Mythics Consulting

4.5
(1)

Mythics Consulting is an experienced Systems Integrator providing end-to-end guidance and support in a full range of services.

Work for Mythics Consulting?

Learning about Mythics?

We can help you find the solution that fits you best.

Find the Right Product

Mythics Consulting Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Filter Reviews
  • Ratings
  • Company Size
  • User Role
  • For Category
  • Industry
Ratings
Company Size
User Role
For Category
Industry
Showing 1 Mythics review
LinkedIn Connections
Mythics review by Vivian H.
Vivian H.
Validated Reviewer
Review Source
content

"Easy to use, flexible system "

Describe the project or task the product helped with

Very useful for organizing our client files

What do you like best?

The fact that everything uploaded to the system is secured. Data risk is important to the office.

What do you dislike?

Like any new system, having to learn all the new functions, what buttons to click, how to access certain parts of the program.

Sign in to G2 to see what your connections have to say about Mythics Consulting

What Cybersecurity Consulting solution do you use?

Thanks for letting us know!

There are not enough reviews of Mythics Consulting for G2 to provide buying insight. Below are some alternatives with more reviews:

1
VMware Professional Services Logo
VMware Professional Services
4.6
(11)
VMware is a global leader in cloud infrastructure and business mobility.
2
Sophos Professional Services Logo
Sophos Professional Services
4.7
(5)
Sophos delivers the best IT security and data protection for businesses. We produced our first encryption and antivirus products back in the 1980s. And today our products protect over 100,000 businesses and 100 million users, in more than 150 countries.
3
SAINT Security Suite Logo
SAINT Security Suite
4.9
(4)
SAINT Security Suite provides a fully-integrated set of capabilities to assess your network assets for the last vulnerabilities across a wide variety of operating systems, software applications, databases, network devices and configurations
4
Cylance Logo
Cylance
4.2
(3)
Cylance is a cybersecurity products and services company focusing on stopping tomorrow's attacks today.
5
Check Point Services Logo
Check Point Services
4.8
(3)
Check Point Software Technologies Ltd. is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyberattacks with an unmatched catch rate of malware and other types of threats.
6
Sirius Services Logo
Sirius Services
4.0
(1)
Sirius also has a dedicated software team capable of helping companies evaluate, acquire and implement software solutions in the areas of commerce, business intelligence, information management, collaboration, identity and access management, business optimization, systems and storage management, and more.
7
Mandiant Consulting Services Logo
Mandiant Consulting Services
5.0
(1)
FireEye is transforming the cyber security landscape to combat today's advanced cyber attacks, and we want you to be part of our team.
8
Deloitte Consulting Logo
Deloitte Consulting
4.0
(1)
Deloitte is an accounting firms and professional services network that provides audit, tax, consulting, enterprise risk and financial advisory services
9
Locus IT Consulting Logo
Locus IT Consulting
3.0
(1)
Locus IT Consulting is a firm that offers enterprise resource planning (ERP) services to help organization get the most from their ERP investments, it implement, integrate and manage popular ERP & CRM packages from Microsoft Dynamics.
10
ReliaQuest Logo
ReliaQuest
(0)
ReliaQuest leverages proprietary technology, automation, and proven processes alongside your team to create elevated access and visibility across your security environment. ReliaQuest provides access to solutions that evolve with your environment, and access to an experienced team of professionals who become an extension of your team.
Show more
Kate from G2

Learning about Mythics Consulting?

I can help.
* We monitor all Mythics Consulting reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.