One ecosystem.
Different missions.

Tracehound isolates runtime threats. Argos detects behavioral anomalies. Both are priced independently — choose what fits your security posture.

Priced per logical service — not per request, not per replica.

Simple per-service pricing.

No request counting. No surprise bills. One price per logical service.

Community

Developer / POC

Free
  • Single instance (local state)
  • Core protections (Rate Limit, Agent)
  • In-memory state only
  • Non-commercial or Revenue < $5k/mo
  • Cold Storage
  • Notification API
  • Support

Best for: Developers, Hobbyists, POC

For Growing SaaS

Pro

Growing SaaS

$79 / month per service
  • Single instance
  • Notification API (SIEM, SOC, webhooks)
  • Async Codec (streaming compression)
  • Evidence Export (S3, R2, GCS)
  • Retention & Eviction Policies
  • Email Support (24h SLA)
  • Commercial License

Best for: Growing SaaS, Bootstrapped Startups

Enterprise

Cluster / High Scale

$499+ / month
  • Multi-Instance (Redis coordination)
  • Distributed state
  • SIEM Integration (Splunk, Elastic, Datadog)
  • Compliance Reports (SOC2, HIPAA)
  • Priority Support / Slack
  • SLA Guarantee
  • Argos included

Best for: Scale-up, Fintech, High-Traffic E-commerce

SEPARATE PRODUCT

Argos

Runtime Deviation Signals

Licensed and operated independently from Tracehound.

$49 / month

Standalone

+$29 / month

With Tracehound Pro

Argos is a security signal layer that detects runtime deviation outside the request lifecycle.

  • It does not inspect payloads.
  • It does not detect attacks.
  • It does not take action.

Argos exists to surface security-relevant behavior that happens between requests.

"Argos detects when the runtime starts behaving differently — not why."

What Argos Does

Argos samples the runtime and emits behavioral signals when something deviates from expected behavior. It observes:

  • Runtime integrity drift
  • Event loop and scheduling anomalies
  • Worker / child process behavior changes
  • Internal communication pattern shifts (shape, not content)

Signal: "Did something behave differently than it should have?"

What Argos Does Not Do

Argos never:

  • Classifies threats
  • Produces evidence
  • Blocks or mutates execution
  • Influences request latency

Signals are advisory and must be validated by external systems.

Why Separate Product?

Argos is priced separately because it introduces a new security observation layer into your runtime. Unlike Tracehound, which preserves and isolates confirmed threats, Argos emits non-authoritative runtime deviation signals that must be verified by external detectors.

This expands the runtime trust boundary and adds operational responsibility, described in its own SLA.

How It Fits

Argos → External Detector → Threat → Tracehound
Argos produces signals Tracehound handles evidence

Why This Costs Money

Tracehound is not priced on traffic, usage, or attack volume — because none of those are the problem it solves.

01 Determinism is expensive

Most security tools tolerate nondeterminism: Garbage-collected memory, Retry storms, Best-effort async pipelines. Tracehound does not.

Maintaining deterministic behavior under memory pressure, pool exhaustion, and partial failure requires explicit ownership models, bounded degradation paths, and strictly constrained concurrency. This engineering effort does not scale with usage. It scales with correctness guarantees.

02 Failure semantics are designed

In Tracehound, every failure mode is intentional: What degrades, What never degrades, What is preserved at all costs.

Designing and maintaining these semantics — without blocking the host application — is the core value of the system. This is not feature work. This is failure engineering.

03 Compliance requires frozen behavior

Enterprise pricing exists because: Data shapes must remain stable, Evidence must remain verifiable, Behavior must remain explainable months or years later.

That requires versioned contracts and long-term support. Those guarantees have real cost.

04 Risk ownership transfer

  • Core: you own the risk
  • Production: risk is shared
  • Enterprise: risk is contractually bounded

The price difference reflects who is accountable when things go wrong.

If your system can tolerate undefined behavior during security incidents, you do not need Tracehound.

If it cannot, this is what precision costs.

Have questions about pricing?

Learn about per-service pricing, Kubernetes replicas, microservices, and more.

Read our FAQ