Pricing

Pricing is based on organization's size. Click the proper category below to see your price. Larger or government organizations can contact us.

Under 20 employees
Unlimited users, extensive support, all features
250€
/ month
* Pay annually, save 17%
20-49 employees
Unlimited users, extensive support, all features
320€
/ month
* Pay annually, save 17%
50-99 employees
Unlimited users, extensive support, all features
450€
/ month
* Pay annually, save 17%
100-199 employees
Unlimited users, extensive support, all features
680€
/ month
* Pay annually, save 17%
200-499 employees
Unlimited users, extensive support, all features
990€
/ month
* Pay annually, save 17%
500-999 employees
Unlimited users, extensive support, all features
1350€
/ month
* Pay annually, save 17%
1000+ employees
Get a quote
from team@cyberday.ai
Pricing

Transparent pricing for organization-wide security

Cybersecurity is a company-wide effort, not just for a few users. Cyberday ensures everyone in your organization contributes to compliance and stays compliant, so pricing is based on employee amount, not individual users.

employees
How many people are in your organization?
Under 20
208€
/ month
(Billed at 2500€/year)
250€
/ month
Start free trial
Full 14-day trial. All features. No credit card required.
20-49
267€
/ month
(Billed at 3200€/year)
320€
/ month
Start free trial
Full 14-day trial. All features. No credit card required.
50-99
375€
/ month
(Billed at 4500€/year)
450€
/ month
Start free trial
Full 14-day trial. All features. No credit card required.
100-199
567€
/ month
(Billed at 6800€/year)
680€
/ month
Start free trial
Full 14-day trial. All features. No credit card required.
200-499
825€
/ month
(Billed at 9900€/year)
990€
/ month
Start free trial
Full 14-day trial. All features. No credit card required.
500-999
1125€
/ month
(Billed at 13500€/year)
1350€
/ month
Start free trial
Full 14-day trial. All features. No credit card required.
1000-2999
1660€
/ month
(Billed at 19 900€/year)
1990€
/ month
Start free trial
Full 14-day trial. All features. No credit card required.
3000-10000
More than 3000 employees?
More than 3000 employees?
Book a meeting
Full 14-day trial. All features. No credit card required.
10000+
More than 10000 employees?
More than 10000 employees?
Book a meeting
Full 14-day trial. All features. No credit card required.

Your trial includes all features, for example:

Framework library and management

Learn more
Choose the frameworks you want to start with
Automatically generate a step-by-step plan to reach compliance
ISO 27001
NIS2
NIST
ISO 27017
GDPR
ISO 27701
ISO 27018
Cyber Essentials

Security policies, tasks and assurance

Learn more
Delegate specific security tasks to team members to complete in Cyberday
Notify them automatically in MS Teams, Slack or via email
Track progress on each task

Employee information security guidelines

Learn more
Distribute guidelines to all employees or chosen teams
Notify them of actions to take / guidelines to read and accept
Monitor compliance and progress of individual employees

Documentation workflows

Learn more
Ready-made templates and smart library to generate documents - Data systems, data sets, other assets (e.g. equipment) and physical premises
Advanced documentation workflows

Reporting automation

Learn more
Demonstrate compliance status with reporting templates for management or auditors
Automated reports fetch content from your account - compliance reports, policy documents or legal descriptions

Extensive customer support

Book a meeting
Experts will assist you to get the most out of Cyberday and ensure you stay on the right track with live chat, webinars and support articles. Or book a personal call at any time.

View all the features in detail

Frameworks and compliance tracking

Full Cyberday framework library access
Access to all supported frameworks, now and in the future, will be included in your plan.
Compliance score & assurance score tracking
Your ISMS content is being used to automatically calculate, how compliant you are and how much evidence you have to prove the accuracy of the compliance score.
One-click framework activation and disabling
Get access to framework content and compliance plan instantly, overlap taken into account. If you later decide to disable a framework, none of the content you've modified will be lost.
Multi-framework compliance tracking and overlap management
Most of tasks in Cyberday library connect to multiple frameworks. Implement a task once, increase your compliance towards multiple frameworks. Follow your progress also with inactive frameworks from Frameworks-page.
Compliance score and assurance score improvement suggestions
Always see a prioritized list of improvement suggestions on your ISMS Dashboard, so you'll know what is the most important thing to improve next to continue towards your compliance goals.
Framework extensions
Extend frameworks like ISO 27001 with extensions like ISO 27017, ISO 27701 and others.
Compliance reports
See "Reporting automation" for details

Security policies, tasks and assurance

Prioritized, task-driven security policies
Build compliance-ensuring security policies from clearly prioritized tasks.
Task connections to framework requirements
Tasks are automatically linked to specific security requirements. You can customize the connections if relevant.
Owner selection & reminders
Tasks are automatically linked to specific security requirements. You can customize the connections if relevant.
ISMS role management
Assign tasks or any other items to roles (e.g. CISO, DPO, risk manager), that can include multiple users.
AI-powered process descriptions
Generate process descriptions easily with pre-built suggestions.
Task audit log
Automatically track all task activity and add manual comments and user mentions when relevant.
Review & due date reminders
Stay on top of deadlines with automated notifications.
Assurance tracking
Monitor security assurance activities and spot tasks needing more evidence.
Task-type specific assurance methods
Connect technological tasks to used security tools, fill related asset or record documentation for organizational tasks, or link related guidelines to people tasks.
Generic assurance methods
Define implementation processes, monitor progress from related asset owners, add internal how-to instructions or provide additional guidelines.
Custom tasks & requirements
Add security tasks tailored to your organization and connect to custom requirements.
Taskbook-view
Give task owners a clear overview of their responsibilities.

Documentation workflows

Pre-built templates & workflows
Standardized documentation tables for easy data input for all information security topics.
Asset inventory
Maintain a structured list of key assets.
Customizable asset templates
Document data systems, physical assets, datasets, and more.
Record documentation
Templates for risks, incidents, continuity plans, access roles, etc.
Enable custom fields for templates
Add optional fields to tailor documentation templates.
Quick exports
Export data to Excel for further analysis.
Bulk item management
Easily add multiple documentation items at once.
CIA asset priority classification
Prioritize assets based on Confidentiality, Integrity, and Availability.
Visual mode
See documentation connections and enhance usability with a visual documentation interface.

Employee information security guidelines

Pre-built & custom guidelines
Use ready-made guidelines or create your own.
Automated notifications
Notify employees about new security guidelines and admins of employee feedback to existing guidelines.
Security awareness training extensions
Reinforce learning with case examples and skill tests.
Monthly reminders
Keep security awareness consistent with scheduled notifications.
Unit-specific security guidelines
Customize guidelines for specific units or other employee groups.
Automatic app installation (through Microsoft Teams or Slack)
Ensure all employees current and upcoming employees are included in security guidelines process.
Employee guidelines feedback
Gather insights on guideline effectiveness.

Reporting automation

Compliance reports
Generate structured compliance overviews (e.g. for auditing purposes) automatically for all frameworks.
Cyberday trust centers
Publicly or semi-publicly showcase your security posture for interested stakeholders.
Pre-built policy & document reports
Standardized reporting for security documentation. Policy and document report content is mostly automatically fetched from your ISMS tasks.
Embeddable reports
Publish embeddable reports on your website e.g. about privacy communication.
Security statement reports
Pick any content from your ISMS to pull them to a smart-looking document report. Great e.g. for custom reporting requests from customers.
Custom documentation reports (item- or list-level)
Generate reports of documentation - either for list (e.g. data systems report) or single important items (e.g. audit or management review).
Report reviewing
Assign multiple reviewers to accept important reports.

Report sharing

Cyberday trust centers
Publicly or semi-publicly showcase your security posture for interested stakeholders.
Report collection sharing through Microsoft Teams
Share reports in real time (e.g. with an auditor) through Team-tabs inside Microsoft Teams.
Report collection tabs on web browser
Share reports in real time (e.g. with an auditor) through report collections.
Export to PDF
Export any report easily to PDF-format for easy sharing for auditors or other participants you don't want accessing your full ISMS.
External user access
Invite auditors or other external users (e.g. partners) as users in your ISMS, if you want them to have a broader ISMS access.
Report sharing through Guidebook
Share key reports (e.g. top-level information security policy) with your team through Guidebook and track their reading automatically.

Extensive customer support

Live chat support (9-16 EET)
Get fast responses to any Cyberday related questions from our team, on average within 10 minutes.
Email support
Guaranteed response within one business day.
Phone support (9-16)
Speak directly with an expert.
Cyberday Academy
Access on-demand training courses and help articles.
Cyberday Community
Engage with other users to prioritize and discuss development ideas and best practices.
Controlled support access
Allow secure support investigation when needed (e.g. to solve technical issues).

Security

Comprehensive item-based audit logging
Track all changes on items across the platform for proper ISMS management.
All events -page
Maintain full visibility of security related changes across your whole ISMS in one page.
Version history
See e.g. older report versions and older versions of text content across all items.
Efficient data exports
Extract data for analysis or reporting in Excel format.
Data encryption
Your ISMS data encrypted both at rest and in transit.
Customer data separation
Row-level protection on database-level ensuring logical separation of organization data.
Strong backup processes
The database and all changes made to its content are continuously and automatically replicated for the last seven (7) days. Automated daily backups help with longer period backup and selectively restoring specific data from a backup.
Continuous security testing
Continuous penetration testing with most recent statement available through cyberday.ai/security along with the use of automated SAST and DAST tools to support secure development.
OAuth authentication
Secure login via Google and Microsoft.

User management

Role-based access control
Assign users to relevant roles like Admin, Core Team, Contributor and regular Employee.
Microsoft Teams SSO
Enable seamless sign-in via Teams without the need for local passwords.
Slack user integration
Automate user management with Slack.
Multi-factor authentication (MFA) enforcement
Strengthen security with MFA enforcement separately also, if you're not using Microsoft Teams SSO.
Dashboard access requests
Relevant users can themselves request access to higher levels of the ISMS and admins will see the requests on Dashboard.
Unit syncing from Microsoft Entra (Azure AD)
Auto-assign users to relevant units you manage as groups in your Microsoft environment through the Edit structure -page in ISMS.
Employee grouping
Organize users into functional units for e.g. detailed security guidelines management.

Risk management

Step-by-step risk workflow
Guide users from risk identification to evaluation and treatment in a systematic way.
Risk register
Maintain a structured risk database.
Automated risk identification
Detect already identified risks proactively from your current ISMS tasks.
Risk level calculations
Assess the effect of current control actions to risks with the help of Risk Control Factor (RCF).
Custom risk reports
Generate automated risk matrices and other risk management related one-click reports.
Residual risk evaluation
Track the impact of risk treatment by re-evaluating risks after their treatment.
Closed risk periodic reviews
Periodically return to review and reassess once mitigated or accepted risks.
Risk management extensions
Including e.g. asset-based risk identification for selected high priority assets, theme-based risk evaluations or change-based risk evaluations.

Internal audits

Audit scheduling
Plan and track audits over time in a single table.
Audit execution tools
Facilitate audits with built-in internal audit execution tools and audit execution reports.
Non-conformity tracking
Document identified non-conformities and track they get treated with corrective actions.
Commenting and improvement tracking
Log other findings on audits (other than major or minor non-conformities) and recommended improvements.
Shareable or exportable audit reports
Generate audit summaries for review and audit evidence.
Framework- or theme-based audits
Conduct audits either targeted on a single framework and selected framework scope - or across your full ISMS and across multiple frameworks scoped by ISMS themes.

Vendor security questionnaires

Automated framework-based questionnaires
Standardized security assessments to make it easier for your to evaluate the results.
Vendor priority classification
Categorize your vendors on documentation tables and focus questionnaire efforts on high-risk, low-assurance vendors.
No-signup questionnaire filling for vendors
Make it easy for vendors to respond with no-signup access and email requests.
Vendor questionnaire summary reports
Get a quick overview of vendor responses.

Privacy / GDPR management

Embeddable privacy notices
Automate privacy compliance communication by publishing embeddable and always up-to-date reports on your website.
Step-by-step DPIA templates
Streamline Data Protection Impact Assessments.
Records of Processing Activities (ROPA)
Automate record-keeping.
Personal data inventory
Track data processing activities across assets.

Cyberday trust centers

Automated Cyberday trust center site
Showcase security and compliance efforts with a controlled access - either restricting the whole trust center or specified reports.
Customizable report selection and restriction
Choose which reports to display on Cyberday trust center and which to make available only by request.
Trust center access control
Make the trust center either public or needing identification and explanation of need.
Other trust center information
Display other top-level information from your ISMS (e.g. used frameworks, deployed controls) on your Cyberday trust center to build credibility.

Enterprise management

Organizational structure management
Either define units and sites inside a single account, or split the corporate group into multiple subaccounts with their own ISMSs.
Task sharing across suborganizations
If your corporate group level is implementing a task for all suborganizations, you can share the task for oll subaccount from the corporate group's account.
Sub-process descriptions for tasks
When security tasks are implemented separately on different parts of the organization, split tasks into sub versions for different units or sites.
ISMS role management
Assign tasks or any other items to roles (e.g. CISO, DPO, risk manager), that can include multiple users. Define roles so, that they suit your organization.
Control implementation tracking
Monitor the implementation of asset- or unit-based security measures with reminders and confirmations directly from the related asset or unit owners.

Other key features

Information security metrics
Define key metrics you use to track your ISMS and see them all tracked on a single Metrics-page.
Incident reporting for employees
Enable incident reporting through Guidebook for all employees with instant notifications for admins.
Track user performance
See the distribution of ISMS ownership across different users from a single User stats -page.
File uploads or linking files from SharePoint
Connect relevant documents to any items across your ISMS.
Usage languages
Cyberday supports many languages and the language choice can be separate for each user and for organization-wide reporting and documentation.

Notifications

Instant alerts
Get instantly notified of critical events, like incidents.
Daily updates
Stay informed about due tasks.
Weekly Taskbook summaries
Ensure ongoing visibility of security tasks across key users.
Monthly Guidebook reminders
Reinforce security awareness.
Multi-channel notifications
Choose between Teams, Slack, and email.

Cyberday Community

Framework & feature voting
Influence Cyberday's development.
Idea submissions & discussions
Share your feedback and suggestions.
Subcriptions to idea groups
Stay updated on the key topics that matter to you.
Team updates
Get updates and comments from our development team on feature progress.
Translation improvements
Contribute to expanding the Cyberday language support.
Cyber news (weekly)
Receive curated security news updates inside Cyberday Community.

Cyberday Enterprise

Customized pricing options for businesses with over 3000 employees and government organisations.
Additional benefits and support, including assisted deployment, incident management rules, integrations (AD-sync, Power Automate -workflows).
Book a meeting
Reach out to a Cyberday representative.
We will discuss your needs and customise a plan for you.

Information security responsibles love Cyberday

Companies all over the world love how Cyberday makes it simple to manage their cyber security

IT | 51-200 employees
"Cyberday breaks down the complex ISMS and ISO 27001 topics to small tasks, that can be easily explained and handled."
Martin B.
CISO and Head of Consulting Services
Oil & Energy l 51-200 employees
"The end users are reasonably happy since the tool is based on the Teams environment."
Niko R.
Head of IT
501-1,000 employees
"Cyberday is a practical and user-friendly tool to find your way around the complex world of compliance and all its frameworks."
Arthur D.
COO
501-1,000 employees
"It has templates, it has dedicated teams, and the security task feature helps you save what needs to be done and accordingly get it done."
Gaurav B.
Associate, Finance Control
501-1,000 employees
“A comprehensive service that is quickly updated with new features and frameworks to meet the needs of the entire organization.”
Sami K.
Chief Information Officer
IT | 51-200 employees
"Cyberday breaks down the complex ISMS and ISO 27001 topics to small tasks, that can be easily explained and handled."
Martin B.
CISO and Head of Consulting Services
Management Consulting l 11-50 employees
"Risk management reporting that used to take days is now a matter of minutes. Awesome!"
Morten S.
CEO
Maritime l 1,001-5,000 employees
"With Teams and Slack integration, we are able to reach our employees on the platform they use in their day-to-day activity."
Kim B.
Head of Cybersecurity
IT l 50 or fewer employees
“Cyberday gives us a clear path toward achieving compliance."
Verified user
501-1,000 employees
“All important tasks are delivered in manageable way and also in Finnish. Help is always available, customer support is near perfect.”
Jonna N.
Quality Manager
Financial Services l 11-50 employees
“The overall experience is really good. Everything seems to work as promised.”
Niklas J.
Accountant and IT
Management Consulting l 11-50 employees
"Risk management reporting that used to take days is now a matter of minutes. Awesome!"
Morten S.
CEO
Discover more customer stories

Trusted by thousands of infosec professionals

Pricing FAQ

Why do you price by employee amount, not user amount?

Cybersecurity is a company-wide effort, not just for a few users. Cyberday ensures everyone in your organization contributes to compliance and stays compliant, so pricing is based on employee amount, not individual users.

This way, you can involve the right amount of different users (admins, core team members, contributors and employees) at different stages of your ISMS deployment - and the price remains the same.

Similar thinking is applied e.g. on information security certification audits. The scope of the ISMS (how many employees are covered) defines directly how many days your audit needs to take.

Can I try Cyberday before purchasing?

Yes you can - our free trial includes every feature for 14 days! For more information about our free trial, please visit the Trial-page.

What payment options do you offer?

Payment options are invoice and credit card payment. You can select monthly or annual billing.

Are there any setup fees or hidden charges?

Absolutely not. There are no hidden costs or setup fees. All charges are transparently listed on our pricing page.

Can we pay monthly / yearly?

Yes - this is totally your own choice. By choosing the 12-month billing cycle you get two of the monts for free (and save 17%).

Our billing information has changed - what to do?

Send the new billing information by email to team@cyberday.ai or contact out chat support.

Can I cancel my subscription at any time?

You can. You can read the details from our Terms of use.

What happens to my data if I cancel my subscription?

Your data will be maintained for three months after cancellation, so that if you decide to change your mind and continue with our product, you have everything ready. After the three month time period we delete your data if the account is still inactive.

Before cancelling you have multiple options at your disposal to help you export all your important data.

I'm a consultant. Can I partner up with Cyberday to help my clients?

Absolutely! We maintain a Partner program and would be happy to partner up with any cyber compliance experts. We offer you training to make you a Cyberday expert and plenty of other benefits. Read more and apply through our Partners-page.

Can I get local consulting or other assistance?

Yes! We have many partners in numerous EU countries that are experts on local compliance requirements, local industries and Cyberday usage of course. We're happy to pair you with a great partner - you can contact our team for assistance e.g. at team@cyberday.ai or through the chat.

Do you offer onboarding or training for new customers?

We do! To help you with your compliance journey, we have created multiple ways to get assistance and learn more about a variety of different topics. To get started, head to our Academy which can be found here: cyberday.ai/academy or book a support meeting (cyberday.ai/book-a-meeting) and discuss with our experts.