Transparent, usage-based pricing for your cryptographic trust infrastructure. No hidden fees. No wasted capacity.
Same low rates on every tier — pick features, not price tags.
Create a cryptographically signed attestation anchored to the transparency log.
Validate signatures, check revocation status, and confirm transparency inclusion.
Drag the sliders to see your estimated monthly cost in real time.
Every API call is metered, billed, and auditable. Rates are set via the rate card system and vary by plan and volume.
2 metrics
Cryptographic credential minting and verification — the foundation of every trust workflow.
4 metrics
Agent identity, delegation chains, session management, and receipt generation for machine-to-machine trust.
Rates set via rate card system — vary by plan and volume.
4 metrics
AI model provenance, dataset attestations, tool invocations, and orchestration receipts.
Rates set via rate card system — vary by plan and volume.
6 metrics
Compliance evidence, fraud detection, witness protocol, and workflow execution for regulated environments.
Rates set via rate card system — vary by plan and volume.
Protect your content with cryptographic proof. No business required.
For individuals getting started with content protection.
For content creators who need more protections and features.
For professionals and power users. Unlimited protections.
Every tier uses the same pay-per-use rates. Pick the feature set that matches your organization's requirements.
For startups and SMBs beginning their trust journey. Everything you need to start minting and verifying.
Full-featured infrastructure for growing organizations. SSO, RBAC, and priority support included.
Enterprise-grade for regulated industries. Private logs, HSM keys, and compliance-ready.
Tailored solutions for F500, governments, and global entities. Custom volume rates, on-premise deployments, and a dedicated team.
| Feature | Starter | Business | Institutional | Enterprise |
|---|---|---|---|---|
| Pay-per-use pricing | ||||
| Machine Identity (MAIP) | ||||
| AI Verification Receipts | — | |||
| Anti-Fraud Engine | — | |||
| Delegation Chains | — | — | ||
| Signing keys | 3 | Unlimited | Unlimited | Unlimited |
| Team seats | 3 | 5 | 10 | Unlimited |
| Offline proof bundles | ||||
| Custom metadata schemas | ||||
| SSO / SCIM | — | |||
| Full RBAC & audit logs | — | |||
| Priority webhooks | — | |||
| Private transparency log | — | — | ||
| HSM key integration | — | — | ||
| Compliance pack | — | — | ||
| White-label branding | — | — | ||
| On-premise deployment | — | — | — | |
| HSM key protection | — | — | — | |
| Dedicated TAM | — | — | — | |
| Support SLA | 48h email | 4h priority | 1h critical | 24/7 forensic |
| Uptime SLA | 99% | 99.5% | 99.9% | 99.99% |
We believe trust infrastructure should be accessible everywhere. Organizations in qualifying regions receive automatic discounts based on their billing country.
Discounts are applied automatically at checkout based on billing country. See exact rates for your country
Join innovative organizations building cryptographic truth infrastructure for the AI era.