Skip to main content

On Premise Appliance Pricing

Entry Level

$ 75,699

Annually
Up to 500 IP’s, endpoints, and devices
  • Admin Core
  • Utility Node
  • Ingest
  • Compute
  • Sensor
Price includes onsite or remote installation, setup or configuration, Platinum support, real-time data retention, and annual software renewal.
  • Security Monitoring
  • 24/7 X 365
  • Threat Management
  • Detailed Alerting
  • Network Security
  • Intrusion Detection
  • Compliance
  • Vulnerability Management
  • Scanning Daily
  • Wireless Device Monitorinig
  • Portable Device Monitorinig
  • IT devices, OS diagnostics
  • Monthly Report
  • Executive Summary
  • Threat Details
Add-on:
  • Wireless Intrusion Detection
  • Log Management
  • Threat Hunting
  • Solutions Team
  • Data does not reach back to vendor site
Purchase Now

Mid Level

$ 470,052

Annually
Up to 750 IP’s, endpoints, and devices
  • Admin Core
  • Utility Node
  • Ingest
  • Compute
  • Sensor
Price includes onsite or remote installation, setup or configuration, Platinum support, real-time data retention, and annual software renewal.
  • Security Monitoring
  • 24/7 X 365
  • Threat Management
  • Detailed Alerting
  • Network Security
  • Intrusion Detection
  • Compliance
  • Vulnerability Management
  • Scanning Daily
  • Wireless Device Monitorinig
  • Portable Device Monitorinig
  • IT devices, OS diagnostics
  • Monthly Report
  • Executive Summary
  • Threat Details
Add-on:
  • Wireless Intrusion Detection
  • Log Management
  • Threat Hunting
  • Solutions Team
  • Data does not reach back to vendor site
Purchase Now

Enterprise Level

$ Call required

Annually
Up to 3500 IP’s, endpoints, and devices
  • Admin Core
  • Utility Node
  • Ingest
  • Compute
  • Sensor
Price includes onsite or remote installation, setup or configuration, Platinum support, data retention, and annual software renewal.
  • Security Monitoring
  • 24/7 X 365
  • Threat Management
  • Detailed Alerting
  • Network Security
  • Intrusion Detection
  • Compliance
  • Vulnerability Management
  • Scanning Daily
  • Wireless Device Monitorinig
  • Portable Device Monitorinig
  • IT devices, OS diagnostics
  • Monthly Report
  • Executive Summary
  • Threat Details
Add-on:
  • Wireless Intrusion Detection
  • Log Management
  • Threat Hunting
  • Solutions Team
  • Data does not reach back to vendor site
Purchase Now

Coverage: CCG’s CheckMate and Phen.AI Cloud-Based Cyber Security Appliance with Standard support: https://www.phen-ai.com/product-services-offering/

Details:

  • Security Monitoring
  • Threat Management
    • Mitre ATT&CK
    • Center for Internet Security (CIS)
  • Network Security
    • NetFlow
    • Active Directory
    • Deep Packet Inspection
    • Threat Intelligence
  • Compliance
    • National Institute of Standards and Technology (NIST) 800-53
      1. NIST 800-171
      2. Cybersecurity Maturity Model Certification (CMMC) L 1-5
    • Payment Card Industry – Data Security Standard (PCI-DSS)
    • DISA Security Technical Implementation Guide (STIG)
    • Security Content Automation Protocol (SCAP)
  • Vulnerability Management
    • NIST CVE (Common Vulnerability Enumeration)
    • NIST CWE (Common Weakness Enumeration)
  • Portable Device Monitoring
    • Identification
    • Tracking
    • Exfiltration detection
  • Wireless Device Monitoring
    • Identification
    • Behavioral analytics
  • IT devices, OS diagnostic
    • Application detection and identification
    • OS detection and identification
    • Behavioral identification
Add-on:
  • Wireless Intrusion Detection
    • Vulnerability and PenTesting of (Wireless Access Points) WAPs
    • Fake or false WAPs
    • Weak or open WAPs
    • Use of WAPs as enter network
    • Data exfiltration
  • Log Management
    • The collection point for all devices.
    • Syslog collection
    • Application collection: Active Directory, HTTP/Web, Email, etc
    • OS: Servers, Desktops, Network Gear, Wifi,
  • Threat Hunting
    • Use of all of the above to hunt for
      • Advanced Persistent Threats (APTs)
      • Zero-Day vulnerabilities
      • Zero-Day exploits
  • Solutions Team
    • CCG team of experts
      • Technical Support
      • Issue Resolution