Compliance On Demand
Back to homepage

Pricing

Commercial scoping for self-hosted compliance proof.

Pricing is scoped to organisation size, deployment model, frameworks in scope, evidence volume, auditor collaboration needs and partner or MSP requirements.

No fake seat tiers or placeholder numbers. The commercial discussion starts with the deployment boundary and assurance scope.

Commercial paths

Three deployment conversations, all grounded in self-hosted operation.

Each path starts with the deployment boundary, evidence scope and operating model the buyer actually needs. Public numbers can come later when packaging is stable.

Internal teams

Core deployment

Scoped in AUD

Australian teams starting with Essential Eight, ACSC ISM, cloud and SaaS posture, vendor intelligence and audit evidence collection.

  • Self-hosted single-tenant instance
  • Essential Eight maturity tracking
  • ACSC ISM applicability workflows
  • CSPM and SSPM posture scans
  • Vendor threat intelligence from public sources
  • Evidence collection and audit exports
  • Policy and report drafting workflows

Partner model

MSP packaging

Scoped in AUD

Managed service providers running dedicated compliance workspaces for multiple clients.

  • Dedicated client instances
  • Partner packaging
  • Multi-client operating model
  • Client-specific frameworks and evidence
  • Client-specific auditor engagements

Controlled boundary

Enterprise

Scoped in AUD

Regulated teams with stricter data residency, IRAP boundary or offline operating requirements.

  • Air-gapped and offline release bundle support
  • Offline licence attestations
  • Deployment architecture support
  • Advanced audit and assurance workflows
  • Controlled-boundary implementation planning

Scoping inputs

What shapes the commercial discussion.

The right plan depends less on seat-count theatre and more on the systems, frameworks and operating constraints in scope.

01

Organisation size and evidence volume

02

Deployment model, including standard, controlled-boundary or air-gapped operation

03

Frameworks in scope, including Essential Eight, ACSC ISM, APRA CPS 234, Privacy Act, ISO 27001, SOC 2 and NIST CSF

04

Cloud, SaaS, identity and repository integrations required

05

Auditor collaboration model and MSP or partner requirements

Product briefing

Scope pricing around your actual assurance boundary.

Share the frameworks, deployment model, integrations and auditor workflow you need, and we will talk through the right commercial path.