliance | Ensures compliance with 50+ industry frameworks | AWS, Azure, GCP | ||
| View your software packages | Software Bill of Materials (SBOM) | Lists deployed software and dependencies, flagging vulnerabilities. | AWS, Azure, GCP |
| Coverage | What exactly does it do | Included | |
|---|---|---|---|
| Inbound & Outbound integrations | ServiceNow, Pagerduty, Slack, Teams, JIRA, JIRA security, AWS Security Hub, Webhook & Email | Connects with tools like Slack, JIRA, and AWS Security Hub. | |
| Cloud native services | All you have turned on | Uses cloud-native services to enhance security alerts. | |
| Extensive reporting | All | Provides in-depth security reports. | |
| Cloud compliance builder | All | Builds cloud security baselines based on business needs. | |
| Low code workflow builder | All | Allows filtering and customization of security data. | |
| APIs | All | Offers programmatic access to all security findings. | |
| Profile builder | All | Enables cloud security baselines tailored to your environment. | |
| White-glove customer support | All customers | Access expert help via email, Slack, and dedicated support |
| Coverage | What exactly does it do | Included | |
|---|---|---|---|
| All of the above | All of the above | All of the above | |
| Multi-tenant architecture | All you have turned on | Supports multi-tenant management in a unified UI | |
| Dedicated partner pricing | Contact us | Contact us |