Skip to main content

Deployment Options

BotShield offers deployment options for platforms of any size, from development to enterprise scale. All tiers use SDK A (Signal-Only) verification.
Access to all tiers begins with a developer application. Once approved, you receive API credentials for your chosen tier.

Deployment Tiers

Development

For local development and controlled evaluation

Production Starter

For initial live deployment and low-volume traffic

Growth

For platforms with sustained verification demand

Enterprise

For high-traffic platforms with advanced needs

Comparison

FeatureDevelopmentProduction StarterGrowthEnterprise
EnvironmentTest-onlyLiveLiveLive
Verification VolumeCapped for evaluationBaseline capacityIncreased volumeCustom
Enforcement ScopeSingle actionAction-scopedMultiple critical actionsCustom configuration
UsageEvaluation onlyFirst production rolloutContinuous productionHigh-traffic production
SupportCommunityStandardStandardPriority + Dedicated
HostingSharedSharedSharedDedicated
Access ControlBasicBasicBasicRole-Based Access Control

Choosing Your Tier

Development

Choose Development if you:
  • Are evaluating BotShield for your platform
  • Need a test environment for integration
  • Want to understand how BotShield works before committing
  • Are building a proof of concept

Development Features

  • Test-only execution environment
  • Capped verification volume for evaluation
  • Single-action presence verification
  • Test API keys (prefix: bsk_test_)
  • No overage usage permitted

Production Starter

Choose Production Starter if you:
  • Are ready for your first live deployment
  • Have low to moderate traffic volume
  • Need action-scoped enforcement
  • Want to start with baseline capacity

Production Starter Features

  • Live execution environment
  • Baseline verification capacity
  • Action-scoped presence enforcement
  • Webhook and polling support
  • Intended for first production rollout

Growth

Choose Growth if you:
  • Have sustained verification demand
  • Need enforcement across multiple actions
  • Are operating in continuous production
  • Require increased verification volume

Growth Features

  • Increased verification volume
  • Enforcement across multiple critical actions
  • Designed for continuous production operation

Enterprise

Choose Enterprise if you:
  • Have high-traffic platforms
  • Need custom enforcement configuration
  • Require priority support
  • Want dedicated hosting
  • Need role-based access control

Enterprise Features

  • Custom enforcement and policy configuration
  • Priority operational and deployment support
  • Dedicated hosting
  • Role-Based Access Control

Getting Started

  1. Request Developer Access — Fill out the application form
  2. Choose Your Tier — Select the deployment option that fits your needs
  3. Get Approved — Applications are reviewed manually (typically 24-48 hours)
  4. Receive Credentials — Get your API key and integration guide
  5. Integrate — Follow the Quick Start guide

Pricing

All tiers use transparent, usage-based pricing:
  • Pay only for verifications you use
  • No monthly minimums
  • No hidden fees
  • Clear pricing per verification

Next Steps