Pricing

Choose the Right Plan to Secure Your Software Development

Set the number of users (up to):

Starter

For small teams looking to get started with security

$

150
per month / billed annually

Products

Professional

For growing teams with enhanced scale, security and standard support

$

390
per month / billed annually

All Starter product plus:

Enterprise

For at-scale organizations with advanced security and support needs

Custom

All Professional product plus:

Starter

For small teams looking to get started with security

$

280
per month / billed annually

Products

Professional

For growing teams with enhanced scale, security and standard support

$

760
per month / billed annually

All Starter product plus:

Enterprise

For at-scale organizations with advanced security and support needs

Custom

All Professional product plus:

Starter

For small teams looking to get started with security

$

390
per month / billed annually

Products

Professional

For growing teams with enhanced scale, security and standard support

$

1,110
per month / billed annually

All Starter product plus:

Enterprise

For at-scale organizations with advanced security and support needs

Custom

All Professional product plus:

Starter

For small teams looking to get started with securityneeds

$

Not Available for this user tier
 

Products

Professional

For growing teams with enhanced scale, security and standard support

$

1,440
per month / billed annually

All Starter product plus:

Enterprise

For at-scale organizations with advanced security and support needs

Custom

All Professional product plus:

Starter

For small teams looking to get started with security

$

Not Available for this user tier
 

Products

Professional

For growing teams with enhanced scale, security and standard support

$

1,750
per month / billed annually

All Starter product plus:

Enterprise

For at-scale organizations with advanced security and support needs

Custom

All Professional product plus:

Starter

For small teams looking to get started with security

$

Not Available for this user tier
 

Products

Professional

For growing teams with enhanced scale, security and standard support

$

Not Available for this user tier
 

All Starter product plus:

Enterprise

For at-scale organizations with advanced security and support needs.

Custom

All Professional product plus:

Professional

For growing teams with enhanced scale, security and standard support

All Starter product plus:

Enterprise

For at-scale organizations with advanced security and support needs

All Professional product plus:

Compare our plans

Professional
Enterprise

Secrets Security

Secrets Leakage Detection, blocking, and alerting
Source code, Infrastructure-as-Code, Docker images,...
Scan in Historical Information
Multi-SCM support (GitHub, Azure Repos, GitLab, Bitbucket)
Advanced Prioritization
Auto-revocation
Issue management with ticketing tracker integrations
Pre-Commit Hooks
Automated Continuous DevOps Security Scanning

Infrastructure As Code Security

Advanced Prioritization
Pipeline and issue tracker integrations
Remediation Guidance
Context-Driven Security Insights
Support for Terraform, CloudFormation: ARM and Bicep, Ansible
Pre-Commit Hooks
Support for Multi-Framework / AWS and Azure, Kubernetes and Docker.

Open Source Security

Open source vulnerability (Detection, blocking, and alerting)
Reachability
Exploitability
License and Obsolescence Management
Real-time Malware in OS Packages (Early Detection, alerting, and immediate dependency firewalling)
Advanced Prioritization
Auto-remediation
SBOM and VDR On-Demand Generation
Pipeline and issue tracker integrations
Containers support

SSCS (CI/CD Security & Compliance)

Advanced Prioritization
Pipeline and issue tracker integrations
Remediation Guidance
Context-Driven Security Insights
Pipeline vulnerabilities detection
CI/CD Infrastructure Misconfigurations Identification
Pre-Commit Hooks
SSC Compliance (CIS, OpenSSF, and more)

Anomalies Detection

Behavior-Based Risks Detection
Continuous Monitoring
Alert Anomalies in Real-Time
Block Code Tampering
Customizable anomaly rule sets

Application Security Posture Management (ASPM)

Complete Application Risk Management
Application Security Posture Management Dashboards
Full SDLC Assets visibility
Full Security Context from Code to Cloud
Advanced Correlation, Prioritization and Remediation
Third Party Tools Integration (SAST, SCA, Secrets, and others)
Context-Driven Security Insights
Advanced Security Audit Trails

Build Security

SLSA Provenance Generation
Build Attestation Generation
Build Integrity Verification
Artifact Signature Verification
Software Artifact Tampering Detection

Code Security

Malicious Code Detection in proprietary application code
Backdoors, spyware, trojans, ransomware and many other types of malware
Java, JS, TS, Python, PHP support
Dashboards
Trends
Customer User Roles
Policy Management
Projects Tags
SDLC Inventory
SDLC Asset Graph
DevOps Health Check
Policy Customization
SSO: SAML, OKTA
Rich API

Compare our plans

Professional
Enterprise
Secrets Leakage Detection, blocking, and alerting
Source code, Infrastructure-as-Code, Docker images,...
Scan in Historical Information
Multi-SCM support (GitHub, Azure Repos, GitLab, Bitbucket)
Advanced Prioritization
Auto-revocation
Issue management with ticketing tracker integrations
Pre-Commit Hooks
Automated Continuous DevOps Security Scanning
Advanced Prioritization
Pipeline and issue tracker integrations
Remediation Guidance
Context-Driven Security Insights
Support for Terraform, CloudFormation: ARM and Bicep, Ansible
Pre-Commit Hooks
Support for Multi-Framework / AWS and Azure, Kubernetes and Docker.
Open source vulnerability (Detection blocking, and alerting)
Reachability
Exploitability
License and Obsolescence Management
Real-time Malware in OS Packages (Early Detection, alerting, and immediate dependency firewalling)
Advanced Prioritization
Auto-remediation
SBOM and VDR On-Demand Generation
Pipeline and issue tracker integrations
Containers support
Advanced Prioritization
Pipeline and issue tracker integrations
Remediation Guidance
Context-Driven Security Insights
Pipeline vulnerabilities detection
CI/CD Infrastructure Misconfigurations Identification
Pre-Commit Hooks
SSC Compliance (CIS, OpenSSF, and more)
Behavior-Based Risks Detection
Continuous Monitoring
Full SDLC Assets visibility
Block Code Tampering
Customizable anomaly rule sets
Complete Application Risk Management
Application Security Posture Management Dashboards
Full SDLC Assets visibility
Full Security Context from Code to Cloud
Advanced Correlation, Prioritization and Remediation
Third Party Tools Integration (SAST, SCA, Secrets, and others)
Context-Driven Security Insights
Advanced Security Audit Trails
SLSA Provenance Generation
Build Attestation Generation
Build Integrity Verification
Artifact Signature Verification
Software Artifact Tampering Detection
Malicious Code Detection in proprietary application code
Backdoors, spyware, trojans, ransomware and many other types of malware
Java, JS, TS, Python, Php support
Dashboards
Trends
Customer User Roles
Policy Managenets
Projects Tags
SDLC Inventory
SDLC Asset Graph
DevOps Health Check
SSO: SAML, OKTA
Policy Customization
Rich API

FAQs

No. Xygeni doesn't upload your source code to scan it. The scan is executed locally into your network infrastructure and no code is uploaded to Xygeni servers. Only the results are uploaded (duly protected during transit and in storage)
In case you use the auto-remediation functionality Xygeni will upload the file to change but then it will be removed from our systems immediately after the change.
Yes. Xygeni offers preloaded projects so you can view examples of different security vulnerabilities without scanning your code.
Of course, the Xygeni scanner can connect to your repos but also works over a file system folder. You just need to specify where the source code is: either in a local folder or into an external git repository.
No, a credit card isn’t required to sign up for the Free Trial. There are no hidden fees or automatic enrollments. After the 14-day trial, your account will be paused, and your data will be securely stored for 30 days, giving you time to choose the plan that best fits your needs.
You can cancel or downgrade your subscription anytime. You’ll keep access to the Xygeni plan features you’ve already paid for until the end of your current billing period, and any changes will take effect at the start of the next billing cycle.
Yes, you can upgrade your plan anytime through any of Xygeni’s available purchase channels.

Secure your Software Development and Delivery

with Xygeni Product Suite