Choose how you run SecureOne.
Use our fully managed cloud platform — or download the binary and run it on your own infrastructure. Either way, you get the same powerful SAST, SCA, Secrets, DAST, and Pen Test capabilities.
Cloud Platform
No installation. Start scanning in minutes on our hosted, managed infrastructure.
- ✅ Instant access — no setup required
- ✅ SAST · SCA · Secrets · DAST · Pen Test Request
- ✅ Managed updates and zero maintenance
- ✅ Secure multi-tenant environment
- ✅ GitHub and CI/CD integrations included
On-Premise Download
Download the binary and run SecureOne entirely within your own environment.
- ✅ Full data residency and control
- ✅ SAST · SCA · Secrets · DAST · Pen Test Request
- ✅ Jenkins and GitHub integrations
- ✅ Configurable scan agents with token-based auth
- ✅ Air-gapped and private network supported
What's Covered in Every Plan
All SecureOne plans include the full security scan suite.
🔍 SAST
Static Application Security Testing — detect insecure code patterns before they ship.
📦 SCA
Software Composition Analysis — identify vulnerable open-source dependencies.
🔑 Secrets Detection
Find exposed API keys, tokens, and credentials across all repositories and commits.
🌐 DAST
Dynamic Application Security Testing — test running apps for exploitable runtime issues.
🛡️ Pen Test Request
Submit managed penetration testing requests through the platform and track results centrally.
Compare Deployment Options
| Feature | ☁️ SaaS | 🖥️ Self-Hosted |
|---|---|---|
| Setup time | Instant | Minutes (binary + shell script) |
| SAST / SCA / Secrets / DAST | ✅ Included | ✅ Included |
| Pen Test Request | ✅ Included | ✅ Included |
| GitHub Integration | ✅ | ✅ |
| Jenkins CI/CD | ✅ | ✅ |
| Scan Agents | Managed | Self-managed |
| Data location | Secure cloud | Your infrastructure |
| Air-gapped support | No | ✅ Yes |
| Updates | Automatic | Manual / your schedule |
Not sure which option fits?
Talk to the BountyBreach team to discuss your environment, team size, and compliance requirements. We'll help you pick the right deployment model.