Protect AI pricing
What middleBrick covers
- On-demand and scheduled scanning for APIs
- Mapping findings to PCI-DSS 4.0, SOC 2, and OWASP API Top 10
- Continuous monitoring with diff detection across scans
- Integration with CI/CD tools such as GitHub Actions
- Custom alerting via email and webhook with rate limits
- Data deletion on demand with defined purge timelines
Pricing transparency for Protect AI
Protect AI does not publish a public price list per seat, per scan, or per API. The available information is limited to custom quotes delivered after a short procurement discussion. Typical drivers of a quote include the number of APIs to be covered, required scan frequency, desired monitoring cadence, the scope of authenticated testing, and integration needs with CI/CD or ticketing systems. Because pricing is negotiated, commitments such as volume discounts or multi-year terms are handled case by case rather than published in a fixed catalog.
Factors that influence Protect AI pricing
Quote components generally reflect the breadth and depth of coverage requested. Elements that commonly affect cost include the number of endpoints, the mix of authenticated versus unauthenticated scans, the scheduling of recurring scans, and the level of reporting and compliance documentation required. Integrations with platforms such as GitHub Actions, CI/CD pipelines, or ticketing tools can add scope, as can features like continuous monitoring, diff detection across scan runs, and customized alerting rules. Enterprise deployments that require SSO, audit logs, or dedicated support also influence pricing.
Feature sets mapped to subscription tiers
Protect AI organizes capabilities into tiers that align with operational needs. Lower tiers typically include on-demand scanning, basic dashboard views, and standard reporting. Higher tiers add continuous monitoring with scheduled rescans, diffing between scans to surface new or resolved findings, email and webhook alerts, and integration with development workflows. Enterprise tiers may include custom rules, extended log retention, SLA-backed support, and configurable permissions for multi-team environments. The exact feature set is defined in the negotiated quote.
Compliance and mapping considerations
Protect AI maps findings to established frameworks such as PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). This supports audit evidence collection and aligns with security controls described in those frameworks. For other regulations, the tool helps you prepare for assessments by surfacing findings relevant to controls, but it does not certify compliance. Organizations should validate their own implementation and policy coverage independently.
Operational limits and data handling
Operational policies that may affect cost discussions include data retention windows, deletion workflows, and alert rate limits. Scan data can be deleted on demand and is purged within a defined period after cancellation. Alerting is often rate-limited, for example to one notification per hour per API, to avoid notification fatigue. These operational characteristics are typically reviewed during quote design to match expected deployment scale.