Invicti AppSec Platform Pricing

One Complete AppSec Platform. Priced to Fit Your Team.

Industry’s Best DAST

Automation 

Bring Your Own AST

Orchestration

SAST & SCA

Issue Manager

Secrets 

Notification

IaC

CI/CD

Container Security

Developer Training

API Security

AI-Guided Fixes

SBOM

SSO

ASPM

Agentic Prioritization

Bug Bounty

RBAC/Custom Roles

Pentest Reports 

Supports All Key Integrations

Flexible Deployment

Cloud Hosting

Bring Your Own Cloud

On-Premises

Air Gapped

Enterprise DAST

ASPM

World Class Support Always,
Additional Guidance When You Need It

US-Based Support

Guided Success

ProServ Hours

Frequently asked questions

Can I try Invicti before I buy?

Absolutely! Invicti provides proof-of-concept licenses so you can try the product in your current environment and make sure it’s the right fit for you and your organization before purchase.

What kind of integrations does Invicti have?

Invicti has dozes of out-of-the-box integrations with popular issue trackers, CI/CD platforms, and other services used in development environments. And if you use a system for which Invicti does not have built-in support or you need additional customization, you can always use the full-featured REST API.

What does Invicti define as a target?

Where used, a target is defined in Invicti as a fully qualified domain name (FQDN). An FQDN is the complete domain name for a specific target and consists of two parts; the hostname and the domain name.

The below examples are considered to be 1 target, as they share the same FQDN.

http://example.com
https://example.com
http://www.example.com
http://www.example.com/test

Subdomains and ports share the same FQDN, but are considered to be different targets. For example:

http://example.com
http://test.example.com
http://example.com:81

What kind of support does Invicti provide?

We offer three support packages to fit the needs of any business. World-class support is included as standard with all subscriptions, with additional premium and guided success packages also available. Support is provided via email, phone, and remote screen.

What is proof-based scanning?

Proof-based scanning is a proprietary Invicti technology that automatically verifies many types of vulnerabilities to prove that they are real and not false positives. Read about proof-based scanning to learn more about this cutting-edge technology.

How frequently do you update your vulnerability database?

Unlike tools that rely purely on passive checks for matching known vulnerability signatures, Invicti combines both passive and active checks. Passive checks using runtime SCA (updated weekly with additional hotfixes for critical issues) help quickly identify common, well-documented weaknesses, while active checks go further by safely interacting with live applications to confirm whether a vulnerability is truly exploitable as well as uncovering issues in new code.

Does Invicti scan vulnerabilities according to OWASP top 10 list?

Yes, but Invicti can identify thousands of different vulnerability variants and is not limited by any specific compliance or list. If there is a web security issue, Invicti will scan for it, regardless if it is listed in compliance lists and regulations or not. Some of the vulnerabilities Invicti scans for are listed in the OWASP Top 10 list of most critical security risks, and you can generate a dedicated report for those issues.

Have a question that’s not on the list?

If you have any other questions, don’t hesitate to reach out to us. You can also reach out to your regional Invicti representative or partner if you are already in touch with one.