Atlassian Guard Premium is generally available!
Secure your next innovation on Atlassian cloud
Compare features
Standard | Premium | |
---|---|---|
Protect against data loss proactively | ||
Enforced single sign-on (SSO) Enforce single sign-on (SSO) for all managed users to allow them to authenticate to Atlassian cloud products through a company's existing identity provider. | Standard | Premium |
SCIM automated user provisioning Automate user lifecycle management with SCIM provisioning and de-provisioning. Access to Atlassian cloud products will be defined by rules set in your external directory. | Standard | Premium |
Authentication policies Admins can set authentication policies to manage session duration, single sign-on (SSO), password policies, and two-step verification. Multiple policies can be created and applied to different subsets of managed accounts. | Standard | Premium |
External user security An external user policy allows you to apply security settings, including two-step verification, to external users. The settings apply to all the external users in your Atlassian organization. | Standard | Premium |
Mobile app management (MAM) Create and manage security policies that can be applied to both managed and unmanaged users with mobile app management (MAM). Policies can be set at the organization level, or designated for select users to provide additional security controls such as screenshot disabling, data export restrictions and device encryption requirements. | Standard | Premium |
API token controls Admins have greater visibility and control over API token management and its lifecycle. This includes controlling which users can create an API token to access data and viewing which users are creating and revoking API tokens. | Standard | Premium |
Data security policies A data security policy helps you keep your organization’s data secure. Create policies to govern how users, apps, and people outside of your organization can interact with content such as Confluence pages and Jira issues. | Standard | Premium |
Data classification Data classification allows admins to define their data governance approach and label critical data accordingly within Atlassian products. Admins can set data security policies and rules to control user interaction based on data classification level. | Standard | Premium |
Enforce data security policies by classification Use data classification as a coverage type in data security policies to apply rules to content based on classification levels. | Standard | Premium |
Detect suspicious activity and data misuse | ||
Automatic product discovery Gain visibility into shadow IT by discovering when managed users in your organization create instances across Atlassian cloud products. Automatic product discovery identifies the product administrator and how many users are using these products. | Standard | Premium |
Organization insights Admins can achieve better visibility into the usage of their Atlassian products and make more data-driven decisions when it comes to increasing adoption or optimizing their products' ROI. | Standard | Premium |
Organization audit log: Admin activity Admins can set authentication policies to manage session duration, single sign-on (SSO), password policies, and two-step verification. Multiple policies can be created and applied to different subsets of managed accounts. | Standard | Premium |
Comprehensive organization audit logs: User activity, API tokens, webhooks A comprehensive log of org admin, product admin, and user activity that takes place in the Atlassian cloud organization. This provides organization admins with visibility into activities like which managed users have created an API token or what organizational resources are being accessed by managed and external users via API tokens. Audit log webhooks are customized HTTP callbacks that trigger in response to audit log events. | Standard | Premium |
Anomalous activity detections Anomalous activity detections provide intelligent oversight across your Atlassian cloud products by analyzing user activity and notifying you of potential risks. These queries search activity logs and alert you to any potentially concerning activity that requires review. | Standard | Premium |
Content scanning Content scanning detection rules monitor for critical data being added to Confluence pages. These detections generate alerts for any potentially concerning content that requires review. | Standard | Premium |
Custom detections Custom detections allow organizations to define specific terms or patterns that generate alerts when these terms or patterns are detected. | Standard | Premium |
Detection controls Fine-tune the detections and alerts by changing the sensitivity of an alert, turning off detection alerts, or excluding pages/users | Standard | Premium |
SIEM integrations Using webhooks, send alerts about anomalous activity to any destination, including your organization-wide SIEM or an automation tool like Jira Automation, Zapier, or Workato. | Standard | Premium |
Alert messaging integrations Integrate alert messages to your organization-wide tools like Slack, Microsoft Teams, and more. | Standard | Premium |
Respond before threats become incidents | ||
Alert dashboard The alert dashboard gives admins or security teams a consolidated view of potentially risky activity. | Standard | Premium |
Alert details Investigate an alert with details on what happened, which account was involved, other recent alerts tied to this account, and remediation options. | Standard | Premium |
Actor profiles Access detailed user data by clicking into an actor profile directly from an alert to see a consolidated view of a user’s activity. On a single page, you can see a user’s role, location, recent activity, and a full list of their audit log alerts. | Standard | Premium |
Remediation recommendations Respond to alerts faster with the ability to suspend a user’s account directly from the alert dashboard. Based on the actions logged in the dashboard, remediation options are recommended with actionable next steps. | Standard | Premium |
Remediation workflows If suspicious behavior is detected, an organization admin can take action using the remediation recommendation to follow the suggested workflow and address a threat. Admins have the ability to immediately suspend a user's account directly from the alert dashboard. | Standard | Premium |
Alert hand-off Connect an alert to Jira through the "Create issue" button. | Standard | Premium |
See what Atlassian Guard can do for you
Join our live monthly demo to gain practical guidance for implementing security best practices and controls across Atlassian cloud.
Get more details
How billing works for free products
How to exclude managed users from Atlassian Guard billing
Why add Atlassian Guard to your Atlassian cloud subscription
How does billing work for Jira Service Management users and Atlassian Guard
How to begin a trial of Atlassian Guard
Which Atlassian products are covered by Atlassian Guard Standard and Premium
What is an organization and how does it relate to Atlassian Guard
How does Atlassian Guard work with Data Center
Questions?
We have answers. Read our full list of common questions and answers for specific Atlassian Guard pricing and licensing.