Silverfort Pricing

Based on number of users
Package Module
Silverfort Essential
Silverfort Pro
Silverfort Unified
Base Platform (includes ITDR + ISPM) Included in all packages
Infrastructure
Identity visibility & auditing
Authentication logs across all human users and service accounts and identity providers
Exporting authentication logs to SIEM
Discovery of users, devices, and resources across all identity providers
Identity security posture management (ISPM)
Legacy authentication protocols (NTLMv1, Cleartext LDAP, weak encryption, etc.)
Password hygiene (unchanged passwords, old passwords, etc.)
Vulnerable user accounts (shadow admins, stale users, admins with SPN, etc.)
Domain configuration issues (unconstrained delegation, non-admin DC owner, etc.)
Vulnerable resources (Log4Shell exposure, shared devices, etc.)
Identity Threat Detection & Response (ITDR)
Detection & Alerting
Known attack patterns (Brute force, Kerberoasting, etc.)
ML-based anomaly detection (Lateral movement, unauthorized access, etc.)
External risk indicators (SIEM, XDR, etc.)
Respond to threats with real-time access block
Integration with 3rd party SOAR response and mediation playbooks
Reporting with executive risk assessment reports
Universal MFA

For sample users

For 10% of the company size

For all users

Protect any resource with MFA
AD authentications (including legacy systems, command-line interfaces, on-prem infrastructure, etc.)
Desktop logon
Azure AD
Okta
PingFederate
ADFS
RADIUS
Use any MFA type
Supporting all leading MFA methods (mobile push, OTP, FIDO2, etc.)
Supporting all leading MFA providers (Azure MFA, Okta Verify, PingID, HYPR, Duo, Yubico, RSA SecureID, etc.)
Silverfort MFA desktop and mobile app (optional)
Phishing and MFA bombing protection
Cyber insurance compliance (includes report)
Risk-based policies – respond to detected threats with step-up MFA verification
Service Account Protection

For sample users

For 10% of the company size

For all users

Service account discovery
Inventory of all service accounts (name, group membership, attributes, behavior, etc.)
Classifications to different types (M2M, hybrid, scanners, etc.)
Identify service accounts that are also used manually by admins
Discover privileges, interactive logins, broadly used accounts and more
Service account monitoring
Map all sources and destinations for each service account
Behavioral analysis of each service account’s unique activity patterns
Service account protection
Block or alert when service accounts are used outside their intended purpose
Automated access policy suggestion, based on the service account normal behavior
Policy automation and APIs, including ServiceNow integration
Discover and export a list of all privileged service accounts’ sources, destinations and dependencies to simplify and accelerate their onboarding to the PAM (If needed)
Authentication Firewall

For sample users

For 10% of the company size

For all users

Apply identity segmentation rules to allow/deny access in different scenarios
Block access of users over insecure protocols (NTLMv1, etc.)
Prevent PAM bypass by ensuring that privileged users can only access resources through the PAM
Risk-based policies – respond to detected threats by blocking access in real time

Ask for Pricing