Nythrix
Nythrix
Detect. Monitor. Defend.

Simple, Transparent Pricing

Every plan includes the full platform. Scale capacity as your security operations grow.

MonthlyAnnualSave 20%

Starter

ADE deception detection for small teams.

$499/mo
Request a Demo
Capacity
Seats5
Decoys10
Honeypots10
Canaries10
NetWatch Sensors1
Cloud Collectors1
Features
Active Defense Engine
NetWatch Monitoring
Multi-tor Automation
MITRE ATT&CK Mapping
API Access
SIEM / SOAR Integrations
SOAR Playbooks
AI-Powered Analysis
SOC2 Evidence Generation
Priority Support
Most Popular

Professional

Full platform for growing security teams.

$999/mo
Request a Demo
Capacity
Seats15
Decoys25
Honeypots25
Canaries25
NetWatch Sensors3
Cloud Collectors5
Features
Active Defense Engine
NetWatch Monitoring
Multi-tor Automation
MITRE ATT&CK Mapping
API Access
SIEM / SOAR Integrations
SOAR Playbooks
AI-Powered Analysis
SOC2 Evidence Generation
Priority Support

Business

Full platform for mature programs at scale.

$1,499/mo
Request a Demo
Capacity
Seats25
Decoys50
Honeypots50
Canaries50
NetWatch Sensors10
Cloud CollectorsUnlimited
Features
Active Defense Engine
NetWatch Monitoring
Multi-tor Automation
MITRE ATT&CK Mapping
API Access
SIEM / SOAR Integrations
SOAR Playbooks
AI-Powered Analysis
SOC2 Evidence Generation
Priority Support

Enterprise

Custom seat counts, unlimited deployments, multi-tenant support, and dedicated onboarding.

Contact Sales

Frequently Asked Questions

What counts as a seat?

A seat is any user with access to the Nythrix platform — analysts, engineers, or administrators.

Can I upgrade mid-contract?

Yes. You can move to a higher tier at any time and pay the prorated difference.

What's the difference between decoys, honeypots, and canaries?

Decoys are credential-based lures. Honeypots are network-facing traps. Canaries are file- or token-based tripwires. Each serves a different detection purpose.

Do you offer annual billing?

Yes. Toggle to annual billing above to see discounted pricing — save 20% compared to monthly.

* CVE / KEV Emulation — Our library of emulated vulnerabilities is expanding every month. New CVE and KEV emulation capabilities are added continuously to keep pace with the evolving threat landscape.