A42-CC · CYBER SECURITY AS A SERVICE

Security and NIS2 compliance in one package

A42-CC is Alliance42 Core Compliance - everything in A42-C plus the tools and processes you need to be fully NIS2-compliant. In one license, from one supplier.

What's included

Included from A42-C

Continuous Threat Exposure Management
24/7 Managed Detection & Response
Incident Response Retainer
Threat Intelligence & Attack Surface
Vulnerability Scanning
Endpoint, Identity, Network & Cloud
Quarterly Service Reviews

A42-CC adds

Identity & Password Manager

One password manager for the whole organization. We deploy it, we train people on it, we make sure they actually use it. Most organizations have a password manager license - the problem is nobody makes sure people use it. That is the difference between "we have a tool" and "we have a solution".

Security Awareness & Phishing

Awareness training that actually changes behaviour. Monthly micro-lessons. Realistic phishing simulations calibrated to your industry. We track who clicks - not to shame anyone, but to know where to focus.

Backup & Disaster Recovery

Daily encrypted backups. Documented recovery procedure. Tested quarterly - not "we assume it works". When something happens, we have rehearsed it.

NIS2 Evidence Packs & Compliance

Evidence builds as a byproduct of operations, not as an annual panic project. When the auditor asks, the pack is ready. When a customer asks if you are NIS2-ready, you have the documentation to show.

Risk Assessments & Policies

Risk assessments that update when your environment changes - not once a year because the auditor is coming. Policies your employees can actually read, not just lawyers.

Tabletop Exercises 2x Annually

2 times a year we run a realistic incident with your team - not a PowerPoint, but an actual exercise with timelines, decisions, and a debrief. Once a year is too little in a world where threats evolve this fast.

What you actually get - compared to the market

A42-CC bundles 7+ category-leading products in one license. If you were to buy the same separately - as category-leading solutions from the top vendors in each component - the bill would typically look like this. Numbers are industry standard for the SMB segment as of April 2026.

24/7 MDR + EDR

Typical separate price: 250-400 DKK/license/mo

What you get in A42-CC: Included, category-leading threat detection with dedicated Threat Hunters

Vulnerability scanning + attack surface management

Typical separate price: 30-50 DKK/license/mo

What you get in A42-CC: Included in the same stack

Password manager for the whole organization

Typical separate price: 25-35 DKK/license/mo

What you get in A42-CC: Included, deployed and maintained

Awareness training + phishing simulation

Typical separate price: 25-40 DKK/license/mo

What you get in A42-CC: Included, monthly micro-lessons, industry-calibrated

Backup & disaster recovery

Typical separate price: 40-80 DKK/license/mo

What you get in A42-CC: Included, daily encrypted, quarterly tested

Risk assessment + policy platform

Typical separate price: 30-50 DKK/license/mo

What you get in A42-CC: Included, updated when your environment changes

Tabletop exercises (facilitated)

Typical separate price: 15,000-30,000 DKK per session x 2/year

What you get in A42-CC: Included, twice a year, with timelines and evaluation

Supplier compliance + DDQ handling

Typical separate price: 20-40 DKK/license/mo

What you get in A42-CC: Included, automated

Equivalent stack bought separately:405-695 DKK/license/mo + 30-60,000 DKK/year for tabletops
A42-CC:500 DKK/license/mo, everything included

You typically save: Time - no 7 vendors to coordinate. Money - often 10-30% depending on your current stack. Risk - no gaps between tools that do not talk to each other.

The most important point is not the price. It is what you do not have to do: no 7 contracts to negotiate, no 7 invoices to approve, no 7 support contacts to remember, no 7 tools that do not talk to each other, no integration that becomes someone's "side project that never got finished". One vendor. One invoice. One person responsible. That is what A42-CC is about - not the savings, but the simplification.

The 24/7 MDR line alone costs as much as the entire A42-CC license on the market. The rest - backup, password manager, awareness, tabletop, evidence, all of it - you get on top.

Actual prices vary by agreement, volume and contract length. The numbers here are based on industry standard for the SMB segment as of April 2026. We update this comparison biannually or when significant market price changes occur. If our numbers are wrong, write to us - we will fix it immediately.

It is not just about the price

The numbers above are useful because they show that A42-CC is not expensive. But the price is actually the least interesting argument.

What is interesting is what you get back in time and focus. When NIS2 compliance, security operations, awareness training, backup, password management and incident response are handled as one unified service, your organization no longer needs to have opinions about individual components. No internal discussions about which backup vendor to choose. No quarterly reviews of whether the password manager is still the right one. No "let us make a decision about phishing training at the next management meeting".

You have one vendor, one person responsible and one service. That means your IT manager, your leadership team and your board can spend their time on what they actually need to decide: where your business is going, how you grow, how you differentiate. Not whether the backup solution should be upgraded to Pro tier next year.

Premium service should not cost a fortune. And just as importantly: it should not steal your most valuable resource - your attention.

42

Never more than 42

We will never have more than 42 clients on A42-CC. It is written into your contract. Premium service requires focus - you should not be customer number 837 in a queue.

We cover all 10 NIS2 Article 21(2) requirements. No gaps.

01

Policies on risk analysis and information system security

Write down how you manage cyber risk - and keep it current.

How A42-CC covers it:

Annual risk assessment with quarterly updates and a live risk register

Ready-to-adopt policy pack (information security, access control, incident, BCP/DR)

Evidence you get:

Signed policies, risk register, remediation plan.

02

Incident handling

Spot incidents fast; know who does what; report on time.

How A42-CC covers it:

24/7 monitoring and response with an incident playbook aligned to regulatory timelines

Defined severity, escalation paths, and post-incident reviews captured as evidence

Evidence you get:

Incident logs, timelines, and post-incident review notes.

03

Business continuity, such as backup management and disaster recovery, and crisis management

Your data is backed up - and you can prove you can restore it.

How A42-CC covers it:

Immutable backup policies for collaboration suites and servers; agreed RPO/RTO

Scheduled restore tests and crisis/DR playbooks

Evidence you get:

Restore test reports and DR exercise summaries.

04

Supply chain security, including security-related aspects concerning the relationships with direct suppliers or service providers

Check that vendors don't become your weakest link.

How A42-CC covers it:

Supplier DDQ templates, vendor register model, and baseline security clauses

Monthly external exposure snapshot with tracked remediation for high-risk findings

Evidence you get:

Completed DDQs, vendor register, exposure snapshot & tickets.

05

Security in network and information systems acquisition, development and maintenance, including vulnerability handling and disclosure

Build and change systems securely; fix vulnerabilities on time.

How A42-CC covers it:

Patch SLAs and continuous vulnerability/exposure reviews with change guidance

Coordinated vulnerability handling and disclosure procedures

Evidence you get:

Patch compliance, vulnerability reports, change records.

06

Policies and procedures to assess the effectiveness of cybersecurity risk management measures

Measure what works. Quarterly management reviews with concrete metrics - not once a year because the auditor is coming.

How A42-CC covers it:

Quarterly management reviews with detection and response metrics, recovery tests and prioritized remediation

Exportable evidence packs showing what was measured, what was found, and what was done about it

Evidence you get:

Quarterly reports with metrics, remediation log, consolidated evidence pack (portal/PDF export)

07

Basic cyber hygiene and cybersecurity awareness training

Awareness training that actually changes behavior. Monthly micro-lessons. Realistic phishing simulations calibrated to your industry. We track who clicks - not to shame them, but to know where to focus.

How A42-CC covers it:

Managed awareness program with monthly micro-lessons, industry-calibrated phishing simulations and completion tracking

Evidence you get:

Training records per employee, completion rates, phishing simulation results, quarterly behavior report

08

Policies and procedures on the use of cryptography and encryption

Data protected in transit and at rest - by policy and in practice, not just on paper.

How A42-CC covers it:

Encryption standards defined in policy: TLS 1.3 for data in transit, AES-256 for data at rest

Email authentication baseline (SPF/DKIM/DMARC) and periodic verification checks logged as evidence

Evidence you get:

Encryption policy, configuration reports, email authentication verification log

09

Human resources security, access control policies and asset management

Right people, right access, hardened devices, clear inventory. Not a spreadsheet from 2019.

How A42-CC covers it:

Joiner/Mover/Leaver access matrix with role-based access reviews - so access is removed when people change roles or leave

Device baseline: disk encryption, screen lock, patch KPIs. Asset register updated continuously, not once a year

Evidence you get:

Access review records, device posture reports, asset register

10

Multi-factor authentication, secured communications and emergency communication systems

MFA deployed from day one. We do not accept "we will do it later" - it is the cheapest insurance you can buy. Identity and access management is part of the license, not an add-on.

How A42-CC covers it:

MFA enforced across all relevant systems from day one. Identity management included in the license

Documented emergency contacts and escalation paths, tested in tabletop exercises. Secure communication guidance

Evidence you get:

MFA coverage report, audit log of MFA events, exception handling process

Explore our other solutions

Tobias Lauge Jensen

NIS2 isn't a checkbox. It's a board-level liability now. I built A42-CC so the evidence pack is ready before the auditor asks, not assembled in a panic the week before.

Tobias Lauge JensenFounder & CEO, Alliance42

Your place in the Alliance is waiting.

No sales team. No call center. Just me.

A42-CC · Cyber Security as a Service | Alliance42