Three Ways to Deploy
Same powerful platform, tailored to your infrastructure needs
Fully managed on our secure infrastructure
Key Features
- Live in minutes
- Zero maintenance overhead
- Automatic updates
- 99.9% uptime SLA
- Built-in backups
- 24/7 monitoring
Best for: Teams wanting immediate value without infrastructure overhead
Deploy in your own data center or private cloud
Key Features
- Data never leaves your network
- Complete infrastructure control
- Custom security policies
- Air-gap capable
- SSO + MFA integration
- Unlimited scaling
Best for: Organizations with strict data residency or compliance requirements
Complete isolation for the most sensitive environments
Key Features
- No internet connectivity required
- Offline updates via secure transfer
- Compatible with Highly-sensitive networks
- Custom security hardening
- Dedicated support channel
Best for: Government agencies and high-security environments
Compare Deployment Options
Choose the right deployment for your needs
| Feature | SaaS | On-Premise | Air-Gapped |
|---|---|---|---|
| Setup Time | < 5 min | 2-7 days | Contact Us |
| Data Location | Our cloud | Your servers | Isolated network |
| Internet Required | Yes | Optional | No |
| Maintenance | Managed | Self/Managed | Self |
| Updates | Automatic | Scheduled | Manual |
| Scaling | Automatic | Manual | Manual |
| Starting Price | $49/mo | Custom | Custom |
Technical Requirements
Minimal requirements, maximum flexibility
- • Docker
- • 32+ CPU cores recommended
- • 128GB+ RAM recommended
- • 2TB+ NVMe storage (scales with data)
- • Linux Server
- • End-to-end encryption
- • SSO + MFA support
- • Role-based access control
- • Audit logging
- • Data retention policies
- • Compliance reporting
- • Deployment assistance
- • Architecture review
- • Security assessment
- • Custom integrations
- • 24/7 support available
- • Training & documentation
Security & Compliance
Built for organizations where data sovereignty isn't optional
- End-to-end encryption at rest and in transit
- Policy-based authorization (enterprise-grade)
- SSO + MFA integration
- Complete audit logging (all access tracked)
- Granular access control (owner-based)
- Configurable data retention policies
For government agencies and organizations handling truly sensitive data, on-premise deployment provides absolute data sovereignty - your data never leaves your infrastructure.
- Data residency: Your servers, your location
- Air-gap capability for classified networks
- No third-party sub-processors
- Complete infrastructure control
- Meets government security requirements
Compliance & Certifications (SaaS)
Currently Available:
- • US-based infrastructure and operations
- • Data Processing Agreement (DPA) available
- • Configurable data retention policies
- • Documented security practices
In Progress:
- • SOC 2 Type II certification
- • FedRAMP authorization (federal agencies)
For highly sensitive data, on-premise deployment provides immediate data sovereignty without waiting for third-party certifications. Many government and regulated organizations prefer this model regardless of SaaS certification status.
For government and high-security organizations: We recommend on-premise or air-gapped deployments where data sovereignty eliminates the need for third-party compliance certifications. Your infrastructure, your rules.
Choose SaaS if you:
- • Want to start immediately
- • Prefer managed infrastructure
- • Have standard compliance needs
- • Want predictable pricing
Choose On-Premise if you:
- • Have strict data residency requirements
- • Need complete infrastructure control
- • Have existing IT infrastructure
- • Require custom integrations
Choose Air-Gapped if you:
- • Work with highly sensitive data
- • Operate in secure facilities
- • Cannot have internet connectivity
- • Need maximum security isolation
Ready to Deploy Ingestigate?
Whether you need the simplicity of SaaS or the control of on-premise, we're here to help you get started.