Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

Pricing and Plans

Get the support and flexibility your company needs

Select your billing:
Save 15% on annual pricing

For Small BusinessesPro

$299Per Month
was $3,588 $3,050Per Year

For Small Businesses

1 User
Upto 500 Employees
Third Party & Cookie Consent
Privacy Notice Management
First Party Consent
Individual Rights Requests

For Growing BusinessesBusiness

$599Per Month
was $7,188 $6,110Per Year

For Growing Businesses

10+ Users
Upto 500 Employees
Third Party & Cookie Consent
Privacy Notice Management
First Party Consent
Individual Rights Requests
Live Data Mapping
No-Code Orchestration

Tailored to Your NeedsEnterprise

Custom Pricing

Tailored to Your Needs

10+ Users
500 Employees +
Third Party & Cookie Consent
Privacy Notice Management
First Party Consent
Individual Rights Requests
Live Data Mapping
No-Code Orchestration
See a demo

Pro

$299Per Month / month
was $3,588 $3,050Per Year / year

For Small Businesses

Business

$599Per Month
was $7,188 $6,110Per Year / year

For Growing Businesses

Enterprise

Custom Pricing

Tailored to your needs

See a demo

Third Party & Cookie Consent

Plan includes

  • 1 web domain
  • Automated website scanning
  • Automated cookie categorization
  • Automated code generation
  • Configurable preference center
  • 5000 consent records in total
  • Auto-blocking of 1st and 3rd party cookies
  • 1M Consent records in total
  • Geo-based, adaptive cookie banner
  • End user language detection
  • Custom branding
  • Privacy Center Ready

Everything in Pro Plus

  • 5 web domains
  • 4M Consent records in total

Everything in Business Plus

  • Unlimited domains
  • Unlimited Consent records
  • Zero-code blocking of 1st and 3rd party cookies
  • Private scan behind login
  • Native support for content management systems and tag builders
  • IAB EU TCF v2.0 support
  • Consent metrics reporting
  • Deployment assistance

Privacy Notice Management

Plan includes

  • 1 Notice
  • 1 Language
  • Predefined templates
  • Hosted or embeddable URL
  • Notice versioning
  • Customize sections of notice
  • Custom branding
  • Multi-language support
  • Privacy Center Ready

Everything in Pro Plus

  • 5 Notices
  • Review and approval workflow
  • Automated update reminders

Everything in Business Plus

  • Unlimited notices
  • Auto-import cookies
  • Auto-import DSR and preference center links
  • Auto-import processing activities
  • Additional design templates
  • Manage notices by business units

First Party Consent

Pro Plan Includes

  • 250,000 visitors in total
  • 3 collection points
  • Configurable preference center
  • Email identity verification
  • Privacy Center Ready

Everything in Pro Plus

  • Privacy Center Ready
  • 1M visitors in total
  • 15 collection points
  • Consent revocation workflows
  • Configurable preference center
  • Email identity verification
  • 5 connectors for consent revocation

Everything in Business Plus

  • Unlimited visitors
  • Unlimited collection points
  • Auto expiry and re-consent
  • Consent orchestration workflows
  • Unlimited connectors for consent orchestration

Individual Rights Requests

Pro Plan Includes

  • Unlimited DSR intake webforms
  • Unlimited data subjects
  • Identity verification
  • Secure communication with data subject
  • Built-on collaboration between stakeholders
  • Integrated DSR Workbench
  • Encrypted data sharing with data subjects
  • Privacy Center Ready

Everything in Pro Plus

  • 25 API & webhooks based connectors
  • Data extraction using API & webhooks
  • Data deletion using API and webhooks
  • Auto-completion of tasks & subtasks
  • Automated end-user report creation
  • Enhanced reporting

Everything in Business Plus

  • Custom ID verification
  • Embeddable web forms
  • Multi-language support
  • Custom responses to data subjects
  • Unlimited data connectors
  • Personal data discovery and extraction
  • Self hosted data scanning Pods
  • Automated compliance records creation
  • Workflows for DSR automation
  • Private cloud storage

Live Data Mapping

Not included in this tier

  • Auto-data classification - 25 API based connectors

Everything in Business Plus

  • Unlimited assets & processes
  • Dark asset discovery
  • CSV, CMDB Imports
  • Auto-generated records of processing activities (RoPA)
  • Unlimited PIA, DPIA assessments
  • Risk register
  • Sensitive data discovery

No-Code Orchestration

Not included in this tier

Business Plan Includes

  • Unlimited workflows
  • Unlimited executions

Enterprise Plan Includes

  • Unlimited workflows
  • Unlimited executions

Frequently Asked Questions

Based on the plan you select you will be charged automatically at the end of the free trial and your subscription will be renewed automatically on a monthly or yearly basis.

You always have the option to change or cancel your subscription via the subscription portal.

You can cancel your subscription by logging into the subscription portal.

Link to the subscription portal can also be found in the subscription confirmation email which you should have received when you signed up.

In case you decide to cancel your subscription before the end of the free trial you will be able to enjoy the remainder of the free trial period and will not be charged.

Your subscription invoices are sent to you over email at the start of each billing cycle. Moreover, you can find your billing history by logging into the subscription portal.

You can manage your subscriptions and billing details by logging into the subscription portal, where you can view and edit your account, billing, and payment information.

You will no longer be able to use the limited-out feature and will have the option to upgrade to a plan which suits your needs better.

No, the usage limits mentioned are in total for their respective plans and are not based on a monthly or yearly basis.

For example, the basic plan includes a limit of 5000 consent records, this means that the basic plan allows for a total of 5000 consent records within the plan, regardless of whether the records are used over the course of one month or one year.

It's important to carefully consider the usage limits of different pricing plans in order to choose the plan that best meets your needs. If you expect to need to use a particular feature or service frequently, it may be worth considering a plan with a higher usage limit.

Cookie consents are recorded based on the total number of consents received irrespective of whether they are unique or not.

Privacy Center scans all pages on your website to identify and categorize cookies that your site uses.

PrivacyCenter supports the following languages:

1. English
2. Portuguese
3. Italian
4. Spanish
5. German
6. Japanese
7. French
8. Arabic
   
Videos
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...
AWS Startup Showcase Cybersecurity Governance With Generative AI View More
AWS Startup Showcase Cybersecurity Governance With Generative AI
Balancing Innovation and Governance with Generative AI Generative AI has the potential to disrupt all aspects of business, with powerful new capabilities. However, with...

Spotlight Talks

Spotlight 50:52
From Data to Deployment: Safeguarding Enterprise AI with Security and Governance
Watch Now View
Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Spotlight 46:02
Building Safe Enterprise AI: A Practical Roadmap
Watch Now View
Latest
View More
DataAI Security for Financial Services: Turn Risk Into competitive Advantage
Financial services run on sensitive data. AI is now in fraud detection, underwriting, risk modelling, and customer service, raising both upside and risk. Institutions...
View More
Securiti and Databricks: Putting Sensitive Data Intelligence at the Heart of Modern Cybersecurity
Securiti is thrilled to partner with Databricks to extend Databricks Data Intelligence for Cybersecurity. This collaboration marks a pivotal moment for enterprise security, bringing...
View More
Navigating China’s AI Regulatory Landscape in 2025: What Businesses Need to Know
A 2025 guide to China’s AI rules - generative-AI measures, algorithm & deep-synthesis filings, PIPL data exports, CAC security reviews with a practical compliance...
View More
All You Need to Know About Ontario’s Personal Health Information Protection Act 2004
Here’s what you need to know about Ontario’s Personal Health Information Protection Act of 2004 to ensure effective compliance with it.
Maryland Online Data Privacy Act (MODPA) View More
Maryland Online Data Privacy Act (MODPA): Compliance Requirements Beginning October 1, 2025
Access the whitepaper to discover the compliance requirements under the Maryland Online Data Privacy Act (MODPA). Learn how Securiti helps ensure swift compliance.
Retail Data & AI: A DSPM Playbook for Secure Innovation View More
Retail Data & AI: A DSPM Playbook for Secure Innovation
The resource guide discusses the data security challenges in the Retail sector, the real-world risk scenarios retail businesses face and how DSPM can play...
DSPM vs Legacy Security Tools: Filling the Data Security Gap View More
DSPM vs Legacy Security Tools: Filling the Data Security Gap
The infographic discusses why and where legacy security tools fall short, and how a DSPM tool can make organizations’ investments smarter and more secure.
Operationalizing DSPM: 12 Must-Dos for Data & AI Security View More
Operationalizing DSPM: 12 Must-Dos for Data & AI Security
A practical checklist to operationalize DSPM—12 must-dos covering discovery, classification, lineage, least-privilege, DLP, encryption/keys, policy-as-code, monitoring, and automated remediation.
The DSPM Architect’s Handbook View More
The DSPM Architect’s Handbook: Building an Enterprise-Ready Data+AI Security Program
Get certified in DSPM. Learn to architect a DSPM solution, operationalize data and AI security, apply enterprise best practices, and enable secure AI adoption...
Gencore AI and Amazon Bedrock View More
Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock
Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...
What's
New