Prices on the website.
No "contact sales." No "it depends." No ballpark that triples later. Pick what you need, see what it costs, pay and get started.
Security Questionnaire
PopularYou send us the questionnaire. We answer every question, attach evidence, send it back ready to submit.
- Up to 300 questions answered
- Evidence documents attached
- Formatted to customer specs
- Ready to submit
- One round of revisions
When a customer or prospect sends you a security questionnaire and you need it done fast.
Cyber Insurance Evidence
Carriers want proof of MFA, EDR, backups. We pull together exactly what they ask for.
- Evidence for all standard controls
- MFA enrollment screenshots
- EDR coverage documentation
- Backup verification
- Carrier-ready format
Insurance renewal coming up and you need to prove your security controls are in place.
PCI DSS 4.0 Snapshot
We figure out your SAQ type, map your card data flows, and tell you what gaps will fail your assessment.
- SAQ type determination
- Card data flow diagram
- Gap analysis vs. PCI 4.0
- Remediation priorities
- QSA-ready documentation
You take credit cards and need to know where you stand before your next PCI assessment.
CMMC Boundary Snapshot
FCI vs CUI sorted, system boundary documented, NIST 800-171 gaps identified.
- FCI/CUI data classification
- System boundary diagram
- NIST 800-171 gap analysis
- SPRS score estimate
- Remediation roadmap
DoD contract requires CMMC and you need to understand your scope and gaps.
SOC 2 Scope Snapshot
Scope defined, controls mapped, gaps identified. Everything you need before talking to auditors.
- Trust Service Criteria selection
- System boundary definition
- Control mapping (60+ controls)
- Gap analysis with fixes
- Auditor-ready documentation
Enterprise customer wants SOC 2. You need to know what it takes before committing.
GLBA/FTC Snapshot
Coverage memo, WISP outline, risk assessment framework. Safeguards Rule compliance documented.
- FTC Safeguards Rule coverage
- WISP template customized
- Risk assessment framework
- Third-party oversight docs
- Board-ready summary
Financial services company needing to document GLBA/FTC Safeguards Rule compliance.
How it works
Pick a package
Choose what you need. Prices are fixed—what you see is what you pay.
Fill out intake form
Takes 15-20 minutes. Tell us about your company, tech stack, and what you need.
Pay invoice (ACH)
We send an invoice. You pay via ACH. Clock starts when payment clears.
Get deliverables
We do the work. You answer a few async questions. PDFs in your inbox in 10 days or less.
What you pay consultants vs. what you pay us
Traditional consulting
- ✕$200-400/hour, scope unclear
- ✕Discovery calls, alignment meetings
- ✕4-8 weeks typical timeline
- ✕Final bill 2-3x initial estimate
- ✕Junior staff doing the work
Voss Intelligence
- ✓Fixed price, scope defined upfront
- ✓No calls, async only
- ✓10 business days guaranteed
- ✓Price on website = price you pay
- ✓Experienced practitioners only
Questions about pricing
Why is pricing public?
Because hiding prices wastes everyone's time. You know what you need. We know what it costs. No reason to play games.
What if I need something custom?
Email us. If it's close to a standard package, we'll quote it. If it's way outside our wheelhouse, we'll tell you and point you somewhere better.
Why ACH only?
Card fees are 3-4%. That's $100+ on most packages. We'd rather give you a lower price than pay Visa. ACH is free and clears in 2-3 days.
Can I buy multiple packages?
Yes. Each one is priced and delivered independently. Most people start with the most urgent one and add more later.
What if I need it faster than 10 days?
Tell us your deadline in the intake form. We'll let you know if we can hit it. Rush fees may apply for very tight timelines.
Do prices ever change?
They might go up over time. But once you pay, your price is locked. No surprise charges, ever.
Ready to get started?
Pick a package, fill out the form, pay the invoice. Deliverables in your inbox in 10 days or less.
Get Started