The right plan for your compliance stage
From first SOC 2 to enterprise-wide governance. All plans include full Vigil access — no feature gates, no hidden costs.
For teams starting their first SOC 2 audit.
Book a Demo- Up to 500 identities
- Weekly automated audits
- SOC 2 compliance templates
- Automated flag detection
- Compliance-ready audit reports
- Email support
For scaling companies with multi-framework needs.
Book a Demo- Up to 2,500 identities
- Daily automated audits
- SOC 2 + HIPAA + GDPR templates
- Automated flag detection
- Compliance-ready audit reports
- Slack integration for alerts
- Dedicated customer success manager
For large organizations with enterprise security requirements.
Book a Demo- Unlimited identities
- Continuous real-time audits
- All compliance frameworks
- Custom integrations
- SLA guarantee
- Priority support with dedicated engineer
- SSO + advanced access controls
Everything side by side.
| Feature | Starter | Growth | Enterprise |
|---|---|---|---|
| Identities monitored | Up to 500 | Up to 2,500 | Unlimited |
| Audit frequency | Weekly | Daily | Continuous |
| SOC 2 templates | |||
| HIPAA & GDPR templates | |||
| All compliance frameworks | |||
| Automated flag detection | |||
| Slack integration | |||
| Custom integrations | |||
| Dedicated CSM | |||
| SLA guarantee | |||
| Priority support | Email + Slack | Dedicated engineer |
What you're probably wondering.
How does billing work?
All plans are billed monthly. No annual lock-in required. You can upgrade, downgrade, or cancel at any time. We prorate mid-cycle changes.
What counts as an "identity"?
An identity is any person with access to at least one system we monitor — employees, contractors, service accounts. We count unique principals, not per-system access grants.
Which SaaS tools does Vigil connect to?
GitHub, AWS, GCP, Azure AD, Google Workspace, Slack, Jira, Datadog, and more. Enterprise customers get custom connector support for internal or niche tools.
How long does setup take?
Most customers are fully connected and running their first audit within one business day. Our onboarding team walks you through each integration step-by-step.
Do you store our access data?
We store audit metadata and reports — not your raw access credentials. All data is encrypted at rest and in transit. We're SOC 2 Type II certified ourselves.
What if we exceed our identity limit?
We'll notify you before you hit the cap and give you time to upgrade. We don't hard-stop your audits. No surprise overages.