Pricing

Flexible plans that meets all your needs

Choose the plan that fits your needs and start optimizing your network and security today

Monthly
Annually
Free plan
$0/user/mo
Includes:
General Capabilities
Community Support
Get started
Team plan
$6/user/mo
$5/user/mo
Includes:
General Capabilities
Identity and Access Management
Email Support
Get started
Business plan
$18/user/mo
$16/user/mo
Includes:
General Capabilities
Identity and Access Management
Network and Security Features
Email Support
Get started
Enterprise plan
Custom
Includes:
General Capabilities
Advanced Identity and Access Management
Advanced Network and Security Features
Integration or Development
Customization
Email and Phone Support
Get started
Tailored Plans for Every Need

Compare plans

Discover the right plan to elevate your networking and security capabilities.

Free
$0/user/mo
Basic networking
for  individuals.
Team
$6/user/mo
$5/user/mo
Networking,
access control
for teams.
Business
$18/user/mo
$16/user/mo
Networking,
access control,
security features
for businesses.
Enterprise
Custom
Scalable advanced networking,
access control,
security features
for enterprises.
General Capabilities
Administrators
1
2
5
Unlimited
Networks per admin
2
10
30
Unlimited
Devices per user
5
10
30
Unlimited
Dedicated index nodes
check-icon
Dedicated relay nodes
check-icon
Identity and Access Management
IAM & Admin
check-icon
check-icon
check-icon
MFA
check-icon
check-icon
check-icon
SSO
check-icon
check-icon
Identity-aware access control
check-icon
check-icon
check-icon
Policy-based access control
check-icon
check-icon
Attribute-based access control
check-icon
check-icon
Context-aware access control
check-icon
Role-based access control
check-icon
Network and Security Features
Gopher Proxy
check-icon
check-icon
Auto Expand Network
check-icon
check-icon
Network ACL
check-icon
check-icon
Private DNS
check-icon
L3/4 traffic observability
check-icon
L7 traffic inspection
check-icon
L7 Ad-hoc policy injection
check-icon
Merge/Split Network
check-icon
Gopher Topology
check-icon
Managed Gopher PAM
check-icon
Managed Gopher Jumper
check-icon
Managed Gopher SASE
check-icon
Gopher Container
check-icon
Managed Gopher Airgap
check-icon
Managed Gopher Router
check-icon
Gopher Funnel
check-icon
Zero Trust SIM
check-icon
Reliable UDP
check-icon
Audit logs
check-icon
Access Analytics
check-icon
Service mesh integration
check-icon
Event mesh integration
check-icon
Telemetry based feedback loop
check-icon
Development and Support
SDK and integration
check-icon
check-icon
Customization
check-icon
Support
Community
Email
Weekday
24-hour response
Email
Weekday
12-hour response
Email and Phone
All-day
6-hour response

Frequently asked questions

What is Gopher

Gopher is a unified networking and security platform that connects machines, people, and everything in between with precise secure access controls.

Is Gopher just networking?

Gopher isn't just networking but built many unique security features in, providing out-of-the-box networking and security converged solution.

Is Gopher a VPN?

No, Gopher is not a VPN but implements many state-of-the-art peer-to-peer tunneling and end-to-end encryption protocols.

Is Gopher the same as the Gopher Protocol?

No, Gopher has nothing to do with the Gopher Protocol.

How does Gopher secure remote workforces?

The significant increase of remote workers amplifies attacking surfaces. Gopher can secure remote workers by protecting devices, data and communications in between using unique security measures such as context-aware authentication, policy enforcement, quantum-resistant end-to-end encryption and network segmentation.

How is Gopher different from other tunneling tools?

Gopher implements many peer reviewed point-to-point end-to-end encrypted tunneling protocols. It's cryptography stronger than VPN and more scalable because of peer-to-peer connections. In addition, Gopher combines the tunnels and customizable security policies to enforce fine-grained access controls at network and application levels.

Why is it called Gopher?

Gopher is the best at digging tunnels. Gopher Security uses the same metaphor since we dig point-to-point end-to-end encrypted cyber tunnels to secure communication from user to machine or machine to machine, and vice versa.

How does Gopher fit into zero trust?

Gopher implements some key components of the zero trust such as micro-segmentation, quantum-resistant end-to-end encryption, identity-and-context aware access control, customizable policy framework and telemetry based feedback loop. Gopher Security is an out-of-the-box zero trust solution.

Still have questions?

Still not Convinced? Try us out!

Don't worry, no credit card required