Pricing
Transparent pricing structure and plans customized to your needs.
12Port Zero Trust Platform
12Port Zero Trust Platform is modular and various modules of the product can be added/removed. For example, if you are interested in Privileged Access Management (PAM) we enable Remote Access, Credential Vault and Credential Rotation. Pricing for 12Port PAM is per PAM user.
12Port Microsegmentation is sold as a stand alone product or can be included as part of the 12Port Zero Trust Platform. Microsegmentation is sold Per Managed Asset.
Discounts available for annual and multi-year contracts, larger quantities or certain large quantity asset types.
If you are a MSP we have special pricing for you to start offering our multi-tenant version for your customers.
12Port
Zero Trust Platform
75% less expensive
-
75% Less expensive than Cyberark, BeyondTrust and Delinea
-
Free Trial : Easy Setup and Management
-
Enable the Features you need
-
Phone, Email and Web Meeting support included
12Port Zero Trust Platform Features
| Deployment Features | |
| Physical, Virtual and Cloud Installation | |
| Windows and Linux Deployments | |
| Internal, Oracle, MS SQL Server, MySQL or PostgreSQL options for the backend database | |
| WEB-based GUI | |
| Multiple tenants with separate access URL and backend database per tenant | |
| REST API for all functions | |
| Event log. File system, SIEM, syslog integration. | |
| FIPS 140-3 Certified Encryption | |
| Credential Vault | |
| Policy-Driven Access Workflows | |
| Container-Based Secret Hierarchy | |
| Custom Asset Types | |
| Automated Secret Import & Tagging | |
| Intelligent Auto-Tagging & Metadata Management | |
| Granular Role-Based Access Control (RBAC) with Inheritance | |
| Advanced Search & Navigation | |
| Hierarchical taxonomy with flexible navigation and selection | |
| Sub-sites for projects and delegation | |
| Historical change control for asset management | |
| Strong encryption for credential access | |
| Comprehensive Audit & Reporting | |
| Remote Session Access | |
| Granular Session Policies with RBAC | |
| MFA and Approval-Based Session Launch | |
| Flexible Session Launcher Options | |
| Session Monitoring and Video Playback | |
| Detailed Session Activity Logging | |
| Protocol-Agnostic Access Support | |
| Session Gateways and Peer Nodes | |
| Session Policy Inheritance with Overrides | |
| Integrated Credential Management | |
| Comprehensive Session Reporting | |
| Credential Rotation | |
| Automated Password and SSH Key Rotation | |
| Credential Injection with Shadow Accounts | |
| Centralized Credential Policy Enforcement | |
| Support for Multiple Key Formats and Algorithms | |
| Event- and Schedule-Based Rotation Triggers | |
| Scripting and Task Automation Engine | |
| Cross-Platform Remote Execution | |
| Peer Node Support for Distributed Environments | |
| Detailed Job and Event Audit Logs | |
| Granular Role-Based Permissions and Policy Inheritance | |
| Microsegmentation | |
| Dynamic tag-based segmentation policies | |
| Monitoring and enforcing policies | |
| Change control for policy configurations | |
| Service management | |
| Collection of network data from the endpoints: interfaces, services, connections, firewall rules | |
| Policy enforcement for assets | |
| Connection violation detection for monitoring policies | |
| Service requests for temporary access | |
| Graphical representation of endpoint services and connections | |
| Endpoint Management | |
| WinRM, SSH communication protocols | |
| PowerShell, Shell, Groovy scripting | |
| Regular expressions, XSLT parsers | |
| Customizable script and parsers libraries | |
| Out of the box scripts and parsers for Windows Defender firewall and Linux iptables | |
| Documented parser API and parser debug | |
| Event-based or scheduled task execution policies | |
| Jobs report. Raw input and output. | |
| Authentication | |
| Microsoft AD, LDAP | |
| Entra ID | |
| Local user directories segregated by tenants and spaces | |
| SSO, SAML | |
| MFA: TOTP, Google Authenticator, Yubikey, Duo Security, Radius, Mail Code | |
| MFA configuration per users and groups | |
| User access report | |