Torvus SecurityJoin the waitlist

Pricing

Torvus plans for Digital Legacy

Select the tier that matches your estate workflow. Every plan keeps policies encrypted, auditable, and verifiable.

Pricing

Choose the Torvus plan that fits how you work.

Start with the Individual toolkit, scale to Professional for advanced workflows, or partner with us on Enterprise for custom orchestration.

Torvus Individual

Core vault plus Digital Legacy essentials for personal archives.

Coming soon

  • Guided inventory for passwords, documents, and crypto notes.
  • Digital Legacy policy presets with inactivity timers.
  • Two executors and five recipients with verification.

Torvus Professional

Advanced policies, KYC for executors, and enhanced audit export for journalists, NGOs, and estate planners.

Team pricing

  • Multi-signal release predicates with manual review lanes.
  • Executor KYC, redaction-ready dry runs, and recipient portal.
  • Extended audit exports with integration hooks and API webhooks.

Torvus Enterprise

Enterprise agreements with SSO/SAML, dedicated support, DPA/BAA options, and bespoke estate workflows.

Custom

  • Custom estate-mode orchestration with policy simulations.
  • Dedicated success team, response SLAs, and security reviews.
  • SSO/SAML, SCIM, and regional data residency roadmaps.

Contact sales

Enterprise support when Digital Legacy is mission critical

Tell us about your requirements—SSO/SAML, bespoke workflows, or compliance packages—and we’ll schedule a review.

Email us at security@torvussecurity.com or share details below. We respond within two business days.

Need early access instead? The waitlist ensures you’re first in line for Professional previews.

We store the minimum needed to respond. Please avoid sharing secrets or credentials here.

Pricing & rollout questions

How will billing work when Torvus Digital Legacy launches?

Individual accounts start with complimentary storage for core Digital Legacy items. Professional and Enterprise tiers include invoicing options and volume-based pricing when team features unlock.

What security assurances do you provide?

All vault data is encrypted client-side with keys stored separately. Roadmapped hardware-backed KMS and customer-managed keys add further assurance. Review our Security page for detailed controls and attestations.

Where is data located?

Initial regions are Australia and the EU with roadmap support for additional residency zones based on demand. Enterprise deployments can discuss bespoke hosting arrangements.

What uptime SLA can we expect?

During preview we operate with target 99.5% availability and transparent incident reporting. Enterprise contracts include custom SLAs, runbooks, and contact routes.