SecureDB's fully-encrypted solution for identity management is based on encryption-as-a-service approach, making it affordable to all. Our disruptive pricing ensures that full-service encryption for identity data is accessible for all developers, startups and enterprises alike.

Developer Plan
FREE ALWAYS

 
  • All Identity Management APIs
  • All Encryption Features
  • Basic Access Analytics
 
  • 10,000 API calls per month
  • 1 Directory
  • Email Support
 
GET STARTED NOW
 
 
Starter
$99 p.m.

  • 100,000 API calls
  • 10 Directories

  • All Identity Management APIs
  • All Encryption Features

 
  • Basic Access Analytics
  • Weekly Data Backup
  • Dedicated Database
  • Complete Data Isolation
  • Chat + Email Support


FREE 1 MONTH TRIAL
SIGN UP
 
 
Growth
$499 p.m.

  • 600,000 API calls
  • Unlimited Directories

  • All Identity Management APIs
  • All Encryption Features

  All Starter Features; plus:
  • Advanced Access Analytics
  • Daily Data Backup
  • API Firewalling
  • Custom Alerts for Suspicious Access
  • Phone + Chat + Email Support

FREE 1 MONTH TRIAL
SIGN UP
 
 
Mature
$999 p.m.

  • 1,500,000 API calls
  • Unlimited Directories

  • All Identity Management APIs
  • All Encryption Features

  All Growth Features; plus:
  • Advanced Access Analytics
  • Custom Data Backup Frequency
  • Bring-Your-Own-Encryption-Keys support
  • Custom Feature Requests
  • Assigned Account Manager

FREE 1 MONTH TRIAL
SIGN UP
 
 
Enterprise
Custom

  • Unlimited API calls
  • Unlimited Directories

  • All Identity Management APIs
  • All Encryption Features

  All Mature Features; plus:
  • Private Deployment (on-prem or VPC)
  • On-site Deployment Assistance
  • Custom Reporting & Analytics



   

All plans offer below Identity Management APIs and Encryption features:

Identity Management APIs:
  • User Registration and Authentication
  • Profile Management
  • Password Management
  • User Roles Definition and Authorization
  • Two-Factor Authentication
  • Login History
  • Search
Data-Security Features:
  • Encryption for data in Transit
  • Transparent Data Encryption for data at rest
  • Enterprise-Grade Key Management
  • Search Encrypted Data
  • File Integrity Monitoring
  • Host Intrusion Detection