ZeroDarkWeb Pricing Information
The pricing is divided into fees for monitoring domain on dark web and optional keyword monitoring fees, designed to allow companies to choose the service that best suits their security needs.
The prices are same for ZeroDarkWeb 1.0 (Report) and ZeroDarkWeb 2.0 (Dashboard).
Service Fees
ZeroDarkWeb provides powerful dark web security solutions to protect your company’s digital assets.
It offers tiered pricing plans tailored to various requirements and organizational sizes, ensuring all users can access the security services they need.
Suitable for companies with up to 100 employees
BASIC
$100
/ mo
For growing teamsΒ
Suitable for companies with up to 1,000 employees
STANDARD
$500
/ mo
For enterprise-level
Suitable for companies with more than 1,000 employees
PREMIUM
$1,000
/ mo
Optional Service Fees
To use the domain monitoring service provided by ZeroDarkWeb, users must select and register at least one domain.
Keyword monitoring is an additional option that users can choose according to their needs.
Required
Domain Monitoring
$300
1ea / mo
βοΈ All subdomains are included under the main domain and considered as one unit. Therefore, multiple subdomains under the same main domain are treated as one domain.
βοΈ Domains with different top-level domains (TLDs) are counted as separate domains.
βοΈ Monitoring more than 10 domains requires separate consultation.
Optional
Keyword Monitoring
$100
1ea / mo
βοΈ You can specify text-based keywords for monitoring. This allows you to track related information and threats more precisely.
βοΈ Monitoring more than 10 keywords requires separate consultation.
Contract Duration and Discount Policy
Minimum Contract Duration: A minimum 3-month contract is required for all plans.
Annual Contract Discount: If you choose a 1-year contract, you will receive a one-month discount on the total fee.
Find the suitable plan for your company.
All Features
Domain Leak Report
Evaluate the level of information leakage through the dark web and analyze the status of email account and attachment leaks.
Provide detailed information on malware infections and daily leak and response information.
Module | Feature |
---|---|
Dark Web Information Leakage Level | Assessment of the severity of leaked information (Severe / Caution / Safe) |
Email Account Leak Status | Identify the status of email account leaks (New Leaks / Ongoing Response / Completed Response / Total Leaks) |
Email Attachment Leak Detection Status | Provide information on emails suspected of file leaks |
Determine and delete based on relevance (Safety) | |
Detailed Malware Infection Report | Provide detailed malware infection information based on IP (ID / Password / Malware File Path / Type) |
Display location on map based on IP | |
Calendar | Provide daily insight information |
Provide daily leak counts | |
Provide daily response counts |
Detailed Leakage
Provide risk scores related to the severity of leaked information and visualize the trends and damage increase/decrease in response to leaks.
Additionally, filter and display the status of responses over time and a detailed list of leaked accounts.
Module | Feature |
---|---|
Dark Web Information Leakage Level | Assessment of the severity of leaked information (Severe / Caution / Safe) |
Risk Score | Provide risk score for leaked information |
Report Download | Download detailed report |
Leak Response Trend Graph | Visualize trends in leak response and damage increase/decrease |
Damage Increase/Decrease Trend Graph | Visualize trends in leak response and damage increase/decrease |
Response Status by Period | Provide status by type / daily response / monthly cumulative response / annual cumulative response |
Detailed Leak Information List | Filter by date / risk score / response status / leak type |
ID Search | |
Provide information on risk score / email account / initial leak date / recent leak date / leak type / duplicate leak count / response status / response completion date | |
View Detailed Leak Information | Provide risk score / email account / response completion date / re-leak status after response / leaked password / login URL / infected device information |
Provide recommendations | |
Leak History | Order / leak type / URL / password / leak date / response date / response status |
Leakage Response History
Track the response work history and status by administrator for each leak incident.
This provides insights to assess and improve the organization’s security response capabilities.
Module | Feature |
---|---|
Leakage Response History | Filter response status by administrator |
Filter response status within the period | |
Response Trend Graph by Period | Visualize response trends by period |
Administrator Response Status | Provide information on administrator / response period / response counts by type |
Detailed Response History | Provide information on order / ID / URL / leak type / leak date / response date |
Global Cyber Attack Trends
Analyze the activities of the TOP 20 infostealer-infected countries and hacker groups most affected worldwide.
This supports a broad understanding of the global security environment and provides in-depth insights into specific attacker groups.
Module | Feature |
---|---|
TOP 20 Infostealer-Infected Countries | Provide ranking / leak volume |
Cyber Attack Group Activity Analysis | Attack proportion among hacker groups |
Hacker Group Activity Analysis | Provide information on targeted sites |
Provide information on attack discovery dates | |
Provide information on industries of attacked sites | |
Provide information on the damage scale in other countries attacked by the group |