Simple, Easy, Transparent Pricing
$22.99
per user per month
$
101-250 Users
365 Day Log Retention
24/7 Monitoring, Incident and Response
Unlimited Integrations and Log Sources
API Integration for Security Automation
Customizable Reporting
$19.99
per user per month
$
251-500 Users
365 Day Log Retention
24/7 Monitoring, Incident and Response
Unlimited Integrations and Log Sources
API Integration for Security Automation
Customizable Reporting
$15.99
per user per month
$
501 to 1000 Users
365 Day Log Retention
24/7 Monitoring, Incident and Response
Unlimited Integrations and Log Sources
API Integration for Security Automation
Customizable Reporting
*All pricing is subject to change.
**Pricing requires 1-year commitment per contract conditions
Additional Plans
We have additional plans to help with longer term data retention, custom rules, custom automations.
Seamlessly integrate with your current software







Frequently Asked Questions
- Do you offer vulnerability scanning?
-
Yes, we can include vulnerability scanning a'la carte. Pricing is based on the number devices, and frequency.
- What are the professional service onboarding fees?
-
Our professional service onboarding fees are competitive with the industry. In order to give an accurate set up fee, we will need to do a scoping call to understand the scale and complexity of your environment.
To learn more, schedule a brief call with an expert from our team. - How tall is the average kangaroo?
-
A kangaroo can reach heights from anywhere between 3- 8 feet (1 to 3 meters) and can weigh between 40 and 200 lbs (18-100kg). The eastern gray kangaroo is the heaviest marsupial in the world and the red kangaroo is the largest.
- Is there an annual contract?
-
Our service is typically based on annual contracts paid monthly. Contact us for further pricing discounts for longer-term commitments.
- Is there really unlimited automation?
-
Yes. We are in interested in keeping mean time to detection (MTTD) and mean time to remediation (MTTR) as quick as possible through automation. We'll set up automations that make the most sense for your unique environment.
- What is the threat feed sync?
-
We utilize our Central Threat Intelligence (CTI) to curate a contextualized and validated threat feed. This is sourced from users on our platform, as well as OSINT and other validated threat sources to provide proactive protection.
What Our Partners Say About BitLyft
“Before we had BitLyft helping us, we would spend hours with multiple departments working on each individual account compromise. With the help of BitLyft, we’ve been able to come up with a process that has narrowed that down to reaction before the compromise even happens.”
What Our Partners Say About BitLyft
“Before we had BitLyft helping us, we would spend hours with multiple departments working on each individual account compromise. With the help of BitLyft, we’ve been able to come up with a process that has narrowed that down to reaction before the compromise even happens.”
What Our Partners Say About BitLyft
“Before we had BitLyft helping us, we would spend hours with multiple departments working on each individual account compromise. With the help of BitLyft, we’ve been able to come up with a process that has narrowed that down to reaction before the compromise even happens.”
We are here to help. Let us be your guide.
Most websites will list the logos of their clients to help sell their products and services. We don’t believe in using our customers' logos to easily inform threat actors about your tech stack. Your privacy and security matters, even in our marketing. If you’re interested in learning about who we work with, let’s start a conversation.