Bright Security pricing

What middleBrick covers

  • Usage based pricing tied to APIs and scan frequency
  • Free tier for initial evaluation with scan limits
  • Starter tier dashboard, email alerts, and MCP Server
  • Pro tier continuous monitoring and CI/CD integration
  • Enterprise tier custom rules, SSO, and audit logs
  • Clear thresholds for additional APIs and features

Pricing model overview

Bright Security pricing is usage based rather than purely seat based. Costs are driven by the number of APIs under active scan, the chosen scan cadence, and the tier of platform features you require. Public rates are not listed as a fixed catalog; instead, quotes consider scan frequency, authenticated coverage, and monitoring needs. You receive a defined set of capabilities at each tier, with clear thresholds for additional APIs or advanced monitoring.

Free tier capabilities and limits

The Free tier is designed for initial evaluation and limited ongoing use. It includes CLI access and permits 3 scans per calendar month at no cost. This tier supports read-only scanning against any API that accepts GET and HEAD requests. No dashboard, no scheduled monitoring, and no alerting are provided. If your program grows beyond the monthly scan limit or requires authenticated endpoints, you must move to a paid tier.

Starter tier pricing and inclusions

Starter at 99 dollars per month adds a dashboard, email alerts, and MCP Server access. It supports up to 15 APIs with monthly scheduled scans and includes remediation guidance with each finding. Authenticated scanning is available with Bearer, API key, Basic auth, and cookies, provided the domain ownership gate is satisfied. This tier is suitable for teams needing continuous score tracking and basic compliance evidence.

Pro tier continuous monitoring and scaling

Pro at 499 dollars per month supports up to 100 APIs and adds continuous monitoring with scheduled rescans every 6 hours, daily, weekly, or monthly. You receive diff detection across scans, email alerts at a rate limited to 1 per hour per API, and HMAC signed webhooks. Additional APIs beyond 100 are billed at 7 dollars each. This tier includes GitHub Action integration as a CI/CD gate, Slack and Teams alerts, compliance reports aligned to OWASP API Top 10, SOC 2 Type II, and PCI-DSS 4.0, and signed webhooks for automated workflows.

Enterprise tier for large scale and compliance needs

Enterprise at 2000 dollars per month and above removes API count limits and unlocks custom rules, SSO, and audit logs. You gain dedicated support and a defined SLA. This tier is intended for organizations that require governance at scale and need to map findings to multiple regulatory frameworks. Custom rules allow you to tune detection scope, while audit logs provide traceability for security reviews. Quotes for this tier are driven by API volume, monitoring frequency, and integration complexity.

What drives quote variations

Final pricing varies with the number of APIs you scan, the need for authenticated scanning with domain verification, and the level of monitoring you require. High frequency rescans, many authenticated endpoints, and advanced integrations increase cost. Conversely, using the tool only for occasional ad hoc scans against public APIs can remain within lower tiers. Contact the platform for a detailed quote when you have a clear inventory of APIs and a target monitoring cadence.

Frequently Asked Questions

Is pricing per user or per API?
Pricing is primarily driven by the number of APIs under scan. Tiers define the maximum API count included; additional APIs are billed incrementally.
Do you offer a one time perpetual license?
No. The service model is subscription based, with monthly or annual cycles tied to tier selection.
Are there extra costs for compliance reports?
Compliance reports are included in Pro and Enterprise tiers. Generating custom or additional formats may involve professional services, which are billed separately.
How are authenticated scans validated?
Authenticated scans require domain verification via DNS TXT record or an HTTP well known file. Only the domain owner can enable credentials, ensuring scans stay within authorized scope.