Security that scales with
your infrastructure
Everything in the core platform, plus behavioral fingerprinting, adaptive DDoS protection, multi-host correlation, and compliance reporting. Built for teams that run production servers and need more than detection.
Built on a battle-tested core
The free tier is not a demo. It is a complete security platform used in production. Enterprise adds layers on top.
All of the above is source-available under BUSL-1.1 — free for non-production use.
No feature gates. No telemetry. No cloud dependency.
What Enterprise adds
Capabilities that go beyond detection and response. Built for organizations that need deeper visibility, stronger protection, and audit-ready documentation.
Threat DNA
Identify attackers by how they behave, not by their IP address. Threat DNA builds behavioral profiles from syscall sequences, timing patterns, and interaction styles. The same attacker from different IPs, VPNs, or Tor exit nodes gets the same fingerprint.
Shield
Multi-layer DDoS mitigation that adapts in real time. XDP kernel-level packet filtering at wire speed, SYN flood detection, automatic escalation from normal to critical, and Cloudflare edge failover. Rate limits tighten dynamically under attack and relax when the threat subsides.
Multi-Host Correlation
Track attack chains that span multiple servers. Redis-based event correlation connects the dots when an attacker pivots laterally, reuses credentials, or stages data across your infrastructure. See the full campaign, not isolated events.
Intelligence Feed
Export blocked IPs, attacker fingerprints, and threat indicators via API. Feed your existing SIEM, firewall, or security stack with high-confidence indicators generated from real attacks against real servers. Not scraped from public lists. Observed firsthand.
Compliance Reports
Generate PDF reports mapping your security posture to ISO 27001 Annex A controls. Includes hash-chain verified audit trails, data retention policies, incident response timelines, and evidence of automated enforcement. Ready for your next audit.
Priority Support
Dedicated support channel with guaranteed response times. Architecture reviews for your deployment. Custom detection rules for your specific threat landscape. Assistance with integration into your existing security stack.
Ready to protect your infrastructure?
Start with the core platform today. When you need behavioral fingerprinting, DDoS protection, or compliance reports, the enterprise layer is built on the same codebase. No migration. No data export. Just enable.