Vulcan Free vs. Other Plans
At Vulcan Cyber ExposureOS, we are committed to providing an exceptional user experience, ensuring that our Vulcan Cyber ExposureOS Free users can access a wide range of features and capabilities by default. During the initial 30-day trial period, users can explore the full spectrum of our platform's offerings. However, it's very important to note that certain advanced functionalities are reserved for Standards and Enterprise plans. For reference, see Vulcan Cyber ExposureOS Pricing and Plans.
Features and Capabilities during the Trial Period
For the first 30 days of the Vulcan Cyber ExposureOSFree trial, users enjoy unrestricted access to all features and capabilities within the Vulcan Cyber ExposureOS Platform. This comprehensive trial period allows users to experience the full power of our platform, enabling them to make informed decisions about their cybersecurity needs.
Unsupported capabilities in Vulcan Cyber ExposureOS Free
Unavailable Capabilities and Features upon Downgrading
After the initial 30 days, if users choose not to upgrade their plan, their Vulcan Cyber ExposureOS Free environment will be automatically downgraded.
While users can still access the essential features, the following advanced capabilities will no longer be available:
Open Remediation Tickets (Take Action): Initiating and tracking tickets for cybersecurity incidents.
Deploy a Fix: Implementing immediate fixes for identified vulnerabilities.
Share a Vulnerability: Collaboratively sharing vulnerabilities with team members through integrated collaboration connectors.
Edit Risk: Modifying risk assessments based on evolving security landscapes.
Settings Pane: Customizing preferences and configurations within the platform.
Exceptions: Managing exception requests.
Remediation Work Form: A structured form for planning and executing remediation efforts.
Campaigns: Orchestrating and managing remediation campaigns.
Automation: Creating automated playbooks to remediate vulnerabilities.
Remedies: Accessing specific solutions for identified vulnerabilities.
Reports: In-depth analysis and reporting for a comprehensive understanding of security metrics.