CYBERSECURITY / MANAGED IT / COMPLIANCE / FORENSICS / PRIVATE AI

The Petronella Solutions Stack

What Petronella Technology Group actually deploys for organizations that need security, IT, compliance, and AI under one operating discipline. Seven solution categories, vendor-neutral by design, run by senior engineers and analysts from our headquarters at 5540 Centerview Dr., Suite 200, Raleigh, NC 27606. CMMC Level 1, Level 2, and Level 3 ready. HIPAA, PCI-DSS v4.0.1, SOC 2, NIST 800-171, and FTC Safeguards Rule aligned.

24/7Hybrid AI plus human SOC
23+Years operating
RPO #1449CMMC-AB registered
BBB A+ Since 2003 | DFE #604180 on staff | MIT-Certified AI and Blockchain | Raleigh NC HQ
SOC pulse: analysts on shift now, telemetry streaming, ticket queue green
23+
Years Operating
A+
BBB Accredited Since 2003
RPO
CMMC-AB #1449
NC
Raleigh Headquarters

This is the umbrella hub for everything Petronella deploys. If you are looking for who we serve by industry, read the industries hub instead. This page is what we put on the wire: the seven solution categories that compose into a working program. Each category links DOWN to a focused service pillar with the wiring diagram, the vendor decisions, the onboarding stages, and the compliance crosswalk for that scope.

Petronella Technology Group has been operating from Raleigh, North Carolina since 2002. The solutions we deploy today are the result of twenty-three years of running production environments for regulated organizations: defense contractors handling Controlled Unclassified Information, healthcare practices under HIPAA, financial services firms under SOC 2 and PCI-DSS, engineering firms under ITAR, law firms handling privileged material, and mid-market businesses that need cybersecurity, managed IT, compliance, and now private AI under a single accountable partner.

The stack on this page is vendor-neutral by design. We do not earn referral fees on detection products, backup platforms, or cloud-security tools, which means the scoping conversation is about what fits your environment rather than what pays our quarterly margin. The artificial intelligence layer that handles triage, prioritization, and detection runs on our enterprise private AI cluster, on hardware Petronella owns, operates, and physically controls. Your data does not leave that cluster, and that is a design choice that matters when the compliance scope is real.

What follows is the seven-category breakdown of what we deploy. Each card opens a focused pillar with the technical depth, the onboarding stages, the compliance crosswalk, and the pricing approach for that scope. Read whichever ones map to your situation. When you are ready, the scoping call is thirty minutes and produces a real quote.

Solutions Versus Industries

What We Deploy Versus Who We Serve

Two hubs, two different questions. If you came here asking "what does Petronella actually do", you are in the right place. If you came here asking "do you understand my industry", the industries hub is the better read.

Hub Question It Answers Use This When
/solutions/This page What does Petronella Technology Group deploy and operate? What is on the wire when we own your security and IT program? You are evaluating capability fit. You want the architecture, the components, the wiring diagram, and the operating discipline behind each category we ship.
/industries/Buyer identity Does Petronella understand my regulatory landscape, my threat model, and my vertical-specific operating context? You are evaluating vertical fit. You want the threat narrative for healthcare, defense, financial services, legal, manufacturing, or education before you assess the technology.
/solutions/industries/Per-vertical deliverable What stack does Petronella deploy specifically for healthcare, defense, financial services, legal, manufacturing, or education? You have already accepted the vendor and want the architecture, capability matrix, audit-evidence package, and SLA model scoped to your vertical.

Most engagements ride both hubs. A defense contractor reads /industries/ to confirm Petronella understands the CMMC environment and the prime-contract pressure, then comes here to evaluate the technical solution that gets deployed against that scope. Read in whichever order matches your buying motion. The phone number and the contact form are the same either way.

Category 01

Managed Cybersecurity Operations

Twenty-four by seven detection, response, and threat hunting across endpoints, network, cloud, identity, and email. The Petronella SOC is staffed by senior analysts based in the United States with the authority to act, not a script.

The cybersecurity operations category is where most engagements start. The reason is structural: endpoint visibility is the single highest-leverage detection surface in a modern environment because that is where attackers land, where credentials are harvested, and where ransomware encrypts. EDR closes the blind spot first, XDR brings in network, cloud, identity, and email once the analyst pod has learned your environment, and CSPM addresses the misconfiguration layer that turns cloud workloads into unauthenticated public endpoints by accident.

What separates the Petronella operating model from a license-bill SOC: every shift is staffed by senior analysts with authority to act, the artificial intelligence layer prioritizes the alert queue but does not delegate consequential containment decisions to a model, and the after-hours response is not handed off to an offshore script. Read the cybersecurity pillar for the broader programmatic view including governance, awareness training, and risk management.

Category 02

Compliance and Audit-Readiness

Petronella Technology Group consults across all CMMC levels, including Level 1, Level 2, and Level 3. We are CMMC-RP certified and operate as a CMMC-AB Registered Provider Organization, RPO #1449. The team is fully CMMC-RP credentialed.

The compliance category is two related disciplines: the technical-control implementation that satisfies the requirement, and the documentation, evidence-collection, and assessor-coordination work that survives third-party scrutiny. Petronella delivers both halves under a single engagement. For most defense-contractor clients the engagement combines a Managed XDR deployment against the technical controls with a CMMC consulting engagement against the documentation, the System Security Plan, the Plan of Action and Milestones, and the assessment-readiness check.

What we do not do is sell compliance theater. A signed SSP that no one operates against is a finding waiting to be discovered. We build the evidence base from the actual operating state of your environment, which is why the technical-control side and the documentation side run on the same engagement clock. The handoff fee model that most consultancies use, where assessment-readiness work happens once and then drift accumulates, produces a finding cluster on the next audit. We stay in the chair.

Category 03

Managed IT and Infrastructure

The day-to-day technology operation that runs your business: helpdesk, endpoint management, server and network operations, cloud workload management, voice, and backup. Predictable monthly subscription. No surprise overage line items.

Managed IT and managed cybersecurity are increasingly the same conversation. Patching is a security control. Backup is a ransomware control. Identity-provider hygiene is a credential-theft control. Helpdesk ticket triage is often where an indicator of compromise first surfaces. The Petronella operating model unifies the disciplines: the same team that runs the helpdesk feeds tickets into the same SOC that operates the detection stack, the same patching cadence that satisfies the IT vendor satisfies the compliance assessor, and the same backup verification job that meets the recovery-time objective also meets the audit-evidence requirement.

Most of our managed IT engagements include managed cybersecurity as a layered scope. The few that do not are organizations with an in-house security team and a need for the operational layer only. Either way the scoping call determines the boundary. There is no quarterly retainer for "discovery work" that produces a recommendation to buy more discovery.

Category 04

Incident Response and Digital Forensics

When the worst happens. Twenty-four by seven emergency response with rapid containment, forensic-grade investigation, system recovery, and post-incident review. DFE #604180 on staff. Court-admissible chain-of-custody discipline on every engagement.

If you suspect an active threat in your environment right now, do not finish reading this page. Call (919) 348-4912 and ask for the on-call incident response analyst. The five-minute triage conversation is free. We would rather absorb the call than miss the real one. If it is a false alarm, you lose five minutes. If it is real, you save days.

Digital forensics work at Petronella is specifically scoped to corporate-mobile and BYOD breach response. We are not a generalist law-enforcement forensics shop and we do not perform Cellebrite, EnCase, or Graykey extractions, jailbreak operations, personal-investigator surveillance, or chain-of-custody work for criminal or family-court matters. Our Digital Forensic Examiner credential, DFE #604180, supports the corporate breach-response and litigation-support scope where chain-of-custody discipline produces evidence that holds up in business-litigation venues. Craig Petronella also brings MIT-Certified credentials in AI and Blockchain to the forensics engagement when crypto-asset or smart-contract evidence is in scope.

Category 05

Virtual CISO and Strategic Security Leadership

Strategic security leadership without the six-figure salary. Risk assessments, policy development, board-level reporting, vendor risk management, regulator response coordination, and ongoing security program oversight tailored to your business objectives.

The virtual CISO engagement is the right fit when the organization has outgrown a part-time security committee but cannot justify a full-time Chief Information Security Officer salary plus benefits. The fractional model produces the executive-level strategic guidance, the board reporting cadence, the regulator-facing documentation, and the vendor-management discipline that mid-market organizations need without the cost of a permanent hire. Most engagements run a half-day to two days per month of dedicated executive time on top of an always-available advisory channel.

What the vCISO does not replace: the security operations team that runs the SOC, the IT team that operates the network, or the compliance specialists who manage the framework engagement. The vCISO is the strategic layer above the operational and compliance layers, and the Petronella engagement model includes the vCISO scope inside a broader managed-security retainer when that is the right answer for the organization. The scoping call is where we determine whether the vCISO scope stands alone or rolls up into a broader engagement.

Category 06

Private AI Infrastructure and Custom Agents

The enterprise alternative to public-cloud large-language-model services for organizations whose data cannot leave a sovereign environment. Petronella owns, operates, and physically controls the AI cluster. Your data does not leave it. Custom agents, full audit trails, CMMC and HIPAA aligned.

The private AI category exists because regulated organizations cannot send Controlled Unclassified Information, Protected Health Information, cardholder data, or attorney-client privileged material to a public-cloud-hosted large-language-model service and still satisfy their compliance obligations. The honest version of that statement: the public-cloud LLM vendor's marketing language about "your data is private" is structurally different from "your data does not leave a sovereign infrastructure you control." If a vendor pitches you a "private tenant" inside their public service, ask where the model weights live and who has root on the inference nodes. The honest answer is rarely the same as the marketing answer.

Petronella operates the private AI cluster on hardware we own and physically control. Your alert metadata, retrieval-augmented corpora, behavioral baselines, and forensic queries process there. The cluster is the substrate for the artificial intelligence layer that runs inside the Managed XDR Suite SOC, the compliance-mapping engine that supports CMMC engagements, and the custom-agent development we do for clients who need automation against their sensitive data without sending it offsite.

Category 07

Awareness, Training, and Human Layer

The human layer is the largest attack surface in every organization Petronella has ever assessed. Phishing simulation, security awareness training, role-based instruction, and the cultural-change work that converts the workforce from breach vector to first line of defense.

The human layer category is where the largest measurable risk reduction tends to happen in the first ninety days of a security engagement. Phishing-simulation click rates of fifteen to twenty-five percent in the first campaign drop to single digits within two quarters of consistent training. That single behavioral shift closes more breach surface than any individual technical control. The pairing of awareness training with the technical controls in the cybersecurity-operations category is where the program produces outcomes, rather than just dashboards.

How the Categories Compose

From First Call to Steady-State Operations

Most engagements compose two or three categories. The thirty-minute scoping call is where we determine which ones fit and in what order. The five-stage flow below is what happens after you decide to move forward.

01 SCOPE
Discovery Call
30-minute scoping conversation with a senior engineer, not a sales engineer. Real questions, real answers
02 QUOTE
Custom Proposal
One-page fixed-monthly proposal within five business days. No surprise overage line items
03 ONBOARD
60-Day Rollout
Agent deployment, baseline measurement, runbook customization, evidence pack initialization
04 OPERATE
Steady-State
24/7 SOC, weekly tuning, monthly business review, quarterly executive briefing, annual roadmap
05 ASSESS
Annual Audit
Compliance assessor coordination, evidence handoff, finding remediation, control-uplift planning

The composition pattern that recurs most often: a defense contractor or healthcare practice composes Managed Cybersecurity Operations plus Compliance plus Managed IT under a single engagement, with Awareness Training layered on as the human-layer control and the Virtual CISO scope handling strategic and board-level reporting. A litigation or breach-response engagement composes Incident Response plus Digital Forensics on the front end and transitions into one of the steady-state managed engagements after the incident closes. A research-heavy organization composes Private AI Infrastructure plus Managed Cybersecurity, with Compliance scoped to the framework that applies to the research data.

What we do not push: scope creep for its own sake. If your environment is small enough that endpoint detection plus quarterly vulnerability scanning is the right answer, that is the proposal we write. The customer-retention model is good service plus honest scoping, not feature creep.

Credentials and Operating Discipline

Why the Petronella Stack Holds Up

Twenty-three years of operating production environments for regulated organizations. The credential roster below is the substrate behind every solution category on this page.

Founder and Leadership

Craig Petronella founded Petronella Technology Group in Raleigh, North Carolina in 2002. Credentials on the engagement: CMMC-RP, CCNA, CWNE, DFE #604180 (Digital Forensic Examiner), and MIT-Certified in AI and Blockchain. Author of multiple Amazon-published books on cybersecurity, cryptocurrency, and digital forensics. Quoted in Attorney at Law Magazine. Listed on forensicresources.org.

Team Credentials

The entire Petronella team is CMMC-RP certified. Senior staff includes Blake Rea, Justin Summers, and Jonathan Wood. We operate as a CMMC-AB Registered Provider Organization, RPO #1449. We are also BBB A+ Accredited since 2003 and a member of the Private Practitioner Security Bureau. The team holds CompTIA Security+ and similar professional certifications through our partner network.

Compliance Scope

Petronella Technology Group consults across all CMMC levels, including Level 1, Level 2, and Level 3. Frameworks in active engagement: HIPAA Security Rule and Privacy Rule, PCI-DSS v4.0.1, SOC 2 Trust Service Criteria, NIST 800-171 Rev 2, NIST Cybersecurity Framework 2.0, ISO 27001, FedRAMP, FERPA, FISMA, FTC Safeguards Rule, GLBA, HITRUST, and ITAR. Engagement evidence packs map directly to assessor control families.

Operating Discipline

Senior analysts on every shift of the 24/7 SOC, all based in the United States, with the authority to make containment decisions that affect customer operations. Consequential decisions are not delegated to a model. The artificial intelligence layer prioritizes the queue and pre-authorizes well-defined playbook responses. Humans own everything else. The cost differential against an offshore-script model is real. The outcomes differential is bigger.

Adjacent Services

Where Each Solution Fits in the Broader Program

The seven categories above are the operating stack. The pillars below are the focused deep-dives. Pick the ones that match your situation, then book the scoping call.

FAQ

Questions Buyers Ask About the Stack

If your question is about a specific solution pillar, follow the link to that pillar's FAQ. The questions below are about how the categories compose into a working engagement.

Where should I start if I do not know which category we need?

Call (919) 348-4912 or use the contact form for the thirty-minute scoping call. Petronella Technology Group does the diagnostic for you: we ask about the regulatory scope, the current state of the security and IT program, the recent incident history, and the leadership priorities. From that conversation we recommend the categories that fit, in the order that makes sense. The scoping call is free and produces a one-page written quote within five business days.

For most organizations the answer is some combination of EDR plus Managed IT plus a compliance framework engagement. The exact composition is what the scoping call determines.

Do you require all categories, or can we engage one at a time?

One at a time is fine. Most engagements start with a single category, see the operating value, and expand. A common pattern: organization engages on EDR for the first quarter, expands to the full XDR Suite in quarter two once the SOC is staffed against the customer environment, and adds CMMC compliance in quarter three because the contract pipeline now requires it.

The exception is incident response. If you call us because of an active incident, the engagement starts with Incident Response and transitions into steady-state managed services after the incident is closed. The two scopes run in sequence rather than in parallel during a crisis.

How is /solutions/ different from /services/, /industries/, and /compliance/?

/solutions/ (this page) is the umbrella hub for what Petronella deploys: seven solution categories that compose into a working program. /industries/ is the buyer-identity hub: do we understand your vertical, your regulatory landscape, and your threat model? /solutions/industries/ is the per-vertical deliverable view: what stack do we deploy for healthcare versus defense versus financial services? /compliance/ is the multi-framework hub: HIPAA, CMMC, SOC 2, ISO 27001, PCI-DSS, and the rest of the alphabet soup.

Most buyers read two of these in sequence. Industry-first buyers read /industries/ then /solutions/. Capability-first buyers read /solutions/ then /industries/. Either order works and produces the same engagement.

Are you vendor-neutral, or do you push specific platforms?

Vendor-neutral by design. Petronella Technology Group does not earn referral fees on endpoint-detection products, backup platforms, cloud-security tools, SIEM products, or framework-evidence platforms. The scoping conversation is about what fits your environment, your existing licenses, your team's operational maturity, and your compliance scope. We routinely run engagements on SentinelOne, CrowdStrike, Microsoft Defender for Endpoint, Veeam, Datto, Druva, Microsoft Sentinel, and a long list of others depending on what produces outcomes for the customer.

The one place we will push back is when an existing platform is on a discontinuation path, the license is being retired by the vendor, or we have benchmarked it as substantively underperforming for the customer's use case. We will tell you in the scoping call rather than after the contract.

What does an engagement cost?

From-pricing depends on which categories compose into the engagement, the endpoint and user count, the compliance scope, the response-time SLA expectations, and whether you already license tooling we can integrate against. A typical mid-market engagement combining EDR plus Managed IT plus a compliance framework lands as a low-four-figure to mid-five-figure monthly subscription depending on those variables. Petronella does not publish a sticker price because the per-engagement variance is real and a published price would be either misleading or useless.

From the thirty-minute scoping call we produce a one-page fixed-monthly proposal within five business days. The proposal includes scope, deliverables, SLA, escalation, exit terms, and what is and is not included. No surprise overage line items. Initial onboarding labor is bundled into the first sixty days.

Can you handle organizations outside the Raleigh-Durham region?

Yes. Petronella Technology Group is headquartered in Raleigh, NC, at 5540 Centerview Dr., Suite 200, Raleigh, NC 27606. On-site coverage extends across Wake County, Durham County, Orange County, and the broader North Carolina Triangle. The managed-services platform and the 24/7 SOC support customers nationwide on the same SLA terms. For organizations outside North Carolina, the engagement uses our remote operating model with periodic on-site visits scoped into the proposal when needed.

For multinational organizations, the SOC operates against endpoints anywhere on the planet. The agent does not care which country the device is in. The compliance scope determines whether the engagement is appropriate for non-US data sovereignty requirements.

What happens if we want to leave?

Standard contract terms are one year with month-to-month thereafter on a sixty-day notice provision. No auto-renewal lock-in beyond the initial term. On exit you receive the full telemetry retention period in raw format, the SOAR playbook source, the tuning rule library, the compliance evidence pack in framework-mapped format, and a transition runbook for your incoming team.

Petronella operates on the premise that good service retains customers, not contract gotchas. The organizations that leave do so cleanly. We have no incentive to make exit difficult because referrals from former customers matter to us. The contract is written that way deliberately.

How does the AI layer in your stack handle our data?

The artificial intelligence layer that runs alert prioritization, behavioral analysis, compliance-evidence mapping, and detection tuning operates on the Petronella enterprise private AI cluster. That cluster sits on hardware Petronella owns, operates, and physically controls in our data-center footprint. Customer telemetry, control evidence, and operating-baseline data process there and nowhere else.

We do not send customer data to public-cloud large-language-model services for training or inference. If a vendor pitches you a "private tenant" inside a public-cloud LLM service, ask where the model weights live and who has root on the inference nodes. The honest answer is rarely the same as the marketing answer. The private-AI architecture is a deliberate design choice that matters when the compliance scope is real.

Get the Walkthrough

See the Stack Before You Decide

A thirty-minute scoping call produces a real quote, a real onboarding schedule, and a real conversation with a senior engineer (not a sales engineer). Petronella Technology Group has been operating security and IT programs from 5540 Centerview Dr., Suite 200, Raleigh, NC 27606 since 2002. CMMC-RP, RPO #1449, BBB A+ Accredited since 2003.

See also: data protection services.

See also: conference room solutions.

See also: data breach response.