Jun 15, 2025·8 min read

Private deployment requests: how to answer investors

Private deployment requests can win larger deals, but they also raise support costs. Learn how to discuss upside, limits, and firm product rules.

Private deployment requests: how to answer investors

Why this question gets hard fast

When investors ask about private deployment, they often pack several ideas into one short question. They might mean running the product in a customer's cloud account, giving one customer an isolated environment, or installing the product on premises behind a firewall. Those options sound similar in a meeting. They create very different product and support work once a team has to build and maintain them.

Founders also feel pressure to say yes too early. The request usually comes with a big contract, a known logo, or a buyer with strict security rules. The upside feels immediate. The extra cost does not. It is much easier to picture the revenue than the added release work, longer setup cycles, slower upgrades, and support hours that pile up later.

That is why this topic trips up so many teams. One large deal is not the same as a repeatable product move. If one customer needs a special deployment and pays enough to cover it, that can be a sales exception. If several customers each need a slightly different version, you no longer have one product. You have a growing custom services business.

That tension sits at the center of every investor conversation about self-hosting. Private deployment can raise contract value and help close buyers that would never use a shared SaaS product. It can also slow the whole company down. One customer may want its own release schedule, audit trail, backup method, network rules, or approval flow. None of that looks dramatic on day one. Together, it can drain the time your team wanted to spend on the main product.

Investors ask because they want to know which side of that trade-off they are looking at. Does this open a bigger market, or does it add expensive work that does not scale? A clear answer matters. "We allow private deployment under narrow rules" sounds disciplined. "We can do whatever the customer wants" sounds flexible, but it usually means the limits will disappear as soon as the next large prospect asks for an exception.

Why investors ask for it

Most investors raise private deployment for a simple reason: they see a path to larger contracts. A company that can run your product in its own cloud or data center may have a better shot with banks, healthcare groups, government teams, defense contractors, or large industrial firms. On paper, that can mean bigger annual contracts and lower churn.

They also use the question to test how wide your market is. If several prospects ask for the same deployment model, the request may point to real demand. That matters more than the request itself. A repeated pattern inside one segment often means your current delivery model is blocking deals you could otherwise win.

The same reasons show up again and again. Some buyers have data residency or internal security rules. Some procurement teams reject shared SaaS on principle. Others want network isolation, tighter access controls, or a slower change process than your standard product can support.

The mess starts when everyone talks only about deal size. A private deployment is rarely just "the same product in another place." It often brings custom setup, longer security reviews, separate monitoring, version drift, slower upgrades, and more support time every month.

You also have to separate market demand from one buyer's internal process. If four similar companies ask for private deployment for the same reason, that tells you something useful. If one large prospect asks because its legal team has a blanket rule against shared systems, that may say more about that buyer than about your product strategy.

A simple test helps: does the request repeat across the same industry, company size, and sales stage? If yes, you may have a product gap worth solving. If it appears only after someone gets excited about "enterprise," be careful.

How to explain the revenue upside

Private deployment can lift contract size fast, but only for a narrow group of buyers. The companies that ask for it usually need more control over data, logs, network access, or vendor review than a shared cloud product can offer.

That can lead to much larger contracts. A normal SaaS deal might close at $30,000 to $60,000 a year. A private deployment deal might land at $150,000, $300,000, or more once setup, security review, and support are included. Investors understand that part quickly because the account size is easy to see.

The harder part is the trade-off. These deals rarely move at normal SaaS speed. Legal review takes longer. Security teams ask more questions. Buyers often want onboarding help, custom monitoring, backup rules, and a named support path. If your team spends six months closing and launching one deal, the headline revenue starts to shrink.

The cleanest way to explain this is to separate contract value from actual return. If one private deployment brings in five times your normal annual deal size, the upside may be real. If it brings in only twice as much but eats months of engineering and support time, the gain is much smaller than it looks.

When the upside is real

The numbers usually work when private deployment becomes a defined offer instead of a special favor. The best cases tend to share three traits: the deal size is several times larger than a normal contract, the same package fits more than one customer in the same market, and your team supports one repeatable deployment model instead of building a custom version every time.

That last point matters a lot. One customer can fund a project. A repeatable offer can open a segment. That is why self-hosting for enterprise deals can make sense for regulated customers, but only when you set hard product rules and price the added load clearly.

In an investor meeting, this framing works well because it shows both ambition and restraint. You are not saying yes to every bespoke deployment. You are saying yes to a higher-priced segment when the revenue covers the slower sales cycle and the added support work.

What support drag really looks like

A private deployment can look profitable on paper and still turn into a bad deal. The problem is not the first setup. The problem is everything that starts after the contract is signed.

Most teams count the contract and the initial launch work. They miss the slow drain that follows: extra install steps, separate upgrade paths, customer-only fixes, and late-night incidents that happen only in that one environment.

If you want investors to understand the risk, talk about support drag in hours and release delay, not in vague terms. A private deployment often creates a second product, even if nobody says that out loud.

The work usually spreads across four areas: setup and hardening before go-live, upgrade testing for every release, customer-specific fixes and exceptions, and on-call time when the customer's stack fails in ways your hosted version never does.

That last part gets expensive fast. When your shared cloud product breaks, your team fixes one system. When a self-hosted customer has an issue, your team may have to debug their network, storage, secrets, backup rules, or internal change process before you even reach your own code.

The cost does not stay contained. Engineers who should be shipping product work get pulled into support. Releases slow down because every update needs another test path. Roadmap bets slip by a week here, three days there, and then a month is gone.

How a contract shrinks in real life

A simple example makes this easier to see. Say a customer signs for $120,000 a year. That sounds strong. Then your team spends three weeks on deployment, adds custom upgrade checks every month, and loses one engineer day each week to support and incident follow-up.

Now add the cost of delayed releases. If the main product slips and expansion revenue moves out by one quarter, that single deal may wipe out much of its own margin.

This is why smart teams set product rules early. Oleg Sotnikov often advises founders to price private deployment against total operating load, not just contract value. If a deal needs permanent exceptions, it is not really a sales win. It is a tax on the whole product.

Product rules that stop sprawl

Model the Real Margin
Compare contract value against engineering time, incidents, and delayed roadmap work.

Sprawl starts when a team answers private deployment requests with a vague "yes." One exception turns into a second hosting pattern, then a separate release calendar, then a support burden that eats the margin from the deal.

You need rules before the meeting. If you make them up during negotiation, the biggest prospect ends up writing your product policy for you.

A good rule set is usually simple. Private deployment is available only to customers who clear a defined bar, such as contract size, security need, or legal requirement. You offer one deployment model, not a different setup for every buyer. Private customers stay on the same roadmap, release process, and support boundaries as everyone else unless the contract says otherwise and the price covers it. Requests outside the product stay outside it, including custom forks, special release timing, unique admin tools, or permanent one-customer features.

The first rule does most of the work. If every mid-sized prospect can ask for self-hosting, your team will soon support several versions of the same product. That usually means slower shipping, harder testing, and constant confusion across sales and engineering.

The second rule keeps operations sane. Pick one deployment pattern you can repeat with the same scripts, monitoring, upgrade path, and support process. If a buyer wants a different database, cloud, or branch, treat that as custom engineering, not as part of the standard product.

Roadmap discipline is where many teams fail. Private customers can get the same product in a different place, but they should not get a separate product. No side backlog. No permanent patch line. No promise that their ticket jumps ahead of work planned for everyone else.

This is the kind of fractional CTO advice that saves months of cleanup later. A one-page policy can prevent a lot of expensive improvisation.

How to answer in the meeting

Investors usually ask this to test judgment, not hosting skills. If you jump straight into VPCs, clusters, or compliance checklists, you lose the room. Start with the business case.

A clean answer sounds like this: "We offer private deployment only for a narrow set of customers. That usually means regulated teams or large accounts where the contract size covers the extra work. For everyone else, our shared product gives better margins and faster updates."

Then get specific. Name the customer type and the revenue floor. "We would consider this for banks, healthcare groups, or enterprise buyers above $100k to $250k ARR" is much stronger than "some large customers ask for it." Investors want to hear that you know who this is for and who it is not for.

After that, talk about support drag in plain numbers. Private deployment creates ongoing work: setup, monitoring, upgrade planning, security review, and customer-specific support. Even when the software stays the same, each install can eat part of an engineer's time every month. That is why small deals rarely make sense.

You also need rules. Keep them short and concrete:

  • one codebase
  • one approved deployment pattern
  • paid setup and a yearly premium
  • fixed upgrade windows
  • clear ownership for support and incidents

End with a direct recommendation. Say "yes" if the buyer fits the target profile and the deal covers the support load. Say "no" if the customer is too small or wants custom terms that spread into the product. Say "later" if the revenue looks promising but your team cannot support it yet.

That structure keeps the meeting focused on business judgment instead of server diagrams.

A simple example

Stop Custom Work Early
Set release, support, and scope limits before a big logo writes your product policy.

A startup sells internal workflow software to mid-sized healthcare groups. Most customers pay $24,000 to $40,000 a year for the shared cloud version. Then a hospital network asks for a private deployment in its own cloud and offers $180,000 a year.

On paper, that looks like a big jump. Founders often see the contract size and assume the deal will lift revenue quickly. Investors may see the same thing and think self-hosting opens a whole new tier of customers.

The problem shows up when the team prices the work honestly. That customer is not just buying hosting in a different place. It usually wants a separate security review, a custom deployment path, slower release windows, and support during its change process.

A simple model makes the gap clear:

  • 8 weeks of engineering to package, harden, and document the setup
  • one-time security and compliance work that pulls senior people off the roadmap
  • slower releases because every update needs extra testing in a second environment
  • more support tickets because the customer controls part of the infrastructure

Now the $180,000 deal looks smaller. If the startup spends $60,000 to $90,000 in real team time during the first year, plus ongoing support drag, margin falls quickly. The product team also pays a hidden cost: features ship later for everyone else.

The founder still decides to offer the deployment, but only under strict rules. The hospital must take the same build as cloud customers. No custom forks. No one-off integrations buried inside the contract. The startup charges a setup fee, sets a minimum annual contract value, and limits release cadence to one supported schedule.

That decision works because it protects the main product. The company can still take larger accounts, but it does not let one customer rewrite how the product ships. If the hospital refuses those rules, the startup walks away. That is usually the right call. A large deal that creates its own product line is often smaller than it looks.

Mistakes that create bespoke deployments

Most private deployment deals go wrong for boring reasons, not technical ones. A team says yes too early, prices the work like a normal deal, and only later realizes it built a second product by accident.

The first mistake is promising custom features to win one logo. A buyer asks for a special auth flow, a custom audit report, or a deployment rule that fits only its setup. Sales hears "big contract" and treats every request as reasonable. Product and engineering inherit work no other customer wants.

The next mistake is underpricing support and upgrade work. The first installation may look profitable on paper. The trouble starts three months later, when every release needs extra testing, custom docs, manual fixes, and late-night calls because one customer runs a different stack.

Separate branches make the damage spread faster. One branch becomes two. Then a bug fix lands in the main product, but nobody ports it cleanly to the private version. Release dates slip, engineers waste time comparing diffs, and the customer learns to expect delays.

A simple rule helps: if a feature will not move into the main product on a clear timetable, treat it as a time-boxed exception or do not sell it at all.

Another mistake is letting sales normalize every exception. Self-hosting for enterprise deals can make sense, but only when the offer has hard boundaries. If every large prospect can rewrite those boundaries, the company stops selling a product and starts running a custom shop.

The last mistake is quieter but just as expensive. Nobody owns the offering. Sales sells it, engineering builds it, support carries it, and finance prices it, yet no one has the authority to say no.

A strong owner keeps the rules tight: one release path, one support model, one pricing method, and a short list of allowed changes. That is usually the difference between a useful enterprise option and a mess that slows the whole business.

Quick checks before you commit

Protect Your Main Product
Keep one codebase and firm boundaries as enterprise requests start to grow.

Most private deployment requests look profitable in a spreadsheet before anyone counts the human cost. The real number appears later, when your team spends nights on upgrades, customer-specific fixes, and security work that only one account needs.

Before you agree to anything, check the margin after support time, not before. Include setup, upgrades, patching, incident response, compliance questions, and the hours your best engineer will spend away from the main product.

Look for more than one buyer who wants the same setup. If only one prospect asks for it, you are probably taking custom work with product-sized consequences.

Test whether your team can update every deployment safely. If one bug fix turns into five separate release jobs, the model will wear your team down.

Write the rules on one page. Spell out who qualifies, what the customer gets, what they do not get, how updates work, what support hours are included, and when you stop supporting old versions.

Then ask the hardest question: does saying no protect the main product? Sometimes a clean no saves months of drift, especially when the request pulls you away from the customers who fit your standard offer.

A small example makes this clearer. Say one enterprise buyer offers a large contract for self-hosting, but your team has only four engineers. The revenue may look great in quarter one. Then a security patch lands, two custom integrations break, and the next public release slips by three weeks because everyone is busy with one customer.

That is why the one-page rule matters. If your terms need a long trail of exceptions, the product is no longer in charge. The sales process is.

Private deployment can still make sense. It usually works when pricing covers ongoing support, at least a few similar buyers exist, and your team can ship updates with the same safety every time. If those conditions are missing, the safer choice is often the less exciting one: keep the main product simple and decline the deal.

What to do next

Private deployment gets expensive when each salesperson, founder, or investor gives a different answer. Put the rule on paper now, while the pressure is still low. A short deployment policy is enough if it answers four questions: who can buy it, what is included, what is excluded, and when your team says no.

Keep that policy tight. One page usually works better than a long memo nobody reads. If a deal needs custom security reviews, special hosting, or separate release timing, say whether those are paid add-ons, enterprise-only terms, or outside your model.

Then build one slide for investor meetings. Show the upside and the cost in plain numbers. A simple table usually works better than a pitch-heavy story.

Compare a standard contract with a private deployment offer on a few points: extra annual revenue per deal, setup time from engineering, monthly support hours after launch, added infrastructure cost, and expected renewal odds.

If the private version adds $120,000 in revenue but pulls 15 engineer days, ongoing on-call work, and a separate release branch, the margin may be worse than it first appears. Investors usually respond well when you show that math without drama.

After that, test the offer with two or three real prospects. Do not ask whether they "like" self-hosting. Ask what they need to sign, what security rule blocks the shared version, and whether they would pay more for a managed private setup. Those answers tell you whether the demand is real or just a buying signal.

If your team keeps debating the rules, it helps to get a second opinion before bespoke deployment limits start slipping. Oleg Sotnikov at oleg.is works with startups on product boundaries, infrastructure decisions, and Fractional CTO questions like this, especially when the real issue is operating discipline rather than hosting mechanics.

Write the policy, build the slide, test it with real buyers, and then update the rule with actual numbers.

Frequently Asked Questions

What counts as private deployment?

It usually means one of three things: you run the product in the customer's cloud account, you give that customer an isolated environment, or you install it inside their own data center. Those options look similar in a meeting, but they create very different setup, upgrade, and support work.

Why do investors ask about private deployment?

They want to see your judgment. A good answer shows whether private deployment opens a real market for you or just adds expensive work that slows the main product. Investors care less about the hosting details and more about whether you can keep margins and product focus.

When does private deployment actually make sense?

Say yes when the request repeats across the same type of buyer and the contract covers the extra load. Regulated teams, large healthcare groups, banks, and some enterprise buyers often fit. If only one prospect asks for it, treat it as an exception, not a product move.

How much bigger should the contract be?

Aim for a deal that is several times larger than your normal SaaS contract, not just a little bigger. If a private deployment only doubles revenue but eats months of engineering and support time, the math usually falls apart. The offer works better when the same package fits more than one customer.

What hidden costs do founders miss?

Most teams miss the drag after launch. Engineers spend time on upgrades, customer specific fixes, security reviews, incident follow up, and debugging the customer's network or storage before they even touch your code. That slow drain delays roadmap work for everyone else.

How do we stop one deal from turning into custom work?

Set product rules before sales starts negotiating. Offer one deployment pattern, keep one codebase, charge for setup, and keep private customers on the same roadmap unless the contract clearly pays for something else. If a buyer wants a custom database, branch, or release process, treat that as separate engineering work or say no.

Should private customers get their own release schedule?

Usually no. Give them the same product in a different place, not a different product. Once you promise separate release timing or a permanent patch line, you create version drift and support pain that spreads into every future release.

How should I answer this in an investor meeting?

Start with the business case, not the infrastructure. A short answer works well: you offer private deployment only for a narrow group of buyers where the contract size covers setup, support, and slower upgrades, and everyone else gets better value from the shared product. Then name the buyer type, the revenue floor, and the rules.

How should we price private deployment?

Price the full operating load, not just hosting. Charge a setup fee, a higher annual contract, and clear support terms that match the real work your team will do after launch. If the customer wants custom reviews, slower release windows, or special support, put those costs in the contract from day one.

When should we decline a private deployment deal?

Walk away when the buyer is too small, the request does not repeat in your market, or the customer wants permanent exceptions that pull your team off the main product. A large logo can still be a bad deal if it forces custom features, separate branches, or open ended support. A clean no often saves more than a shaky yes.

Private deployment requests: how to answer investors | Oleg Sotnikov