Scalable DevSecOps Solutions For All Teams

Free
1 developer
10 projects, 200 scans
Engine Available
SCA
Software Bill of Material
Vulnerability Info (Limited)
Reporting
CI/CD pipeline integrations
Cloud based integrations
Cloud based deployments
Basic
20 developers
100 projects, unlimited scans
Engines Available
SCA
SAST
IaC
Software Bill of Material
Vulnerability Info (Limited)
Reporting
CI/CD pipeline integrations
Cloud based integrations
Cloud based deployments
Premium
Unlimited developers
Unlimited projects, unlimited scans
Engines Available
SCA
SAST
IaC
Binary Scans (Limited)
Extended Vulnerability Info
Event or time based triggered scans
Scan for security warnings and bugs
Compliance Management and Rules
Organization Management
Jira, Slack & Rocket Chat integrations
Email support
Enterprise
Min 20 Developers
Unlimited number of projects and scans
Engines Available
SCA
SAST
IaC
Code Snippet
Fuzzing
Extended binary scans
Admin Service Accounts
Code patch
API Access
Single Sign-on
Cloud and on-site deployments
Beta version available
Dedicated Account Manager
Custom SLA & Legal terms

Compare Plans

Unlock value: Compare pricing plans for your organisations' needs

Essentials
Free
Basic
Premium
Enterprise
Number of User Limit
1
20
Unlimited
Unlimited
Number of Project Limit
10
100
Unlimited
Unlimited
Upload Project File Size Limit
Up to 10MB
Up to 100MB
Up to 1GB
Up to 100GB
Scan Retention (Days)
7
60
90
180
Dashboard
Project Management
Notification & Emails
Vulnerability Priority Scoring
Integration with Cloud Source Code Management (e.g. GitHub, GitLab)
Integration with Self-Hosted Source Code Management: GitHub Enterprise Server, GitLab Enterprise
Group Scans for Multiple Projects
Up to 10 projects
Group Consolidated Reports for Multiple Projects
Up to 10 projects
SCA
Free
Basic
Premium
Enterprise
Monthly Scan Limit
200
Unlimited
Unlimited
Unlimited
SCA for Source Code Scan
SCA for SBOM File Upload Scan
SCA for Binary Scan
Components & Dependency Tree
Vulnerability Analysis
Remediation + AI Assistant
Licenses Tracking
Compliance Policy Rules Monitoring
Scanned History & Comparison
Scanned Component Management for all Projects
Scanned Vulnerability Management for all Projects
Scanned Component & Vulnerability Management Export to CSV
Scanned Compliance Monitoring for all Projects
SCA Reports: PDF, CSV, XML, JSON, DOCX
SBOM Reports: CycloneDX, VEX, CSAF, SPDX, SWID
Scanned Components Result Action
Scanned Vulnerability Result Suppression
Schedule & Event Trigger Scan
SAST & IaC
Free
Basic
Premium
Enterprise
Monthly Scan Limit
Unlimited
Unlimited
Unlimited
Vulnerability, Bugs, Code Smell, Security Hotspot Detection
Issue Highlight in Code Snippets
PDF Report Generation
AI Assistant
Schedule & Event Trigger Scan
Code Snippet
Free
Basic
Premium
Enterprise
Code Clone Traceability Analysis
OSS Components Identification Including vVulnerability & License Tracking
Deep License & Copyright Extraction
License Conflict Analysis
Fuzzing
Free
Basic
Premium
Enterprise
Issue Detections
Crash Detections
Plugins & Integrations
Free
Basic
Premium
Enterprise
CI/CD Pipeline Integration: Jenkins, Bamboo, Circle CI, Travis, Github Action, GitLab
IDE Plugin
JIRA Integration
SSO (LDAP, OIDC, KeyCloak)
Knowledge Base & Data Management
Free
Basic
Premium
Enterprise
SBOM Enquiry
Self Components Managements
Vulnerability Enquiry
Self Vulnerability Managements
Data Center Statistics
Data Patch Export/Import
Management & Setting
Free
Basic
Premium
Enterprise
Member & Teams
Project Tags
Integrations
Access Tokens
Policy Rules Customization
Roles and Privileges Customization
Support & Services
Free
Basic
Premium
Enterprise
Customer Support
Dedicated Account Manager
Deployment
Cloud
Cloud
Cloud
Cloud or On Prem

Safeguard Your Source Code and Business

Join thousands of innovators, developers and security teams who trust Scantist to safeguard their software.

FAQs

Frequently Asked Questions (FAQ)

How does your application security platform work?

At Scantist, our advanced threat detection system employs a multi-layered approach to identify and neutralise potential security threats. We utilise a combination of machine learning algorithms, behavioural analysis, and signature-based detection to monitor your applications, libraries, and code repositories. Our system continuously scans for known vulnerabilities, suspicious patterns, and anomalous behavior, ensuring proactive threat mitigation and reducing the risk of cyberattacks.

What encryption standards do you use to protect our sensitive data?

We prioritise the security of your sensitive data and employ robust encryption standards. Scantist employs industry-leading encryption protocols, including TLS (Transport Layer Security), to secure data transmission between your systems and our platform. Additionally, all stored data is encrypted using strong encryption algorithms to prevent unauthorised access.

Can your identity and access management solutions integrate with our existing systems?

Yes, our identity and access management solutions are designed to seamlessly integrate with your existing systems. Scantist offers flexible integration options, including support for Single Sign-On (SSO) protocols such as SAML and OAuth. This enables you to centralise user authentication and access control, streamlining user management across your organization.

How can your security consulting services help us identify and mitigate potential risks?

Our security consulting services provide expert guidance to identify, assess, and mitigate potential security risks within your software development lifecycle. Our team of experienced professionals can perform thorough security assessments, code reviews, and architecture analysis to pinpoint vulnerabilities and recommend effective risk mitigation strategies. By leveraging our consulting services, you can enhance your overall security posture and ensure the integrity of your applications.

Do you offer 24/7 customer support in case of emergencies or security incidents?

Yes, we understand the importance of timely support, especially during emergencies and security incidents. Scantist offers customer support to address any urgent concerns you may have. Our dedicated support team is available to assist you in resolving issues, providing guidance, and ensuring a swift response to security incidents, helping you minimise potential impacts on your systems and operations.