Introducing G2.ai, the future of software buying.Try now
Inova Payroll
Sponsored
Inova Payroll
Visit Website
Product Avatar Image
Mayer Security Services

By Mayer Security Services

4.8 out of 5 stars
4 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Mayer Security Services?

Inova Payroll
Sponsored
Inova Payroll
Visit Website

Mayer Security Services Reviews & Provider Details

Profile Status

This profile is currently managed by Mayer Security Services but has limited features.

Are you part of the Mayer Security Services team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Product Avatar Image

Have you used Mayer Security Services before?

Answer a few questions to help the Mayer Security Services community

Mayer Security Services Reviews (2)

Reviews

Mayer Security Services Reviews (2)

4.8
2 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Verified User in Defense & Space
PD
Small-Business (50 or fewer emp.)
"Professional, Reliable, and Exceptionally Competent Security Team"
What do you like best about Mayer Security Services?

They do not act like “guards,” they operate like a professional security program. The officers show up prepared, communicate early, de-escalate well, and follow post orders without freelancing. Supervisors stay involved, small issues get handled before they grow, and the documentation is consistent and clean. If you want quiet competence and real follow-through, this team delivers. Review collected by and hosted on G2.com.

What do you dislike about Mayer Security Services?

They are thorough to the point that onboarding can feel intense because they ask a lot of questions and want expectations in writing. Also, they are not the cheapest option, but you can see exactly what you are paying for in performance and reporting. If you want “warm body security,” look elsewhere. If you want standards and accountability, this is the trade-off. Review collected by and hosted on G2.com.

Verified User in Marketing and Advertising
EM
Small-Business (50 or fewer emp.)
"Exceptional Teamwork and Seamless Event Support"
What do you like best about Mayer Security Services?

Their team is calm under pressure, highly trained, and blends into our operations without disrupting workflow. For events and terminations, they bring a steady presence, clear communication, and a level of preparedness that gives everyone peace of mind. They make difficult days easier and high-visibility moments run smooth. Review collected by and hosted on G2.com.

What do you dislike about Mayer Security Services?

Honestly, the only challenge is that their standards are high, so they ask for detailed context before every assignment. It’s not a downside, but it does mean they operate with more structure and planning than a typical guard company. In the end it leads to better results, but it takes a bit more coordination up front. Review collected by and hosted on G2.com.

There are not enough reviews of Mayer Security Services for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Cynomi vCISO Platform Logo
Cynomi vCISO Platform
4.9
(22)
Cynomi’s vCISO platform empowers MSSPs, MSPs and consultancies to offer structured cybersecurity services to SMEs at scale and provide them with proactive cyber resilience.  Combining proprietary AI algorithms with CISO-level knowledge, Cynomi’s platform streamlines the vCISO's work while automating manual time-consuming tasks.  Cynomi helps partners overcome the cybersecurity skill gap and scale their business, allowing them to offer new services and increase revenues while reducing operational costs.
2
Rapid7 Security Services Logo
Rapid7 Security Services
3.5
(12)
Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations.
3
2nd Watch Logo
2nd Watch
4.5
(8)
2nd Watch is an APN Premier Consulting Partner providing managed cloud to enterprises. The company's subject matter experts, software-enabled services and cutting-edge solutions provide companies with tested, proven, and trusted solutions, allowing them to fully leverage the power of the public cloud.
4
NCC Group Logo
NCC Group
4.3
(4)
Through an unrivalled suite of services, we provide organizations with peace of mind that that their most important assets are protected, available and operating as they should be at all times.
5
Thales Logo
Thales
4.3
(3)
Thales e-Security is the leader in advanced data security solutions and services, delivering trust wherever information is created, shared or stored.
6
Azure Dedicated HSM Logo
Azure Dedicated HSM
3.5
(2)
Azure Dedicated HSM (Hardware Security Module is a cloud-based service that provides organizations with exclusive access to FIPS 140-2 Level 3-validated HSM devices, ensuring secure and compliant cryptographic key management. By deploying Thales Luna 7 HSM model A790 appliances directly into a customer's virtual network, Azure Dedicated HSM offers full administrative and cryptographic control, enabling seamless migration of on-premises HSM-protected applications to the Azure cloud environment. Key Features and Functionality: - Exclusive Control: Customers maintain sole administrative and cryptographic control over their HSMs, with Microsoft having no access to the keys stored within. - High Security Standards: The service utilizes FIPS 140-2 Level 3 and eIDAS Common Criteria EAL4+ validated devices, meeting stringent security and compliance requirements. - Seamless Migration: Compatible with numerous applications, Azure Dedicated HSM facilitates the migration of legacy or custom on-premises applications to Azure with minimal changes, enhancing performance and reducing latency. - High Performance: The Thales Luna 7 HSM model A790 delivers up to 10,000 RSA-2048 operations per second, supporting up to ten partitions for diverse application instances. Primary Value and Problem Solved: Azure Dedicated HSM addresses the critical need for secure, compliant, and high-performance cryptographic key management in the cloud. It provides organizations with dedicated, single-tenant HSM devices that meet rigorous security standards, ensuring data protection and regulatory compliance. By offering full control over cryptographic operations and facilitating the migration of existing HSM-dependent applications to Azure, the service enables businesses to leverage cloud scalability without compromising on security or performance.
7
Little Snitch Logo
Little Snitch
5.0
(2)
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to your benefit. But sometimes, like in case of tracking software, trojans or other malware, they don’t. But you don’t notice anything, because all of this happens invisibly under the hood. Little Snitch makes these Internet connections visible and puts you back in control!
8
AllClear ID Logo
AllClear ID
5.0
(1)
To make smart decisions, move quickly, and minimize damage, your organization will need more than a response plan. We provide expert analysis, planning, and incident simulations, as well as reserved resources to prepare your organization for a successful response.
9
Fingerprint Cards AB Logo
Fingerprint Cards AB
4.5
(1)
Fingerprint Cards AB (FPC) markets, develops and produces biometric components and technologies that through the analysis and matching of an individuals unique fingerprint verify the persons identity.
10
VertexGraph Logo
VertexGraph
5.0
(1)
Smart Secure Access Service Edge (S-SASE) solution built on top of Zero Trust 2.0 technology
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Mayer Security Services
View Alternatives