Simple, Easy, Transparent Pricing

Platform + Service in a single package. Our team of security experts coupled with the powerful BitLyft AIR® automation platform helps you keep your organization safe by remediating cyber threats in seconds before they have time to harm you or your customers.

Troposphere

$1,899
per month

$

Unlimited Users

21 Day Log Retention

365 Day Data Retention on Alerts Triggered and Incident Response

Basic Level Reporting

1 Integration

Get Started

Stratosphere

$2,099
per month

$

Unlimited Users

45 Day Log Retention

365 Day Data Retention on Alerts Triggered and Incident Response

Basic Level Reporting

3 Integrations

Get Started

Mesosphere

$6,499
per month

$

Unlimited Users

60 Day Log Retention

365 Day Data Retention on Alerts Triggered and Incident Response

Advanced Reporting

5 Integrations

Get Started

Thermosphere

$10,499
per month

$

Unlimited Users

365 Day Log Retention

365 Day Data Retention on Alerts triggered and Incident Response

Advanced Reporting

10 Integrations

Get Started

Seamlessly integrate with your current software

crowdstrike
Gsuite-logo
securonix-blue
office-365
cisco-logo
CarbonBlack-Logo-small
SentinelOnelogo
Fortinet_logo.svg
blackberry-logo-vector

Frequently Asked Questions

Do you offer vulnerability scanning?

Yes, we can include vulnerability scanning a'la carte. Pricing is based on the number devices, and frequency.

What are the professional service onboarding fees?

Our professional service onboarding fees are competitive with the industry. In order to give an accurate set up fee, we will need to do a scoping call to understand the scale and complexity of your environment. 

To learn more, schedule a brief call with an expert from our team. 

How tall is the average kangaroo?

A kangaroo can reach heights from anywhere between 3- 8 feet (1 to 3 meters) and can weigh between 40 and 200 lbs (18-100kg). The eastern gray kangaroo is the heaviest marsupial in the world and the red kangaroo is the largest.

Is there an annual contract?

Our service is typically based on annual contracts paid monthly. Contact us for further pricing discounts for longer-term commitments.

Is there really unlimited automation?

Yes. We are in interested in keeping mean time to detection (MTTD) and mean time to remediation (MTTR) as quick as possible through automation. We'll set up automations that make the most sense for your unique environment.

What is the threat feed sync?

We utilize our Central Threat Intelligence (CTI) to curate a contextualized and validated threat feed. This is sourced from users on our platform, as well as OSINT and other validated threat sources to provide proactive protection.

What Our Partners Say About BitLyft

“Before we had BitLyft helping us, we would spend hours with multiple departments working on each individual account compromise. With the help of BitLyft, we’ve been able to come up with a process that has narrowed that down to reaction before the compromise even happens.”

Director of Infrastructure Operations Higher Education

What Our Partners Say About BitLyft

“Before we had BitLyft helping us, we would spend hours with multiple departments working on each individual account compromise. With the help of BitLyft, we’ve been able to come up with a process that has narrowed that down to reaction before the compromise even happens.”

Director of Infrastructure Operations Higher Education

What Our Partners Say About BitLyft

“Before we had BitLyft helping us, we would spend hours with multiple departments working on each individual account compromise. With the help of BitLyft, we’ve been able to come up with a process that has narrowed that down to reaction before the compromise even happens.”

Director of Infrastructure Operations Higher Education

We are here to help. Let us be your guide.

Disclaimer - Why you don’t see customer logos or specific names:
Most websites will list the logos of their clients to help sell their products and services. We don’t believe in using our customers' logos to easily inform threat actors about your tech stack. Your privacy and security matters, even in our marketing. If you’re interested in learning about who we work with, let’s start a conversation.