+ We’re here to help with any questions about plans, pricing, or what’s + included. +
+ + ++ The right plan depends on your operating model: how you balance + control, effort, and recovery assurances. +
+ + + ++ Yes. Caution is fully open source, and you can run it yourself + at no cost. This option is best for organizations with dedicated + technical resources who are willing to handle everything + themselves — from setting up infrastructure and managing + encrypted storage to coordinating quorum members and running + recovery ceremonies. It offers maximum control, but requires + significant ongoing effort. +
++ Enterprise and + Dedicated + plans remove that operational burden by providing managed + storage, guaranteed recovery timelines, and support. +
++ On-demand lets you store your own + encrypted backups and only pay if you need a recovery. It’s the + leanest option, with minimal overhead. For teams that want + proactive support or guaranteed timelines, + Enterprise is a better fit. +
++ Free support through our open-source Community is available with + every plan, including + On-demand. +
++ On-demand itself is designed as a + self-service tier, but limited paid support can be added if + needed. For teams that want ongoing guidance, guaranteed + response times, and recovery assistance, + Enterprise or + Dedicated plans are a better fit. +
++ Talk to our Sales team + to explore the right level of support for your needs. +
++ Enterprise includes 10 TB of managed + encrypted storage, geo-replication, two scheduled recoveries per + year, and premium support. It’s designed to reduce your + operational risk without needing to self-manage. +
++ Each On-demand recovery mobilizes a + full recovery ceremony from scratch, with quorum approvals and + offline security checks. + Enterprise customers benefit from lower + recovery costs because their environments are provisioned in + advance. +
++ Dedicated deployments start at $300K + and are tailored for organizations that need fully isolated + environments. This includes private infrastructure, custom + recovery policies, compliance-driven infrastructure, and + expanded storage capacity. +
+Yes. You can move between plans as your needs evolve.
++ No. All storage, recovery, and support costs are published. + Optional add-ons (like additional storage and priority + recoveries) are + billed separately. For predictable + budgeting, most organizations choose + Enterprise or + Dedicated. +
++ Our recoveries are quorum-based, end-to-end encrypted, and are + run fully offline to prevent outside interference. No single + person, system, or service can trigger a recovery on their own — + multi-party approval is always required. Every step is + cryptographically logged and verifiable, so you can audit the + process independently. +
++ Learn more about our threat model, design principles, and + security architecture in + our documentation +
++ We believe that true security requires transparency and + verifiability — you should never have to trust what you can’t + see. Open source means our software’s code is public and freely + available to inspect, audit, and even run yourself. +
++ Caution is and will always remain fully open source. We don’t + sell source code. What we offer commercially is hosting, + automation, and support for organizations that want the + assurance of managed operations without giving up control. +
+Only you. Caution never sees plaintext data.
+Only you. Caution never sees plaintext data.
+Only you. Caution never sees plaintext data.
+Lorem ipsum
+Lorem ipsum
+Lorem ipsum
+Lorem ipsum
+