Silverfort Pricing

Based on number of users

Scroll sideways

Features

Silverfort Essential

Silverfort Pro

Silverfort Unified

Base Platform (includes ITDR + ISPM)

Included in all packages

Infrastructure

For all users

For all users

For all users

Identity Visibility & Auditing

For all users

For all users

For all users

Authentication logs across all human users, service accounts & IdPs

✓

✓

✓

Exporting authentication logs to SIEM

✓

✓

✓

Discovery of users, devices, and resources across all IdPs

✓

✓

✓

Identity security posture management (ISPM)

For all users

For all users

For all users

Legacy authentication protocols

✓

✓

✓

Password hygiene

✓

✓

✓

Vulnerable user accounts

✓

✓

✓

Domain configuration issues

✓

✓

✓

Vulnerable resources

✓

✓

✓

Identity Threat Detection & Response (ITDR)

For all users

For all users

For all users

Detection & Alerting

For all users

For all users

For all users

Known attack patterns

✓

✓

✓

ML-based anomaly detection

✓

✓

✓

External risk indicators

✓

✓

✓

Respond to threats with real-time access block

For all users

For all users

For all users

Integration with 3rd party SOAR response and mediation playbooks

✓

✓

✓

Reporting with executive risk assessment reports

✓

✓

✓

Universal MFA

Protect any resource with MFA

For a sample of users

For 10% users

For all users

AD authentications

✓

✓

✓

Desktop Logon

✓

✓

✓

Azure AD

✓

✓

✓

Okta

✓

✓

✓

PingFederate

✓

✓

✓

ADFS

✓

✓

✓

RADIUS

✓

✓

✓

Use any MFA type

For a sample of users

For 10% users

For all users

Supporting all leading MFA methods

✓

✓

✓

Supporting all leading MFA providers

✓

✓

✓

Silverfort MFA desktop and mobile app

✓

✓

✓

Phishing and MFA bombing protection​

✓

✓

✓

Cyber insurance compliance

For a sample of users

For 10% users

For alll users

Risk-based policies – respond to detected threats with step-up MFA verification

For a sample of users

For 10% users

For all users

Service Account Protection

Service account discovery

For a sample of users

For 10% users

For all users

Inventory of all service accounts

✓

✓

✓

Classifications to different types

✓

✓

✓

Identify service accounts that are also used manually by admins

✓

✓

✓

Discover privileges, interactive logins, broadly used accounts and more

✓

✓

✓

Service account monitoring

For a sample of users

For 10% users​

For all users

Map all sources and destinations for each service account

✓

✓

✓

Behavioral analysis of each service account’s unique activity patterns

✓

✓

✓

Service account protection

For a sample of users

For 10% users​

For all users

Block or alert when service accounts deviate from intended purpose

✓

✓

✓

Automated access policies, based on the service account normal behavior

✓

✓

✓

Policy automation and APIs, including ServiceNow integration

✓

✓

✓

Export info on all privileged service accounts for PAM onboarding

✓

✓

✓

Authentication Firewall

Apply identity segmentation rules to allow/deny access

For a sample of users

For 10% users

For all users

Block access of users over insecure protocols

✓

✓

✓

Prevent PAM bypass

✓

✓

✓

Risk-based policies – block access in real time

✓

✓

✓

Schedule a Meeting With Our Team