Compare this with other toolsSave it to your board and evaluate your options side by side.
Save to board

Echo Secure Reviews & Provider Details

Profile Status

This profile is currently managed by Echo Secure but has limited features.

Are you part of the Echo Secure team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Product Avatar Image

Have you used Echo Secure before?

Answer a few questions to help the Echo Secure community

Echo Secure Reviews (2)

Reviews

Echo Secure Reviews (2)

4.8
2 reviews
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Richard T.
RT
Small-Business (50 or fewer emp.)
"Fast, Professional, and Secures Software Effectively"
What do you like best about Echo Secure?

I like the speed Echo Secure works at. They're very accommodating in getting me booked in very quickly and they get the reports out promptly. I also appreciate when I send them an email, they get back to me very quickly, which is always nice. Professionalism and speed are important to me because I really value my time. Having someone who responds quickly is always going to get my business and money. Echo Secure makes sure that the software is secure, protecting it from being used maliciously, and ensuring it can't harm other users or damage data. Review collected by and hosted on G2.com.

What do you dislike about Echo Secure?

Speed and professionalism Review collected by and hosted on G2.com.

Verified User in Electrical/Electronic Manufacturing
EE
Small-Business (50 or fewer emp.)
"Flexible Timing and Scope That Fits Our Needs"
What do you like best about Echo Secure?

Flexibility of timing and scope of what they were doing. Review collected by and hosted on G2.com.

What do you dislike about Echo Secure?

Slightly nervous that they seem to be relatively new. Review collected by and hosted on G2.com.

There are not enough reviews of Echo Secure for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Insight Assurance Logo
Insight Assurance
4.9
(121)
Developed by the American Institute of CPAs (AICPA), SOC 2 reports provide detailed information and assurance about the controls at a service organization relevant to the trust services categories security, availability, and integrity of the systems used to process data, as well as the confidentiality and privacy of the information processed.
2
Johanson Group Logo
Johanson Group
4.9
(103)
We are a client-focused professional services firm in operation for eight years, providing audit and attestation services to businesses of all sizes worldwide! Johanson Group brings integrity, efficiency, and flexibility to auditing while helping clients demonstrate conformance with their governance, risk management, and compliance (GRC) requirements.
3
PlutoSec Logo
PlutoSec
5.0
(47)
Plutosec is a cybersecurity firm specializing in web application penetration testing, API security, and cloud infrastructure protection. We help SaaS companies, fintech startups, and e-commerce businesses identify and fix critical vulnerabilities before they’re exploited.
4
SecurityMetrics Logo
SecurityMetrics
4.8
(43)
Digital information can be a business's most valuable asset and greatest liability. Whether you're looking for assistance with cyber security, compliance, forensic investigations, or a complete network vulnerability assessment, we can help.
5
Corsica Technologies Logo
Corsica Technologies
4.6
(41)
Consistently recognized as one of the top managed IT and cybersecurity providers, Corsica Technologies helps companies leverage technology as a competitive business advantage. We bring cohesion to your technology strategy, addressing all your needs from one integrated partner. Through our specialized knowledge of IT and cybersecurity, we are a collaborative partner in driving your business forward.
6
ThinkSys Logo
ThinkSys
5.0
(35)
ThinkSys, an award-winning technology company, is a leading provider of Products and Software Development, QA and related services. Based in Sunnyvale, CA and offices in NOIDA, India. ThinkSys serves clients worldwide.
7
ThreatSpike Logo
ThreatSpike
4.9
(32)
ThreatSpike is the first managed service for offensive security which provides unlimited testing for an affordable, fixed price. This means you can pentest your applications, identify your vulnerabilities and carry out a full-scale red team attack on your company continuously throughout the year. This all-in-one service includes: - Unlimited penetration tests and red team exercises - Internal, external, and web application testing - Engagements led by certified specialists - Detailed finding reports - Manual and automated testing - ISO 27001, SOC 2, PCI-DSS and Cyber Essentials aligned tests - Vulnerability scanning - Monthly account meetings
8
Trava Security Logo
Trava Security
4.9
(27)
At Trava our vCISOs are experts in crafting a comprehensive compliance roadmap that guides you through planning, execution, and the audit and attestation process. Here's what you can expect from our outsourced vCISO services:
9
Packetlabs Logo
Packetlabs
4.9
(24)
Application Security Testing evaluates the security of web and mobile applications to protect them from cyber-attacks. From source-code all the way up to the browser, an application security assessment measures the effectiveness of the controls you currently have in place by simulating a hack. Our OWASP-based Application Security Testing goes far beyond the OWASP Top 10 and helps to uncover even the more hard-to-find vulnerabilities exploited by more sophisticated adversaries. We have developed a unique approach to source top talent which has resulted in far more thorough testing than industry standards. Each of our consultants has at a minimum, the coveted 24-hour OSCP certification. Most application security testers rely on automated testing alone. This is only the beginning of our process, which is followed by extensive manual processes to provide one of the most thorough services the industry offers. The problem with automation alone is that it is prone to false positives (e.g., incorrect findings) and false negatives (e.g., missing critical areas of the application, lack of context, chained exploits, and more). By never relying on automation, our experts explore opportunities for more advanced attackers, mimicking a real-world scenario. Packetlabs’ unique approach to application security testing begins with developing a threat model and taking the time to understand the overall purpose, the components, and their interaction with sensitive information or functionality. This approach enables realistic simulation of how an attacker would target your application and in turn, provides you with more value. Only after thorough analysis do we begin attempting to manually compromise each layer of defence within the environment.
10
CyStack Security Services Logo
CyStack Security Services
4.9
(21)
CyStack provides customized and scalable cybersecurity solutions to help you meet your specific security needs, including testing, security consulting and management services. Our solutions focus on protecting data, preventing cyber-attacks, and managing information security risks by adopting cutting-edge technologies in Automated Security, Crowdsourced Security, and AI. With 200+ businesses and 20,000+ users worldwide, we are recognized as a trusted partner to organizations and a leading powerhouse in cybersecurity research and development. By partnering with CyStack, you can focus on growing their business while having peace of mind that their data and assets are well-protected from cyber threats.
Show More
People Icons

Start a Discussion about Echo Secure

Have a software question? Get answers from real users and experts.

Start a Discussion
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Echo Secure