Portfolio offer • fixed scope • defensible artefacts • RID continuity

Portfolio Offer

Standardized governance snapshots and board-ready artefacts for cohort companies preparing for procurement scrutiny. Built to be repeatable, non-confidential, and contractable.

Tracking key: . Commercial terms available upon request; subject to executed agreement. Public pages are non-confidential by design.

Scope boundary (public)

Note: portfolio outputs can be delivered under Model A (program contract) or Model B (company-by-company).

Fixed packages (portfolio edition)

Packages are standardized to keep procurement calm. Exact schedules and commercials are finalized under executed agreement.

Package Portfolio size Primary outputs Time window Best when
Portfolio QuickScan Up to 5 companies Per-company snapshot (intake + boundary map + initial findings)
Artefact format starter (memo structure + MAP conventions)
Evidence index starter (IDs + source type)
2–3 weeks Program wants rapid baseline + clean procurement messaging.
Portfolio Readiness Up to 10 companies Everything in Portfolio QuickScan, plus:
Control baseline (taxonomy + minimum controls)
Risk themes (anonymized cohort pattern summary — optional)
Routing pack (co-sell/procurement language + RID discipline)
4–6 weeks Scale-up cohorts approaching enterprise buyers and procurement gates.
Portfolio Governance+ Up to 20 companies Everything in Portfolio Readiness, plus:
Optional deep lanes (selected companies routed into 2/4/6-week assessments)
Program-level operating memo (non-confidential governance posture)
Escalation playbook (privacy/security/procurement red-lines)
6–10 weeks Program acts as a procurement-enabler with repeatable governance standards.

Commercial terms: available upon request; subject to executed agreement (program contract or per-company). Optional volume adjustments can be defined in the partner agreement.

Included (standard)

  • Standardized artefacts: memo format, MAP conventions, evidence index starter
  • Procurement-safe routing language + clean buyer path
  • Portfolio summary option (anonymized, non-confidential)
  • RID discipline for tracking and handoffs

Not included (public scope)

  • Credentials, tenant access, or confidential technical deep-dives
  • Customer content review or regulated personal data handling
  • Security attestations beyond the agreed evidence scope
  • Implementation work unless separately contracted

Next step