Pricing

Transparent pricing structure and plans customized to your needs.

12Port Zero Trust Platform

12Port Zero Trust Platform is modular and various modules of the product can be added/removed.  For example, if you are interested in Privileged Access Management (PAM) we enable Remote Access, Credential Vault and Credential Rotation.  Pricing for 12Port PAM is per PAM user. 

12Port Microsegmentation is sold as a stand alone product or can be included as part of the 12Port Zero Trust Platform. Microsegmentation is sold Per Managed Asset.

Discounts available for annual and multi-year contracts, larger quantities or certain large quantity asset types.

If you are a MSP we have special pricing for you to start offering our multi-tenant version for your customers.

12Port

Zero Trust Platform
75% less expensive
  • 75% Less expensive than Cyberark, BeyondTrust and Delinea
  • Free Trial : Easy Setup and Management
  • Enable the Features you need
  • Phone, Email and Web Meeting support included

12Port Zero Trust Platform Features

Deployment Features
Physical, Virtual and Cloud Installation
Windows and Linux Deployments
Internal, Oracle, MS SQL Server, MySQL or PostgreSQL options for the backend database
WEB-based GUI
Multiple tenants with separate access URL and backend database per tenant
REST API for all functions
Event log. File system, SIEM, syslog integration.
FIPS 140-3 Certified Encryption
Credential Vault
Policy-Driven Access Workflows
Container-Based Secret Hierarchy
Custom Asset Types
Automated Secret Import & Tagging
Intelligent Auto-Tagging & Metadata Management
Granular Role-Based Access Control (RBAC) with Inheritance
Advanced Search & Navigation
Hierarchical taxonomy with flexible navigation and selection
Sub-sites for projects and delegation
Historical change control for asset management
Strong encryption for credential access
Comprehensive Audit & Reporting
Remote Session Access
Granular Session Policies with RBAC
MFA and Approval-Based Session Launch
Flexible Session Launcher Options
Session Monitoring and Video Playback
Detailed Session Activity Logging
Protocol-Agnostic Access Support
Session Gateways and Peer Nodes
Session Policy Inheritance with Overrides
Integrated Credential Management
Comprehensive Session Reporting
Credential Rotation
Automated Password and SSH Key Rotation
Credential Injection with Shadow Accounts
Centralized Credential Policy Enforcement
Support for Multiple Key Formats and Algorithms
Event- and Schedule-Based Rotation Triggers
Scripting and Task Automation Engine
Cross-Platform Remote Execution
Peer Node Support for Distributed Environments
Detailed Job and Event Audit Logs
Granular Role-Based Permissions and Policy Inheritance
Microsegmentation
Dynamic tag-based segmentation policies
Monitoring and enforcing policies
Change control for policy configurations
Service management
Collection of network data from the endpoints: interfaces, services, connections, firewall rules
Policy enforcement for assets
Connection violation detection for monitoring policies
Service requests for temporary access
Graphical representation of endpoint services and connections
Endpoint Management
WinRM, SSH communication protocols
PowerShell, Shell, Groovy scripting
Regular expressions, XSLT parsers
Customizable script and parsers libraries
Out of the box scripts and parsers for Windows Defender firewall and Linux iptables
Documented parser API and parser debug
Event-based or scheduled task execution policies
Jobs report. Raw input and output.
Authentication
Microsoft AD, LDAP
Entra ID
Local user directories segregated by tenants and spaces
SSO, SAML
MFA: TOTP, Google Authenticator, Yubikey, Duo Security, Radius, Mail Code
MFA configuration per users and groups
User access report

Have questions?
We are here to help