PRICING
We offer four levels of protection suitable for different employee groups. You can always tell us about your specific needs so we can customize the right plan combination for your organization.
Per user pricing. No platform fees. Premium support included.
Digital Executive Protection
The most complete service designed to protect executives and employees with privileged technical and financial access.Data Broker Removal
Continuous monitoring of the complete data broker footprint.
Automated takedowns of data brokers.
Domestic (US) data broker coverage.
International data broker coverage.
Dark Web & Breached Password Monitoring
Dark web monitoring for exposed passwords related to current and former work identities.
Dark web monitoring for exposed passwords related to personal identities.
Dark web monitoring for exposed passwords related to corporate service accounts and domains.
Breached Credential Reuse Protection
Integration with Active Directory to automatically protect against credential stuffing.
Protection Against Impersonation
Automated detection and remediation of impersonation on social media.
Automated detection of misconfigured DMARC, DKIM, and SPF records for professional and personal websites.
Personal Device Protection
Ransomware, Malware, and Virus protection.
Laptop-size Faraday bag.
Tailored Cyber Awareness Coaching
Real-time messaging about external footprint changes and related risk.
Comprehensive individual risk report.
Simulated targeted email phishing campaigns.
1:1 consultations based on unique needs.
Family Protection Coverage
10 invitations.
Family Protection Attributes
Continuous monitoring of the complete data broker footprint.
Automated takedowns of data brokers.
Domestic (US) data broker coverage.
Dark web monitoring of personal identities.
Real-time messaging about external footprint changes and related risk.
Complete
Digital Employee Protection+
The essential service designed to cover an entire employee group but adds customized individual risk reports and family coverage.Data Broker Removal
Continuous monitoring of the complete data broker footprint.
Automated takedowns of data brokers.
Domestic (US) data broker coverage.
International data broker coverage.
Dark Web & Breached Password Monitoring
Dark web monitoring for exposed passwords related to current and former work identities.
Dark web monitoring for exposed passwords related to personal identities.
Dark web monitoring for exposed passwords related to corporate service accounts and domains.
Breached Credential Reuse Protection
Integration with Active Directory to automatically protect against credential stuffing.
Protection Against Impersonation
Automated detection and remediation of impersonation on social media.
Automated detection of misconfigured DMARC, DKIM, and SPF records for professional and personal websites.
Personal Device Protection
Ransomware, Malware, and Virus protection.
Laptop-size Faraday bag.
Tailored Cyber Awareness Coaching
Real-time messaging about external footprint changes and related risk.
Customized individual risk report.
Simulated targeted email phishing campaigns.
1:1 consultations based on unique needs.
Family Protection Coverage
5 invitations.
Family Protection Attributes
Continuous monitoring of the complete data broker footprint.
Automated takedowns of data brokers.
Domestic (US) data broker coverage.
Dark web monitoring of personal identities.
Real-time messaging about external footprint changes and related risk.
Popular
Digital Employee Protection
The essential service that covers an entire group of employees and contractors to reduce their exposure online.Data Broker Removal
Continuous monitoring of the complete data broker footprint.
Automated takedowns of data brokers.
Domestic (US) data broker coverage.
International data broker coverage.
Dark Web & Breached Password Monitoring
Dark web monitoring for exposed passwords related to current and former work identities.
Dark web monitoring for exposed passwords related to personal identities.
Dark web monitoring for exposed passwords related to corporate service accounts and domains.
Breached Credential Reuse Protection
Integration with Active Directory to automatically protect against credential stuffing.
Protection Against Impersonation
Automated detection and remediation of impersonation on social media.
Automated detection of misconfigured DMARC, DKIM, and SPF records for professional and personal websites.
Personal Device Protection
Ransomware, Malware, and Virus protection.
Laptop-size Faraday bag.
Tailored Cyber Awareness Coaching
Real-time messaging about external footprint changes and related risk.
Customized individual risk report.
Simulated targeted email phishing campaigns.
1:1 consultations based on unique needs.
Family Protection Coverage
5 invitations.
Family Protection Attributes
Continuous monitoring of the complete data broker footprint.
Automated takedowns of data brokers.
Domestic (US) data broker coverage.
Dark web monitoring of personal identities.
Real-time messaging about external footprint changes and related risk.
Essential
Digital Risk Detection
Continuous monitoring of the human attack surface and risk detection, without remediations performed by Picnic to reclaim privacy and reduce threat exposure.Data Broker Removal
Continuous monitoring of the complete data broker footprint.
Automated takedowns of data brokers.
Domestic (US) data broker coverage.
International data broker coverage.
Dark Web & Breached Password Monitoring
Dark web monitoring for exposed passwords related to current and former work identities.
Dark web monitoring for exposed passwords related to personal identities.
Dark web monitoring for exposed passwords related to corporate service accounts and domains.
Breached Credential Reuse Protection
Integration with Active Directory to automatically protect against credential stuffing.
Protection Against Impersonation
Automated detection and remediation of impersonation on social media.
Automated detection of misconfigured DMARC, DKIM, and SPF records for professional and personal websites.
Personal Device Protection
Ransomware, Malware, and Virus protection.
Laptop-size Faraday bag.
Tailored Cyber Awareness Coaching
Real-time messaging about external footprint changes and related risk.
Customized individual risk report.
Simulated targeted email phishing campaigns.
1:1 consultations based on unique needs.
Family Protection Coverage
5 invitations.
Family Protection Attributes
Continuous monitoring of the complete data broker footprint.
Automated takedowns of data brokers.
Domestic (US) data broker coverage.
Dark web monitoring of personal identities.
Real-time messaging about external footprint changes and related risk.
Starter
Request Pricing
Let's connect to find out which plans are right for your different employee groups. Submit the form, and we'll reply within 24 hours to schedule a meeting.