  # Best Vulnerability Assessment Services Providers - Page 5

  *By [Lauren Worth](https://research.g2.com/insights/author/lauren-worth)*

   Vulnerability assessment services are designed to identify security holes within an organization’s IT infrastructure, specifically related to cyber threats. Vulnerability assessment providers run a series of diagnostics on company devices, applications, and networks, and utilize this data to recommend areas for improvement based on urgency and scope. These providers often then suggest the ideal [cybersecurity services](https://www.g2.com/categories/cybersecurity-services) and [IT software](https://www.g2.com/categories/it-security), in addition to device or process upgrades, to help address each vulnerability and ensure maximum security across the organization. Businesses can work with these providers in conjunction with [threat intelligence services](https://www.g2.com/categories/threat-intelligence-services) to provide a complete, up-to-date picture of internal security health and potential risks to company data and devices.

Vulnerability assessment services go hand in hand with [cybersecurity consulting](https://www.g2.com/categories/cybersecurity-consulting), [incident response](https://www.g2.com/categories/incident-response-services), [network security](https://www.g2.com/categories/network-security-services), and other [cybersecurity services](https://www.g2.com/categories/cybersecurity-services) to keep companies aware of threats, safe from attacks, and prepared to respond in the event of a breach or related event. Businesses can deploy [vulnerability management software](https://www.g2.com/categories/vulnerability-management) in lieu of or in addition to vulnerability assessment services in order to maximize awareness and protection.




  ## How Many Vulnerability Assessment Services Providers Products Does G2 Track?
**Total Products under this Category:** 186

  
## How Does G2 Rank Vulnerability Assessment Services Providers Products?

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 900+ Authentic Reviews
- 186+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.

  
  
---

**Sponsored**

### Insight Assurance

Insight Assurance is a global cybersecurity and compliance firm that supports organizations across industries in navigating complex regulatory frameworks with clarity and confidence. Our team brings extensive experience from top public accounting firms—including Big 4 backgrounds—to deliver high-quality audit and advisory services aligned with SOC 2, ISO 27001, PCI DSS, HITRUST, and other industry standards. We serve startups, large enterprises, and public sector entities with a flexible, collaborative approach that emphasizes risk awareness, operational integrity, and long-term resilience. As an independent third-party, we are committed to helping organizations meet their compliance responsibilities without compromising on quality or trust. Delivering Quality, Assuring Trust.



[Visit website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=1101&amp;secure%5Bdisplayable_resource_id%5D=1101&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=page_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=1101&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=1317354&amp;secure%5Bresource_id%5D=1101&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fvulnerability-assessment-services%3Fpage%3D5&amp;secure%5Btoken%5D=9d4150ee4032e644ecfa17a0b4d37d11e09e66eb150dc5ae91e23b083abc294b&amp;secure%5Burl%5D=https%3A%2F%2Fhubs.li%2FQ04785q90&amp;secure%5Burl_type%5D=custom_url)

---

  ## What Are the Top-Rated Vulnerability Assessment Services Providers Products in 2026?
### 1. [Information Security services](https://www.g2.com/products/information-security-services/reviews)
  IARM, Trustworthy Partner forever, focuses on Information / Cybersecurity services and solutions across all verticals. They are few companies in India to focus exclusively on End-End Information Security solutions and services. Expertise in Penetration Testing, Vulnerability assessment services, Network, Mobile, Cloud Security &amp; Secure Monitoring and their constant endeavours to stay abreast of security trends have made them the primary choice of their customers in Information Security Solutions.



**Who Is the Company Behind Information Security services?**

- **Seller:** [IARM](https://www.g2.com/sellers/iarm)
- **Year Founded:** 2016
- **HQ Location:** Chennai, IN
- **LinkedIn® Page:** http://www.linkedin.com/company/iarminfo (43 employees on LinkedIn®)



### 2. [InfoSight](https://www.g2.com/products/infosight/reviews)
  InfoSight, Inc. offers proven Cyber Security, Regulatory Compliance, Risk Management and Infrastructure Solutions to protect your business and your customers from cyber crime and fraud.



**Who Is the Company Behind InfoSight?**

- **Seller:** [InfoSight](https://www.g2.com/sellers/infosight)
- **Year Founded:** 1998
- **HQ Location:** Miami Lakes, US
- **Twitter:** @InfoSight (643 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/infosight-inc-/ (57 employees on LinkedIn®)



### 3. [Innove](https://www.g2.com/products/innove/reviews)
  Innove provides cyber security consulting to help clients understand and prepare for cyber threats.



**Who Is the Company Behind Innove?**

- **Seller:** [Innove](https://www.g2.com/sellers/innove)
- **HQ Location:** San Antonio, TX
- **LinkedIn® Page:** https://www.linkedin.com/company/No-Linkedin-Presence-Added-Intentionally-By-DataOps (1 employees on LinkedIn®)



### 4. [InsightX](https://www.g2.com/products/insightx/reviews)
  Intelligenx enables you to regain control of information security with a variety of solutions that provide adaptable fast environments. We take you a step further on Security and one step ahead of the threats. Intelligenx aggregates all information security data across systems, employees and social markers to provide a single integrated view of your safety.



**Who Is the Company Behind InsightX?**

- **Seller:** [Intelligenx](https://www.g2.com/sellers/intelligenx)
- **Year Founded:** 1996
- **HQ Location:** Sterling, US
- **LinkedIn® Page:** http://www.linkedin.com/company/intelligenx (6 employees on LinkedIn®)



### 5. [IntegSec](https://www.g2.com/products/integsec/reviews)
  IntegSec delivers expert offensive cybersecurity testing and simulation solutions to protect organizations from the ever-changing cyber threat landscape. Our highly experienced and certified professionals provide cutting-edge testing with recommendations prioritized and tailored to your needs. From networks to applications, we help harden your defenses to be ready for tomorrow’s challenges.



**Who Is the Company Behind IntegSec?**

- **Seller:** [IntegSec](https://www.g2.com/sellers/integsec)
- **Year Founded:** 2024
- **HQ Location:** WILMINGTON, US
- **LinkedIn® Page:** https://www.linkedin.com/company/integsec (9 employees on LinkedIn®)



### 6. [In-Telecom](https://www.g2.com/products/in-telecom/reviews)
  In-Telecom is a Louisiana-based telecommunications and technology services provider, founded in 2009 as a consulting and business telephone system solution provider. Since then, we have evolved into a full-service technology company providing customized solutions for cloud telephone, voice-over IP, managed IT services, video conferencing, cyber security &amp; data backup, physical security, internet services, and more. We attribute much of our success to the ability to supply the highest level of customer service and technical expertise, thus becoming the singular solution provider for our customers.



**Who Is the Company Behind In-Telecom?**

- **Seller:** [In-Telecom](https://www.g2.com/sellers/in-telecom)
- **Year Founded:** 2009
- **HQ Location:** Slidell, Louisiana
- **Twitter:** @_intelecom_ (46 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/in-telecom/ (139 employees on LinkedIn®)



### 7. [InteliSecure](https://www.g2.com/products/intelisecure/reviews)
  InteliSecure is the first and only Managed Security Service Provider (MSSP) to challenge the status quo in cybersecurity by delivering a hybrid application of expert human intelligence with a proven Critical Asset Protection Program methodology.



**Who Is the Company Behind InteliSecure?**

- **Seller:** [InteliSecure](https://www.g2.com/sellers/intelisecure)
- **Year Founded:** 2002
- **HQ Location:** Sunnyvale, California, United States
- **Twitter:** @InteliSecure (350 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/proofpoint (4,756 employees on LinkedIn®)



### 8. [Intetics](https://www.g2.com/products/intetics/reviews)
  Intetics Inc. is a leading American technology company providing custom software application development, distributed professional teams creation, software product quality assessment, and “all-things-digital” solutions built with SMAC, RPA, AI/ML, IoT, blockchain, and GIS/UAV/LBS technologies. Based on proprietary pioneering business models of Offshore Dedicated Team® and Remote In-Sourcing®, an advanced Technical Debt Reduction Platform (TETRA™) and measurable SLAs for software engineering, Intetics helps innovative organizations capitalize on global talent with our in-depth engineering expertise based on our Predictive Software Engineering framework. Intetics core strength lays in design of software products in conditions of incomplete specifications. We have extensive industry expertise in Education, Healthcare, Logistics, Life Sciences, Finance, Insurance, Communications, and custom ERP, CRM, Intelligent Automation and Geospatial solutions. Our advanced software engineering background and outstanding quality management platform, along with an unparalleled methodology for talent acquisition, team building and talent retention, guarantee that our clients receive exceptional results for their projects. At Intetics, our outcomes do not just meet clients expectations, they have been exceeding them for a quarter of a century. Intetics operates from multiple offices in the USA, Europe and Latin America, hiring the best talent available worldwide. Intetics is ISO 9001 (quality), ISO/IEC 27001 (security), and ISO/IEC 42001:2023 (Artificial Intelligence Management Systems) certified, and a Microsoft Gold, Amazon, and UiPath Silver partner. The company’s innovation and growth achievements are reflected in winning prestigious titles and awards, including Inc. 5000, Software 500, CRN 100, American Business Awards, Deloitte Fast 50, European IT Excellence Awards, Best European BPO, Stevie People’s Choice Awards, Clutch and ACQ5 Awards, IAOP Global Outsourcing 100, and Fortune Innovative 300 lists. You can find more information at https://intetics.com


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 1

**Who Is the Company Behind Intetics?**

- **Seller:** [Intetics](https://www.g2.com/sellers/intetics)
- **Year Founded:** 1995
- **HQ Location:** Naples, Florida, United States
- **Twitter:** @intetics (2,619 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/intetics (489 employees on LinkedIn®)
- **Phone:** +1 (239) 217-4907

**Who Uses This Product?**
  - **Company Size:** 100% Small-Business


#### What Are Intetics's Pros and Cons?

**Pros:**

- Communication (1 reviews)
- Cost Efficiency (1 reviews)
- Deep Understanding (1 reviews)
- Efficiency Optimization (1 reviews)
- Expertise (1 reviews)

**Cons:**

- Poor Customer Support (1 reviews)
- Project Delays (1 reviews)

### 9. [KEYW](https://www.g2.com/products/keyw/reviews)
  KeyW is passionate about securing our nation and its allies. Our advanced engineering and technology solutions support the collection, processing, analysis and dissemination of information across the full spectrum of the Intelligence, Cyber and Counterterrorism communities missions.



**Who Is the Company Behind KEYW?**

- **Seller:** [KeyW](https://www.g2.com/sellers/keyw)
- **Year Founded:** 2008
- **HQ Location:** Hanover, US
- **LinkedIn® Page:** https://www.linkedin.com/company/keyw-corporation/ (299 employees on LinkedIn®)



### 10. [Kratikal](https://www.g2.com/products/kratikal/reviews)
  Kratikal, being a CERT-In empanelled business, brings a level of credibility and expertise that makes our Penetration Testing and Compliance Services stand out as a pillar in securing your IT infrastructure. Our diverse range VAPT services include: Application Testing: Web and Mobile Network Penetration Testing Cloud Penetration Testing Internet of Things (IoT) Testing Thick Client Threat Modeling Red Teaming Secure Code Review Medical Device Testing Our compliance services span across: Regulatory Compliance: Customized services for SEBI, SAR, IRDAI, IS AUDIT(RBI), and CERT-In requirements, focusing on integrating a security and compliance culture at the core of your organization. Standard Compliance: Assistance in achieving and maintaining standards such as PCI DSS, GDPR, HIPAA, ISO 27001, and SOC 2, ensuring your business remains at the forefront of compliance management. Our integrated VAPT and Compliance services ensure that your organization not only meets today&#39;s security standards but is also prepared for tomorrow&#39;s challenges.


  **Average Rating:** 4.0/5.0
  **Total Reviews:** 2

**Who Is the Company Behind Kratikal?**

- **Seller:** [Kratikal Tech](https://www.g2.com/sellers/kratikal-tech)
- **Year Founded:** 2012
- **HQ Location:** Noida, Uttar Pradesh
- **Twitter:** @kratikal (80 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/kratikal (144 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 50% Mid-Market, 50% Small-Business


### 11. [Kroll](https://www.g2.com/products/kroll/reviews)
  Kroll experts provide rapid response to more than 3,000 cyber incidents of all types annually. We help countless more clients with litigation support (including expert witness services); managed detection and response services for both active threats and as an integral part of network security; notification solutions, including multilingual call center support; and proactive services, including general and threat-focused risk assessments, response planning, tabletop exercises and more. With years of public and private sector experience and law enforcement service, our cyber security experts can provide invaluable leadership at any point in the cyber risk continuum. Our experts are able to deliver best-in-class network, endpoint and cloud security through our managed detection and response solution, Kroll Responder. Responder handles every step, with 24x7 managed detection and response services fueled by threat hunting and superior incident response. Our collaborative team culture ensures you always benefit from the latest threat intelligence, best practices and technological advancements for every challenge, start to finish. Kroll is also a preferred/approved cyber security vendor for more than 50 cyber insurance carriers, including some of the largest underwriters in the world, and offers client-friendly retainers that cover both incident response and proactive services.


  **Average Rating:** 3.8/5.0
  **Total Reviews:** 3

**Who Is the Company Behind Kroll?**

- **Seller:** [Kroll](https://www.g2.com/sellers/kroll)
- **Year Founded:** 1932
- **HQ Location:** New York, New York, United States
- **Twitter:** @KrollWire (5,845 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/kroll (6,681 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 67% Small-Business, 33% Mid-Market


### 12. [Kudelski Security](https://www.g2.com/products/kudelski-security/reviews)
  Kudelski Security is a premier cybersecurity solutions provider, working with the most security-conscious organizations in Europe and across the United States.



**Who Is the Company Behind Kudelski Security?**

- **Seller:** [Kudelski Security](https://www.g2.com/sellers/kudelski-security)
- **HQ Location:** N/A
- **LinkedIn® Page:** https://www.linkedin.com/company/No-Linkedin-Presence-Added-Intentionally-By-DataOps (1 employees on LinkedIn®)



### 13. [Leviathan Security Group](https://www.g2.com/products/leviathan-security-group/reviews)
  Founded in 2006, Leviathan has focused on the world&#39;s most challenging cybersecurity problems. We are looked to by industry leaders for our unique perspective on how to solve these challenges. Our professional services experts perform security assessments on the world&#39;s most critical infrastructure and provide guidance on governance, risk and compliance services for highly regulated environments.



**Who Is the Company Behind Leviathan Security Group?**

- **Seller:** [Leviathan Lotan](https://www.g2.com/sellers/leviathan-lotan)
- **Year Founded:** 2006
- **HQ Location:** Tukwila, US
- **LinkedIn® Page:** https://www.linkedin.com/company/leviathan-security-group/ (44 employees on LinkedIn®)



### 14. [Lighthouse Security](https://www.g2.com/products/lighthouse-security/reviews)
  Lighthouse Security&#39;s Business Continuity and Incident Management services provide a comprehensive framework designed to ensure organizational resilience in the face of unforeseen events. By maintaining critical services and safeguarding brand reputation, these services help businesses navigate disruptions such as accidents, criminal activities, or natural disasters, thereby ensuring long-term survivability. Key Features and Functionality: - Business Continuity: - Risk Assessments - Business Impact Analysis - Risk Management - Business Continuity Planning - Incident Management: - Emergency Response - Disaster Recovery - Incident Management Public Relations - Planning, Training, and Testing Exercises The primary value of these services lies in their ability to equip organizations with the necessary tools and strategies to effectively manage and recover from disruptions. By proactively identifying risks and implementing tailored continuity plans, Lighthouse Security ensures that businesses can maintain operations, protect their reputation, and minimize the impact of unexpected events.



**Who Is the Company Behind Lighthouse Security?**

- **Seller:** [Lighthouse Security](https://www.g2.com/sellers/lighthouse-security)
- **HQ Location:** London/Cotswolds , GB
- **LinkedIn® Page:** http://www.linkedin.com/company/lighthouse-security-limited (12 employees on LinkedIn®)



### 15. [Loginsoft](https://www.g2.com/products/loginsoft/reviews)
  Loginsoft is a Cybersecurity services company providing comprehensive cybersecurity solutions tailored to meet the unique needs of organizations. Loginsoft is trusted by several leading security product and Enterprise companies as their best kept secret Technology partner. For over 20 years, leading companies in Telecom, Cybersecurity, Healthcare, Banking, New Media, and more have come to rely on Loginsoft as a trusted resource for technology talent. Loginsoft offers a comprehensive range of Cybersecurity solutions including, but not limited to: 𝟭) 𝗦𝗼𝗳𝘁𝘄𝗮𝗿𝗲 𝗖𝗼𝗺𝗽𝗼𝘀𝗶𝘁𝗶𝗼𝗻 𝗔𝗻𝗮𝗹𝘆𝘀𝗶𝘀 (𝗦𝗖𝗔): Loginsoft has researched over 30,000+ CVEs across several open-source packages, helping Application Security teams to prioritize the vulnerabilities. - Security Advisory Research and Generating Metadata for Vulnerabilities in Open-Source Components/Software for OWASP Top 10. - Discovering Zero-Day Vulnerabilities in Open-Source Components. - SAST &amp; DAST Analysis. 𝟮) 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 &amp; 𝗧𝗵𝗿𝗲𝗮𝘁 𝗜𝗻𝘁𝗲𝗹𝗹𝗶𝗴𝗲𝗻𝗰𝗲 𝗜𝗻𝘁𝗲𝗴𝗿𝗮𝘁𝗶𝗼𝗻𝘀: - Threat Intelligence Integrations and Connector Development with TIP, SOAR, SIEM, Ticketing Platforms. - Implementation of Security Products and support. - Security Integrations for Cloud SIEM. - Integrations Maintenance and Support. 𝟯) 𝗩𝘂𝗹𝗻𝗲𝗿𝗮𝗯𝗶𝗹𝗶𝘁𝘆 &amp; 𝗖𝗼𝗻𝗳𝗶𝗴𝘂𝗿𝗮𝘁𝗶𝗼𝗻 𝗠𝗮𝗻𝗮𝗴𝗲𝗺𝗲𝗻𝘁 𝗶𝗻 𝗢𝗩𝗔𝗟, 𝗦𝗖𝗔𝗣: - Generate Security Content to support Vulnerability Management, Patch Management and Compliance Management in SCAP supported formats like Open Vulnerability and Assessment Language (OVAL) Extensible Configuration Checklist Description Format (XCCDF). 𝟰) 𝗖𝗩𝗘 𝗩𝘂𝗹𝗻𝗲𝗿𝗮𝗯𝗶𝗹𝗶𝘁𝘆 𝗜𝗻𝘁𝗲𝗹𝗹𝗶𝗴𝗲𝗻𝗰𝗲: - Vulnerability intelligence on emerging CVEs on watch, Pre-NVD insights &amp; trending OSS CVEs. 𝟱) 𝗥𝗲𝘀𝗲𝗮𝗿𝗰𝗵 𝗮𝘀 𝗮 𝗦𝗲𝗿𝘃𝗶𝗰𝗲: - Developing rules for Threat Detection supporting formats in Sigma, OSquery, Splunk which could complement Incident Response Activities &amp; Ransomware Protection Solutions. - Developing fingerprints to track the threat actor infrastructure such as Malware C2 Panels, Phishing Kits etc. to complement Threat Intelligence &amp; Botnet Protection Solutions. - Developing Human-Readable fingerprints to detect wide-varieties of Software/Hardware products to complement External+Internal Attack Surface Management Solutions. Loginsoft is a partner with industry leading technology vendors such as Palo Alto, Splunk, Elastic, IBM Security, ThreatConnect, and so on.



**Who Is the Company Behind Loginsoft?**

- **Seller:** [Loginsoft](https://www.g2.com/sellers/loginsoft)
- **HQ Location:** Chantilly, US
- **LinkedIn® Page:** https://www.linkedin.com/company/loginsoft (247 employees on LinkedIn®)



### 16. [Lyon Tech](https://www.g2.com/products/lyon-tech/reviews)
  Lyon is a specialist IT and technology services provider for London&#39;s creative industry. With years of experience, we tackle complex security and technology challenges swiftly and efficiently. Our comprehensive services include IT support, disaster recovery, business continuity, IT governance, cloud services, and advanced cybersecurity. Our team of certified engineers is equipped to handle a wide range of IT needs, from office-to-home working transitions to data security concerns and everyday technical issues. We transform your IT experience, ensuring seamless infrastructure at every level. By partnering with Lyon, you&#39;ll enhance your efficiency, security, and ultimately, your creative potential.



**Who Is the Company Behind Lyon Tech?**

- **Seller:** [Lyon Tech](https://www.g2.com/sellers/lyon-tech)
- **Year Founded:** 2017
- **HQ Location:** London, GB
- **LinkedIn® Page:** https://www.linkedin.com/company/lyonmanagedservices (26 employees on LinkedIn®)



### 17. [Managed Services](https://www.g2.com/products/it-outlet-managed-services/reviews)
  IT Outlet’s Managed Services program works as an extension of your business. Entirely offloading your IT needs to our team, ensuring that your business is running the way you want, all the time. IT Outlet offers hassle-free services that pride themselves on creating authentic relationships everyday. With 24/7 support, quick response times and staff members that want to see your business succeed, we are here to support you and your IT needs.



**Who Is the Company Behind Managed Services?**

- **Seller:** [IT Outlet](https://www.g2.com/sellers/it-outlet)
- **Year Founded:** 2006
- **HQ Location:** Brandon, US
- **LinkedIn® Page:** https://www.linkedin.com/company/it-outlet/ (33 employees on LinkedIn®)



### 18. [ManageX](https://www.g2.com/products/vaporvm-managex/reviews)
  ManageX was born out of the need to simplify the process of onboarding engineering resources for organizational needs. With countless hours of development going into designing a swift user journey, ManageX allows our customers to quickly get access to the best IT resources in the region at the click of a button.



**Who Is the Company Behind ManageX?**

- **Seller:** [VaporVM](https://www.g2.com/sellers/vaporvm)
- **Year Founded:** 2011
- **HQ Location:** Dubai, United Arab Emirates
- **Twitter:** @VaporVM (80 Twitter followers)
- **LinkedIn® Page:** http://www.linkedin.com/company/vaporvm (183 employees on LinkedIn®)



### 19. [Microland Services](https://www.g2.com/products/microland-services/reviews)
  Delivering technology services to global clients, enables businesses to strategize, build and integrate powerful new technologies with existing services, infrastructure and processes.



**Who Is the Company Behind Microland Services?**

- **Seller:** [Microland](https://www.g2.com/sellers/microland-1ab552b6-0e70-41c3-8841-1de035fc3822)
- **Year Founded:** 1989
- **HQ Location:** Bangalore
- **Twitter:** @MicrolandLtd (2,254 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/microland (6,416 employees on LinkedIn®)



### 20. [Mirox](https://www.g2.com/products/mirox/reviews)
  Mirox Cyber Security &amp; Technology Pvt Ltd is a provider of comprehensive security audit and penetration testing services, dedicated to safeguarding organizations&#39; critical data and systems. As a CERT-In empanelled cyber security auditor, Mirox offers real-world security assessments across various industries, ensuring compliance with established standards and regulations. Key Features and Functionality: - Vulnerability Assessment and Penetration Testing : Conducts thorough evaluations of applications, networks, and mobile platforms to identify and mitigate vulnerabilities. - Specialized Security Testing: Offers assessments for IoT devices, automotive systems, SCADA environments, and cloud applications to address unique security challenges. - Compliance Audits: Ensures adherence to industry standards such as PCI DSS, ISO 27001, and SOC 2 through detailed audits and assessments. - Risk Assessments and Mitigation Strategies: Provides accurate risk profiling and develops strategies to support organizational objectives. - Security Architecture Review: Evaluates and enhances the security framework of organizations to strengthen overall defense mechanisms. Primary Value and Solutions Provided: Mirox addresses the critical need for robust cyber security by offering tailored solutions that protect organizations from evolving threats. By identifying vulnerabilities and ensuring compliance with industry standards, Mirox helps reduce liability, streamline business processes, and enhance overall security posture. Their cost-effective services, delivered by experienced professionals, provide organizations with the confidence that their critical data and systems are well-protected.



**Who Is the Company Behind Mirox?**

- **Seller:** [Mirox Cyber Security &amp; Technology](https://www.g2.com/sellers/mirox-cyber-security-technology)
- **Year Founded:** 2008
- **HQ Location:** Trivandrum, IN
- **LinkedIn® Page:** https://in.linkedin.com/company/mirox-cyber-security (27 employees on LinkedIn®)



### 21. [Modus Create](https://www.g2.com/products/modus-create/reviews)
  Modus Create is a digital transformation consulting firm dedicated to helping clients build competitive advantage through digital innovation. Our global team of strategists, designers, and technologists has helped the world’s biggest brands deliver powerful experiences. We specialize in strategic consulting, full lifecycle product development, platform modernization, and digital operations. Our official partners include leading technology companies like Atlassian, AWS, Ionic and GitHub, providing clients unmatched capabilities across the full product development lifecycle. Visit moduscreate.com to learn more.



**Who Is the Company Behind Modus Create?**

- **Seller:** [Modus Create](https://www.g2.com/sellers/modus-create)
- **Year Founded:** 2011
- **HQ Location:** Reston, US
- **Twitter:** @ModusCreate (2,696 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/modus-create-inc (273 employees on LinkedIn®)



### 22. [Money Back Ltd.](https://www.g2.com/products/money-back-ltd/reviews)
  Payback’s cybersecurity services help businesses and individuals identify security weaknesses and vulnerabilities in their digital systems through simulated cyberattacks and penetration testing. They provide users with reports and detailed insights to understand security flaws and prioritize necessary fixes. The services are designed for organizations of all sizes and individuals who want to enhance their security posture by proactively discovering and addressing potential threats before malicious actors can exploit them. Furthermore, Payback offers Cyber Investigation services for companies and individuals. Key Services and Benefits: Comprehensive Vulnerability Scanning: Scanning web applications, networks, and systems for common vulnerabilities, misconfigurations, and exploitable weaknesses. Realistic Penetration Testing: Simulating real-world hacking techniques to assess the security resilience of your systems, providing actionable recommendations for mitigation. Continuous Monitoring: Providing ongoing security assessments and updates, ensuring the systems are constantly monitored and up-to-date with the latest threat intelligence. Detailed Reporting and Analytics: Users receive in-depth reports with clear explanations, risk assessments, and remediation steps to improve security. Online Fraud Investigation: Providing in-depth Investigation Reports to companies or individuals on the perpetrators of various online frauds and scams. Target Audience: Small to Medium Enterprises (SMEs): Organizations looking to secure their systems without the resources for in-house security teams. Large Enterprises: Businesses with complex infrastructures that require continuous vulnerability scanning and penetration testing. Security Professionals: Penetration testers, security consultants, and IT teams seeking a tool to streamline security assessments and vulnerability management. Individuals: People who seek to improve their online security effectiveness or the investigation of wrongdoers who scammed them online. Use Cases: Penetration Testing: Simulate attacks on networks and applications to identify vulnerabilities before they can be exploited. Security Audits: Conduct regular audits to ensure compliance with security standards and best practices. Vulnerability Management: Discover vulnerabilities and manage remediation efforts to reduce overall risk exposure. Fraud Investigation: Complie a collection of evidence and other crucial information on companies or persons who took funds from our clients in a fraudulent manner.



**Who Is the Company Behind Money Back Ltd.?**

- **Seller:** [Payback](https://www.g2.com/sellers/payback)
- **HQ Location:** N/A
- **LinkedIn® Page:** https://www.linkedin.com/company/No-Linkedin-Presence-Added-Intentionally-By-DataOps (1 employees on LinkedIn®)



### 23. [Musubu](https://www.g2.com/products/musubu/reviews)
  Musubu provides IP cyber threat intelligence APIs, the MusubuApp IP &amp; Network Threat Intelligence Web Portal, and various integrations with platforms such as SIEM, SOAR, TIP, website (Wordpress) and more. Musubu APIs: Allows organizations to have easy access to detailed network information from their own endpoints efficiently and in bulk using simple queries to the Musubu API. With the latest version of the service, customers can easily assess the security risk posed by their publicly exposed networks, as well as survey their network environments to identify both potential threats and misleading false positive results. This allows customers to quickly filter out non-actionable [false positive] data and focus on the true threats to their organization. These are measured in the API results via: threat\_potential\_score\_pct – Numeric threat score between 0-100. The Score is calculated using “blacklist class”, “blacklist neighbors”, number of recent observations and country of origin. threat\_classification – Classification derived from “threat potential score pct” High – Threat score \&gt;70 Medium – Threat score from \&gt;40 but\&lt;70 Low – Any IP unlisted with a threat score \&lt;20 Nuisance – Threat score\&lt;40 blacklist\_class – Field classifying the specific threat vector that has been identified. Contains one of the following values: apache, blacklisted, botnet, botnetcnc, brute force, compromised, ftp, http, imap, mail, malware, phishing, ransomware, shunned, sips, ssh, TOR, worm, zeus blacklist\_class\_cnt – Field providing the number of sources which have identified the address as malicious. blacklist\_network\_neighbors – Field providing the number of addresses present on the same subnet which have been identified as malicious. blacklist\_observations – Field providing the number of observations (of this IP) in the last 90 days. As well, Musubu&#39;s KnownNetworks® data sets also show you the following for any IP address: - Network Name - Network Type - Network Group MusubuApp IP &amp; Network Intelligence Web Portal: MusubuApp is a simple, highly-affordable web application that delivers practical, immediately usable threat intelligence around IP-driven cyber threats – the number one vector of cybercrime for businesses large and small. MusubuApp allows security and information technology (IT) professionals to quickly research, identify malicious servers and clients making connections with their websites, apps, mail servers, cloud servers, and other networked assets. MusubuApp allows users to search in bulk for suspicious IP addresses (IPs) and instantly see a detailed set of data about the IPs such as: The level and severity of cyber threat per IP The types of threats associated with each IP The total volume of cyber threats per IP Other risky IPs in the same subnet The network IPs belong to and what type of network As well, MusubuApp provides key usability features to help operators be more efficient when hunting threats: Bulk IP Search – Users can import up to 500 IPs via JSON or CSV for immediate search and monitoring. Users can also export any results to CSV or JSON for integration elsewhere. Watchlists – Users can create lists of IPs, name and describe them for alerting as well as subject them to advanced data analytics and intelligence modules. Geolocation – Users can see IP addresses and their threat profiles on Google Maps embedded in the application and click to street addresses for individual IPs. They can also search IPs straight onto the map. Tags – Users can tag IPs with useful labels and share them across the user community. Users can also map entire tag sets instantly. Trends &amp; Analytics – Users can instantly gain intelligence from their Watchlists via modules that show things like new threats, rising threat ratings, time-series threat analytics, and much more. 3rd Party Integrations – MusubuApp accommodates things like “click-to-query” for sending entire Watchlist lists into other complementary cyber tools and platforms. As a result of its powerful, but simple features and low cost, MusubuApp is a natural complement to more expensive, enterprise tools such as Security Information and Event Management (SIEM), Threat Intelligence Platforms (TIP), Security Orchestration, Automation and Response (SOAR), and Incident Response (IR). Musubu IP Threat Data for Splunk: &quot;NOTE: Request Free 7-Day Trial API Key via support@musubu.io&quot; Use Musubu’s unique IP &amp; Network cyber threat scoring and profiling API right in your Splunk instance to determine the following for each IP: - Cyber Threat Score: A 0-100 rating of how much of a cyber threat the IP may be based on the output of our analytics and algorithms. - Cyber Threat Classification: High-Medium-Nuisance-Low rating of an IPs cyber threat potential for quick identification. - Blacklist Class: The predominant cyber threat vector seen as associated with the IP address (e.g. Phishing, Ransomware, TOR, etc.). - Blacklist Count: The number of major IP blacklisting services that have blacklisted the IP address. - Blacklist Neighbors: The number of other IP addresses in the same subnet that have been blacklisted. - Blacklist Count: The number of times in the last 90 days the IP address has been blacklisted. Simply add one or more data sources to the Musubu Add-on and then you will be able to mouse over each IP address to see our threat profiling data. Use it to perform faster threat detection, threat identification, response, and mitigation. Leverage the “showipthreatdata” custom command within the add-on to make direct calls to the Musubu API from the Splunk search view. See example below - Musubu results for the specified IP are returned in a Tableview.



**Who Is the Company Behind Musubu?**

- **Seller:** [Musubu](https://www.g2.com/sellers/musubu)
- **HQ Location:** N/A
- **Twitter:** @Musubu10 (457 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/No-Linkedin-Presence-Added-Intentionally-By-DataOps (1 employees on LinkedIn®)



### 24. [Nettitude](https://www.g2.com/products/nettitude/reviews)
  Founded in 2003, Nettitude is an award-winning provider of cybersecurity services, bringing innovative thought leadership to the ever-evolving cybersecurity marketplace. Leveraging our tenacious curiosity, we aim to operate at the forefront of the industry. Through our research and innovation centres, Nettitude provides threat led services that span technical assurance, consulting and managed detection and response offerings. We are driven by a desire to build and deliver the best cybersecurity propositions in the industry and stay abreast of the evolving legislative and regulatory cybersecurity landscape. This helps our clients to prioritise their cybersecurity risks, enabling them to focus on the activities that are core to their business. We aim to empower our clients, imparting knowledge, advice and assistance to help them deploy changes in behaviour, understanding, and where appropriate, culture. This methodology is at the core of our services, helping provide pragmatic cyber security for industries such as Finance &amp; Banking, IT, Technology and Engineering, Maritime, Offshore, Retail, Healthcare, Manufacturing and Critical National Infrastructure.


  **Average Rating:** 3.5/5.0
  **Total Reviews:** 1

**Who Is the Company Behind Nettitude?**

- **Seller:** [Nettitude](https://www.g2.com/sellers/nettitude)
- **Year Founded:** 2003
- **HQ Location:** Birmingham, England, United Kingdom
- **LinkedIn® Page:** https://www.linkedin.com/company/lrqa/ (3,014 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 100% Mid-Market


### 25. [Nexus Infosec](https://www.g2.com/products/nexus-infosec/reviews)
  At Nexus Infosec, we provide outstanding penetration testing services to our clients; we find vulnerabilities in your system and then provide a targeted remediation plan of action.



**Who Is the Company Behind Nexus Infosec?**

- **Seller:** [Nexus Infosec L.L.C](https://www.g2.com/sellers/nexus-infosec-l-l-c)
- **HQ Location:** N/A
- **LinkedIn® Page:** https://www.linkedin.com/company/No-Linkedin-Presence-Added-Intentionally-By-DataOps (1 employees on LinkedIn®)




    ## What Is Vulnerability Assessment Services Providers?
  [Security and Privacy Services Providers](https://www.g2.com/categories/security-and-privacy-services)
  ## What Software Categories Are Similar to Vulnerability Assessment Services Providers?
    - [Cybersecurity Consulting Services](https://www.g2.com/categories/cybersecurity-consulting)
    - [IT Compliance Services Providers](https://www.g2.com/categories/it-compliance-services)
    - [Penetration Testing Services](https://www.g2.com/categories/penetration-testing-services)

  
    
