Simple, Transparent Pricing
Start free and scale as your team grows.
Save 20% with annual billing
Community
Perfect for individuals and small teams getting started.
- ❯ Up to 3 users
- ❯ Up to 5 connections
- ❯ Web Terminal (SSH)
- ❯ 1 SSH Certificate Authority
- ❯ 7-day audit log retention
- ❯ Community support
Pro
For growing teams that need more power.
- ❯ Up to 10 users
- ❯ Up to 50 connections
- ❯ Web Terminal + K8s Pod Exec
- ❯ Up to 3 SSH CAs
- ❯ 2 Edge Agents
- ❯ TCP / SSH Tunneling
- ❯ Desktop Application
- ❯ Session recording
- ❯ 90-day audit log retention
- ❯ Email support
Team
For mid-size teams with advanced collaboration needs.
- ❯ Up to 50 users
- ❯ Up to 200 connections
- ❯ 10 Edge Agents
- ❯ 10 SSH CAs & K8s clusters
- ❯ Custom roles & RBAC
- ❯ Shared connections (role-based)
- ❯ Admin approval workflows
- ❯ GeoIP & device fingerprint
- ❯ 365-day audit log retention
- ❯ Priority email support
Enterprise
For organizations with advanced security and compliance needs.
- ❯ Everything in Team
- ❯ Unlimited users & connections
- ❯ SSO / SAML integration
- ❯ On-premise deployment
- ❯ Custom SLA
- ❯ Dedicated support
- ❯ Priority feature requests
Frequently Asked Questions
Can I self-host SecureRelay?
Yes! SecureRelay supports Docker, Kubernetes (Helm), and standalone deployment. You maintain full control over your data and infrastructure.
What databases are supported?
SQLite for development and small deployments, PostgreSQL and MySQL for production environments. Switch between them with a simple configuration change.
How does the SSH Certificate Authority work?
SecureRelay automatically generates short-lived SSH certificates signed by your CAs. This eliminates the need for long-lived SSH keys and reduces your attack surface.
Is there a free trial for Pro?
Yes, we offer a 14-day free trial of the Pro plan with no credit card required. You can also start with the free Community edition anytime.
What compliance standards does SecureRelay meet?
SecureRelay implements controls aligned with ISO-27001 including access control (A.9), communications security (A.13), audit logging (A.12.4), and incident management (A.16.1).