Transparent Pricing for Data-Centric Security

Per-file encryption and context-aware access controls that travel with your data. No workflow changes required.

MonthlyYearly

Save 20% with annual billing

Team

For teams getting started with file-level encryption and data protection.

$12/user/month
Min. 10 users; volume discounts apply
Get Started
First two weeks free
Plan highlights:
Per-file AES-256 encryption (FIPS 140-3)
Zero-knowledge end-to-end & in-use encryption
Over 10 Role & Context-based access controls
Cloud drive & network storage integrations
Basic audit logs & activity dashboard
Email-based support
BusinessPopular

For organizations with complex compliance requirements and advanced security needs.

$24/user/month
Min. 10 users; volume discounts apply
Get Started
First two weeks free
Everything in Team, plus:
ITAR, CMMC, DCC, HIPAA, etc. compliance mapping
Data residency controls / FedRAMP
Over 20 Role & Context-based access controls
AI identity brokering
Anomalous activity detection & automated "drop the gate" technology
SSO & IdP integrations
Priority support
Enterprise

For enterprises with the most stringent data protection and compliance requirements.

Custom
Tailored to your organization's needs
Talk to an Expert
Enterprise POC available
Everything in Business, plus:
Dedicated encryption key management
Custom integrations & API access
Dedicated customer success manager
Custom SLAs
Core Security

Encryption fundamentals included in every plan.

Artificial Intelligence

AI governance & functionality.

Shadow AI protection
AI audit logs
Access Controls (Conditions)

Conditions & rules that are evaluated silently in the background.

User Nationality
Location: Country (IP)
Anonymous Connections
Allowed IPs
Device Operating System
Endpoint Protection
OS Patch Status
Full Disk Encryption
Device Password
Removable Media
Time Window
Access Controls (Requests)

Verification challenges required to gain access.

Acceptance Banner
Biometric/Device Verification
Email Approval
Data Password
Location: Country (GPS)
Location: Geofence (GPS)
Access Controls (Actions)

When specific conditions are triggered.

Desktop Notification
Email Notification
SMS Notification
Threat Detection & Response

Monitoring, alerting, & automated access revocation.

Compliance & Audit

Audit logging & regulatory compliance tools.

Integrations & Deployment

Storage, identity, & infrastructure connections.

25
Google Confidential Computer for cloud encryption API
Hybrid on-prem deployment
Support & Onboarding

How we support your organization.

Support level
Email support
Priority
Customer success manager + SLA
Onboarding
Self-serve
Guided setup
White-glove deployment

Questions? Not Sure Which Plan Is Right?

Our team can help you evaluate Theodosian for your specific compliance requirements, security needs, and budget.

Frequently Asked Questions
Everything you need to know about Theodosian's pricing and plans.

Absolutely. We offer a 2-week free trial on all self-serve plans - no credit card required. For Enterprise, we run a guided 2-week Proof of Concept in your actual environment so you can validate Theodosian against your compliance requirements and workflows before making a decision.

Yes. For deployments over 100 users, we offer additional volume discounts. Contact our sales team for a custom quote tailored to your organization's size and needs.

If you are on a monthly billing plan, you can add or remove users at any time and your billing will be adjusted on a pro-rata basis for the remainder of your billing period. For annual billing cycles, you can add or remove users at any time, and every quarter there will be an adjusted invoice that either credits or debits your account to limit the amount of invoices and transactions your team receives.

Yes! A copy of our SOC 2 audit report is available upon request.

VC-backed startups that have raised less than $1.5M in funding can contact us to discuss eligibility. Discounts may also be available for non-profits and educational institutions; please contact our sales team to learn more.