Pricing 

 

Sherlock Cloud has invested millions of dollars over the years on infrastructure, software and personnel. Any organization looking to build similar capability will need to make a significant investment in building a team and service capability, and it will be many years before it will achieve a level of maturity and the economies of scale possessed by Sherlock Cloud. Instead, organizations can invest a small fraction of those costs with Sherlock and have their organization leverage all the capability built to date, and be positioned to utilize all the innovative solutions the Sherlock team will deploy in the future.

 
tiered_pricing.jpg
 

What’s Included in Our Pricing

Management Services (Included)

  • Account Management

  • Configuration Management

  • Patch Management

  • Anti Virus/Anti Malware

  • Monitoring

  • Virtualization

  • Backup & Archiving

  • Certificate Authority

  • Managed File Transfer

  • Hardened System Configuration

  • Account Auditing

  • Host-based Firewalls

  • Encryption at Rest

  • System Access (Privileged & User) 

Security Services (Included) 

  • Firewall Management

  • VPN Services

  • Vulnerability Management

  • SIEM/Log Management

  • Governance & Auditing

  • Network Intrusion Prevention

  • Web Application Firewall

  • Contingency Planning & Incident Response

  • External Audits & Risk Assessments

  • Asset Management

  • Web Proxy

  • Controlled Outbound Email

  • Mail Relay, Mail Proxy

  • System Documentation, Policies & Procedures

Compute/Storage (Not Included) 

  • Compute

  • Primary Storage & Backup

  • Custom Solutions


Professional Services Compliance Reporting

Our team of highly technical systems, cybersecurity, user engagement, project management, compliance and legal professionals support your evolving needs, including:

  • System Maintenance/Patch Management

  • Vulnerability Management

  • Configuration Management

  • Authentication & Access Control

  • Customer Engagement & User Support

  • Log Management

  • Intrusion Detection System & Incident Response

  • Monitoring - Nagios, Backups, AV, Auditing

  • Contingency Planning & Incident Response Planning

  • External Audits & Risk Assessments