Skip to content

Wallarm subscription plans

The subscription plan outlines the conditions of the access to Wallarm: subscription period, the set of available modules, and features.

This document describes:

  • The components the Wallarm subscription plans are composed from

  • How to configure it subscription plans

Subscription plans

The subscription plan includes a set of modules and features. You can select and include any modules listed below into your plan. The set of options in the plan is defined individually with each client.

Modules

The set of all Wallarm platform modules is provided below. Modules can be added to any subscription plan additionally, so the set of modules is not fixed within the subscription plan.

  • API Threat Prevention / Web Application Firewall continuously analyzes HTTP and HTTPS traffic and blocks malicious requests. Traffic analysis is performed with the DPI (Deep packet inspection) technology, and the decision to block a request is made in real time.

  • Brute-force protection automatically denylists IP addresses from which brute-force attacks are sent.

  • Active threat verification detects active application vulnerabilities that could be exploited during an attack. For this, the module automatically replays attacks from real traffic processed by the filtering node and looks for vulnerabilities in the corresponding parts of the application.

  • Custom ruleset setup allows you to manually add request processing rules: block malicious requests if the filtering node is working in the monitoring mode or if any known malicious payload is not detected in the malicious request / detect the attack based on the specified regular expression / cut out sensitive information such as passwords or cookies from the uploading to the Wallarm Cloud / enable and disable the blocking of requests to various parts of a web application.

  • Exposed asset Scanner scans the company's exposed assets: discovering new domains, IP addresses, services, and notification of new objects.

  • Vulnerability Scanner detects common types of vulnerabilities in the application in accordance with the OWASP Top 10 recommendations. The list of vulnerabilities that can be detected is available at this link.

Features

The set of features included to the subscription plan is defined individually with each client. The following features can be included:

  • Limit for requests processed per month

  • Multi-tenant system

  • Period of event storage

  • Number of users

  • Level of technical support

To define features that should be included to your subscription plan, please send the request to sales@wallarm.com.

Trial period

When a new user is registered in Wallarm Console, a new client account with an active trial period is automatically created in the Wallarm system.

  • The trial period is free.

  • The trial period lasts 14 days.

  • Wallarm trial provides the maximum set of modules and features that can be included in a paid subscription to Wallarm.

  • The trial period can be extended for 14 days more only once.

    The trial period can be extended in the Wallarm Console → SettingsSubscriptions section and via the button from the email notifying about the end of the trial period. The email is sent only to users with the role Administrator and Global Administrator.

  • If the trial period expired, the client account is blocked. When a paid Wallarm subscription is activated, access to the client account is restored for all users.

Information about the trial period is displayed in Wallarm Console → SettingsSubscriptions.

Subscription management

  • To activate, cancel, or change a subscription, please send a request to sales@wallarm.com.

  • Information about active subscription is displayed in Wallarm Console → SettingsSubscriptions.

  • Subscription cost is determined based on incoming traffic volume, subscription period, the set of connected modules, and features.