What products and services does IXN Solutions offer?
Last Updated: 4 April 2026
What is a counterintelligence exposure assessment?
IXN Solutions offers a full suite of counterintelligence exposure products, from fast digital assessments to analyst-led evaluations to enterprise CI engagements. Whether you’re just starting to understand your exposure or building a mature insider threat program, there’s a right entry point for your organization.

What is a CI Exposure Snapshot and who is it for?
Automated Risk Indicator
Price: $650
Purpose:
Fast digital analysis identifying potential exposure to insider threat and foreign intelligence targeting.
Deliverable:
• Exposure Score
• Exposure Level
• Primary Risk Driver
• Strategic interpretation
• Recommended next steps
Audience:
• small companies
• startups
• early insider threat programs

What is a CI Exposure Assessment and how does it work?
Analyst-Led Risk Evaluation
Price: $3,500 – $6,500
Purpose:
A structured evaluation performed by an IXN counterintelligence professional to validate exposure drivers and identify organizational vulnerabilities.
Includes:
• analyst review of questionnaire
• external research and OSINT analysis
• risk validation discussion
• tailored executive exposure report
Audience:
• mid-size companies
• cleared contractors
• organizations beginning formal insider threat programs

What is the Enterprise CI Exposure Engagement?
Custom Engagement by CI SMEs
Price: $15,000 – $35,000
Purpose:
A comprehensive organizational counterintelligence risk evaluation and operational analysis.
Includes:
• policy and governance review
• insider threat program maturity evaluation
• detection and reporting capability assessment
• organizational exposure mapping
• on-site engagement (as needed)
• Enterprise CI Exposure Executive Briefing
Audience:
• Large organizations in DIB or with sensitive tech or IP
How do I build an insider risk program on my own?
Build an inspection-ready insider risk and counterintelligence program in hours, not months. IXN’s DIY Kits give you the frameworks, templates, and implementation guides developed from real-world CI and security program experience – ready to deploy without a consultant in the room.
