Pricing

At Mageni we believe that people and businesses with passion for cybersecurity can safeguard their networks, digital assets and data from hackers in an easy, efficient and cost-effective way.

Free

$0 /monthly

  • Unlimited Scans
  • Unlimited IPs
  • Daily Updates
  • Asset Management
  • Malware Detection
  • Threat Intelligence
  • Authenticated Scans
  • Security Dashboards
  • Exportable Reports
  • Community Support
  • Unlimited Users
  • Group and Role-Based Access
  • Scan Resource Sharing
  • Tagging and Comments
  • Security Alerts
  • Create Scan Policies
  • Schedule Scanning
  • API Access
  • Master-Slave Scanners
  • Radius & AD Integration

Professional

$99 /monthly

  • Unlimited Scans
  • Unlimited IPs
  • Daily Updates
  • Asset Management
  • Malware Detection
  • Threat Intelligence
  • Authenticated Scans
  • Reporting & Dashboards
  • Exportable Reports
  • Unlimited Users
  • Group and Role-Based Access
  • Security Alerts
  • Scan Resource Sharing
  • Tagging and Comments
  • Create Scan Policies
  • Schedule Scanning
  • Standard Support
  • API Access
  • Master-Slave Scanners
  • Radius & AD Integration

Frequently Asked Question

A list of answers to common questions.

Vulnerability management is the process in which vulnerabilities in IT are identified and the risks of these vulnerabilities are evaluated. This evaluation leads to correcting the vulnerabilities and removing the risk or a formal risk acceptance by the management of an organization (e.g. in case the impact of an attack would be low or the cost of correction does not outweigh possible damages to the organization). The term vulnerability management is often confused with vulnerability scanning. Despite the fact both are related, there is an important difference between the two. Vulnerability scanning consists of using a computer program to identify vulnerabilities in networks, computer infrastructure or applications. Vulnerability management is the process surrounding vulnerability scanning, also taking into account other aspects such as risk acceptance, remediation etc. Source: "Implementing a Vulnerability Management Process". SANS Institute.
A vulnerability is defined in the ISO 27002 standard as “A weakness of an asset or group of assets that can be exploited by one or more threats” (International Organization for Standardization, 2005)
The increasing growth of cyber-crime and the associated risks are forcing most organizations to focus more attention on information security. A vulnerability management process should be part of an organization’s effort to control information security risks. This process will allow an organization to obtain a continuous overview of vulnerabilities in their IT environment and the risks associated with them. Only by identifying and mitigating vulnerabilities in the IT environment can an organization prevent attackers from penetrating their networks and stealing information (Williams and Nicollet, 2005).
Mageni is a powerful vulnerability scanning and vulnerability management solution that empowers you to find, prioritize, remediate and manage the vulnerabilities before they are exploited by hackers.
Mageni can help you to find, prioritize, remediate and manage your vulnerabilities.
Mageni uses Stripe as its payment processor. This has enormous advantages. Stripe make its users automatically PCI compliant because we don't handle any sensitive credit card data on our servers. A breach of our servers won't result in any stolen credit card data and we are not tempted to store credit card data on our servers. Stripe is PCI-Certified, you can read more about Stripe's Security here: https://stripe.com/docs/security/stripe
No. We do not have any cancellation fees. You can cancel whenever you want.

Mageni for Enterprises

Our enterprise plans with implementation, migration, health checks, quickstart, and advisories are here for you.