Introducing G2.ai, the future of software buying.Try now
Inactive Profile: Need Admin Access?
No one has managed this profile for over a year.
If you work at ControlScan, reclaim access to make changes.
Product Avatar Image
ControlScan

By ControlScan

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at ControlScan, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
4.0 out of 5 stars
4 star
0%
2 star
0%
1 star
0%

How would you rate your experience with ControlScan?

This product hasn't been reviewed yet! Be the first to share your experience.
Leave a Review

ControlScan Reviews & Provider Details

Product Avatar Image

Have you used ControlScan before?

Answer a few questions to help the ControlScan community

ControlScan Reviews (2)

Reviews

ControlScan Reviews (2)

4.0
2 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Verified User in Financial Services
EF
Enterprise (> 1000 emp.)
"ControlScan Vulnerability Scan Platform"
What do you like best about ControlScan?

Detailed ASV reports that comply with PCI DSS standards. Review collected by and hosted on G2.com.

What do you dislike about ControlScan?

Access to past scans and IP setup process. Review collected by and hosted on G2.com.

Verified User in Banking
UB
Mid-Market (51-1000 emp.)
"Decent service, slow response time."
What do you like best about ControlScan?

The overall product is strong providing a network and firewall monitoring service. Review collected by and hosted on G2.com.

What do you dislike about ControlScan?

slow response time to email and phone inquiries from associates. Review collected by and hosted on G2.com.

There are not enough reviews of ControlScan for G2 to provide buying insight. Below are some alternatives with more reviews:

1
SHI Logo
SHI
4.7
(109)
SHI is a provider of end-to-end IT solutions built on technologies from AWS, Cisco, Dell, Microsoft, and more. With 35 years of experience and nearly 6,000 global professionals, SHI helps over 17,000 organizations select, deploy, and manage IT solutions that drive growth and innovation. Combining the scale of a global integrator with the personalized service of a local partner, SHI empowers smart technology decisions to support your strategic goals.
2
Cybriant Logo
Cybriant
4.7
(34)
Cybriant assists companies in making informed business decisions and sustaining effectiveness in the design, implementation, and operation of their cyber risk management programs. We deliver a comprehensive and customizable set of strategic and managed cybersecurity services.
3
PlutoSec Logo
PlutoSec
5.0
(47)
Plutosec is a cybersecurity firm specializing in web application penetration testing, API security, and cloud infrastructure protection. We help SaaS companies, fintech startups, and e-commerce businesses identify and fix critical vulnerabilities before they’re exploited.
4
Trustwave Managed SIEM Logo
Trustwave Managed SIEM
4.2
(20)
Trustwave Managed SIEM helps enterprises see through data noise easily, respond to emerging threats quickly, and cost-effectively maximize protection while proving compliance. Whether your challenge is choosing the right SIEM, fully staffing it, containing costs, or keeping up with new threats and compliance requirements, Trustwave can help.
5
Huntress Managed SIEM Logo
Huntress Managed SIEM
4.7
(39)
Huntress Managed SIEM was built from the ground up to solve the problem of data overload, unfiltered sources, and alert fatigue. Our Managed SIEM redefines the industry standard by applying Smart Filtering capabilities at the log source to only capture threat-specific logs. This simplifies the workload toward threat discovery and data retention. Managed SIEM is also built to collect Windows-based events and syslog using the same proprietary agent you’re familiar with. Supported by our AWS backend, your data is stored, safely and reliably.
6
CompuData Logo
CompuData
4.6
(33)
CompuData is an award-winning business technology solution provider celebrating 45 years in business.
7
Corsica Technologies Logo
Corsica Technologies
4.5
(33)
Consistently recognized as one of the top managed IT and cybersecurity providers, Corsica Technologies helps companies leverage technology as a competitive business advantage. We bring cohesion to your technology strategy, addressing all your needs from one integrated partner. Through our specialized knowledge of IT and cybersecurity, we are a collaborative partner in driving your business forward.
8
ThreatSpike Logo
ThreatSpike
4.9
(31)
ThreatSpike is the first managed service for offensive security which provides unlimited testing for an affordable, fixed price. This means you can pentest your applications, identify your vulnerabilities and carry out a full-scale red team attack on your company continuously throughout the year. This all-in-one service includes: - Unlimited penetration tests and red team exercises - Internal, external, and web application testing - Engagements led by certified specialists - Detailed finding reports - Manual and automated testing - ISO 27001, SOC 2, PCI-DSS and Cyber Essentials aligned tests - Vulnerability scanning - Monthly account meetings
9
Nomic Networks Logo
Nomic Networks
4.8
(29)
To combat increasingly sophisticated cybersecurity threats, you need an equally sophisticated network-based approach. Nomic's MNDR thwarts stealthy intrusion and exploit attempts, and shines a light on anomalous network traffic.
10
Check Point Infinity Global Services Logo
Check Point Infinity Global Services
4.6
(26)
Check Point Software Technologies Ltd. is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyberattacks with an unmatched catch rate of malware and other types of threats.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
ControlScan
View Alternatives