Skip to main content

Pricing

Entry Level

$ 150,699

One Time
IPs 500, Endpoints, and devices
  • Admin Core
  • Utility Node
  • Ingest
  • Compute
  • Sensor
Price includes onsite or remote installation, setup or configuration, and Platinum support, data retention, and annual renewal.
  • Security Monitoring
  • 24/7 X 365
  • Threat Management
  • Detailed Alerting
  • Network Security
  • Intrusion Detection
  • Compliance
  • Vulnerability Management
  • Scanning Daily
  • Wireless Device Monitorinig
  • 24/7 x 365
  • Portable Device Monitorinig
  • IT devices, OS diagnostics
  • Monthly Report
  • Executive Summary
  • Threat Details
Add-on:
  • Wireless Intrusion Detection
  • Log Management
  • Threat Hunting
  • Solutions Team
  • Data does not reach back to vendor site
Purchase Now

Mid Level

$ 517,052

One Time
IPs 750, Endpoints, and devices
  • Admin Core
  • Utility Node
  • Ingest
  • Compute
  • Sensor
Price includes onsite or remote installation, setup or configuration, and Platinum support, data retention, and annual renewal.
  • Security Monitoring
  • 24/7 X 365
  • Threat Management
  • Detailed Alerting
  • Network Security
  • Intrusion Detection
  • Compliance
  • Vulnerability Management
  • Scanning Daily
  • Wireless Device Monitorinig
  • 24/7 x 365
  • Portable Device Monitorinig
  • IT devices, OS diagnostics
  • Monthly Report
  • Executive Summary
  • Threat Details
Add-on:
  • Wireless Intrusion Detection
  • Log Management
  • Threat Hunting
  • Solutions Team
  • Data does not reach back to vendor site
Purchase Now

Enterprise Level

$ 1,800,000

One Time
IPs 3500, Endpoints, and devices
  • Admin Core
  • Utility Node
  • Ingest
  • Compute
  • Sensor
Price includes onsite or remote installation, setup or configuration, and Platinum support, data retention, and annual renewal.
  • Security Monitoring
  • 24/7 X 365
  • Threat Management
  • Detailed Alerting
  • Network Security
  • Intrusion Detection
  • Compliance
  • Vulnerability Management
  • Scanning Daily
  • Wireless Device Monitorinig
  • 24/7 x 365
  • Portable Device Monitorinig
  • IT devices, OS diagnostics
  • Monthly Report
  • Executive Summary
  • Threat Details
Add-on:
  • Wireless Intrusion Detection
  • Log Management
  • Threat Hunting
  • Solutions Team
  • Data does not reach back to vendor site
Purchase Now

Options: Cost / Offerings

Coverage: What is being provided by CCG’s CheckMate and Phen.AI Cloud-Based Cyber Security Appliance with Standard support: https://www.phen-ai.com/product-services-offering/

A more detail list of coverage

  • Security Monitoring
  • Threat Management
    • Mitre ATT&CK
    • Center for Internet Security (CIS)
  • Network Security
    • NetFlow
    • Active Directory
    • Deep Packet Inspection
    • Threat Intelligence
  • Compliance
    • National Institute of Standards and Technology (NIST) 800-53
      1. NIST 800-171
      2. Cybersecurity Maturity Model Certification (CMMC) L 1-5
    • Payment Card Industry – Data Security Standard (PCI-DSS)
    • DISA Security Technical Implementation Guide (STIG)
    • Security Content Automation Protocol (SCAP)
  • Vulnerability Management
    • NIST CVE (Common Vulnerability Enumeration)
    • NIST CWE (Common Weakness Enumeration)
  • Portable Device Monitoring
    • Identification
    • Tracking
    • Exfiltration detection
  • Wireless Device Monitoring
    • Identification
    • Behavioral analytics
  • IT devices, OS diagnostic
    • Application detection and identification
    • OS detection and identification
    • Behavioral identification
Add-on:
  • Wireless Intrusion Detection
    • Vulnerability and PenTesting of (Wireless Access Points) WAPs
    • fake or false WAPs
    • Weak or open WAPs
    • Use of WAPs as enter network
    • Data exfiltration
  • Log Management
    • The collection point for all devices.
    • Syslog collection
    • Application collection: Active Directory, HTTP/Web, Email, etc
    • OS: Servers, Desktops, Network Gear, Wifi,
  • Threat Hunting
    • Use of all of the above to hunt for
      • Advanced Persistent Threats (APTs)
      • 0-day vulnerabilities
      • 0-day exploits
  • Solutions Team
    • CCG team of experts
      • Provide a plan to solve problems
      • Provide the effort to resolve issues