Features & Security Architecture
The tools program managers have had for 20 years were built for task lists, not phase gates. Phase Gate Manager brings the visibility, structure, and discipline that real program work has always demanded — from the first gate to the day it ships.
Platform Capabilities
Each capability below exists because a real program needed it. No bloat, no filler, no features held back for a higher tier. Every license includes every feature.
The Honest Comparison
A straight-talk comparison across the three approaches most teams are using today. Not every row favors Phase Gate Manager — but the rows that matter for program work, do.
| Capability | Spreadsheets |
Generic PM Tools |
Enterprise Phase Gate |
Phase Gate Manager |
|---|---|---|---|---|
| Pricing & Model | ||||
| One-time perpetual license | — | — | — | ● Yes |
| Typical 3-year total cost (25 users) | Hidden labor cost | $18K–$30K | $150K–$900K+ | $27,500 flat |
| Hard pricing cap | N/A | — | — | ● $50K cap |
| Feature gating by tier | N/A | Yes — common | Yes — common | ● None |
| Phase Gate Methodology | ||||
| Native phase gate workflow | — | — | ● | ● |
| Gate approval with evidence requirement | — | — | ◐ Varies | ● |
| Industry gate templates included | — | — | ◐ Paid add-on | ● All included |
| Baseline + waterfall schedule view | — | ◐ | ● | ● |
| Risk & Change Management | ||||
| Risk register with severity + mitigation | ◐ Manual | ◐ Add-on | ● | ● |
| Change control workflow | — | — | ● | ● |
| Regulated mode (evidence-gated approvals) | — | — | ● | ● |
| Financial Tracking & Reporting | ||||
| Budget / EAC / variance tracking | ◐ Manual | — | ● | ● |
| Financial data gated at database layer | — | ◐ UI only | ◐ | ● |
| Executive dashboard (portfolio view) | — | ◐ | ● | ● |
| Print-ready PDF reports with branding | ◐ | ◐ | ● | ● |
| Quality Toolkit | ||||
| 5-Why, 8D, PDCA built in | — | — | ◐ | ● |
| Problem Resolution Timeline | — | — | — | ● |
| Security & Data Ownership | ||||
| Customer owns their data + infrastructure | ● | — | — | ● |
| Single-tenant deployment (isolated instance) | N/A | — | ◐ | ● |
| Immutable audit trail | — | ◐ | ● | ● |
| Database-layer row-level security | — | ◐ | ◐ | ● |
| Setup & Ongoing | ||||
| Time from purchase to live | Days | Hours – Weeks | 3 – 6 months | ● Under 20 min |
| Requires consultants to deploy | — | ◐ Sometimes | Yes — common | ● Turnkey |
| Price increases at renewal | N/A | Frequent | Frequent | ● Never — perpetual |
● Fully supported · ◐ Partial / varies by vendor or plan · — Not supported. Claims about competitor categories reflect general market characteristics, not specific vendor offerings.
Three Things That Matter Most
The single biggest difference between Phase Gate Manager and every multi-tenant SaaS tool on the market: you own the whole stack, you run it on your own infrastructure, and every administrative action — ours included — is logged in the same audit trail you already use for your own users.
Security Architecture
Phase Gate Manager runs on top of two SOC 2 Type II certified platforms. Each layer handles what it does best — and together they provide the protection that regulated-industry work demands.
| Security Layer |
Cloudflare Pro
Network Edge
|
Supabase Pro
Database Layer
|
Phase Gate Manager
Application Layer
|
|---|---|---|---|
| Managed WAF (Web Application Firewall) | Managed rulesets, continuous updates | Handled upstream | Handled upstream |
| Advanced DDoS Mitigation | Continuous, auto-scaling protection | Handled upstream | Handled upstream |
| Bot Management | Automated bot detection & blocking | Handled upstream | Handled upstream |
| TLS 1.3 Encryption in Transit | Enforced at edge | Enforced to DB | Inherited |
| AES-256 Encryption at Rest | Not applicable | All data encrypted at rest | Inherited |
| Row-Level Security (RLS) | Not applicable | Enforced at DB query level | Policies defined in app |
| Authentication & Session Management | Not applicable | JWT, bcrypt, MFA support | Role enforcement & session policies |
| Leaked Password Detection | Not applicable | Checked on set/change | Inherited |
| Brute-Force Protection | Edge rate limiting | Auth lockout policies | Inherited |
| Financial & Confidential Data Gating | Not applicable | Enforced at DB, not UI | Policy definition & enforcement |
| Immutable Audit Trail | Not applicable | Append-only log table | Every action logged w/ user + time |
| Backup & Point-in-Time Recovery | Not applicable | Automated daily backups | Inherited |
| DNS & SSL Certificate Management | Fully managed | Handled upstream | Handled upstream |
| Zero-Day Threat Protection | Managed ruleset updates | Platform-level patches | Critical patches — always included |
| Data Residency — US Region | Global network with US POPs | AWS US-East default | Inherited |
How We Test Our Security
Security posture is only as good as the evidence backing it. Phase Gate Manager commits to two independent verifications of the code base and deployment — one at launch, and one before every single customer goes live.
Frequently Asked