Mythics Consulting

4.5
(1)

Mythics Consulting is an experienced Systems Integrator providing end-to-end guidance and support in a full range of services.

Work for Mythics Consulting?

Learning about Mythics?

We can help you find the solution that fits you best.

Mythics Consulting Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Filter Reviews
  • Ratings
  • Company Size
  • User Role
  • For Category
  • Industry
Ratings
Company Size
User Role
For Category
Industry
Showing 1 Mythics review
LinkedIn Connections
Vivian H.
Validated Reviewer
Review Source
content

"Easy to use, flexible system "

Describe the project or task the provider helped with:

Very useful for organizing our client files

What do you like best?

The fact that everything uploaded to the system is secured. Data risk is important to the office.

What do you dislike?

Like any new system, having to learn all the new functions, what buttons to click, how to access certain parts of the program.

Sign in to G2 to see what your connections have to say about Mythics Consulting

What Cybersecurity Consulting solution do you use?

Thanks for letting us know!

There are not enough reviews of Mythics Consulting for G2 to provide buying insight. Below are some alternatives with more reviews:

1
McAfee Security Services Logo
McAfee Security Services
4.0
(43)
Armed with the latest tools, strategies, and knowledge to address your global security needs, our comprehensive services include everything from incident response and security risk assessments to comprehensive, customized deployments and training. We offer a full range of services that span the entire McAfee portfolio of solutions and ensure you get heightened visibility into your overall security posture.
2
OneNeck IT Solutions Logo
OneNeck IT Solutions
4.8
(13)
The company offers a full suite of IT solutions including cloud and hosting solutions; ReliaCloud™ enterprise cloud services; managed services; ERP application management; professional services; and IT hardware.
3
VMware Professional Services Logo
VMware Professional Services
4.6
(11)
VMware is a global leader in cloud infrastructure and business mobility.
4
Sophos Professional Services Logo
Sophos Professional Services
4.7
(5)
Sophos delivers the best IT security and data protection for businesses. We produced our first encryption and antivirus products back in the 1980s. And today our products protect over 100,000 businesses and 100 million users, in more than 150 countries.
5
SAINT Security Suite Logo
SAINT Security Suite
4.9
(4)
SAINT Security Suite provides a fully-integrated set of capabilities to assess your network assets for the last vulnerabilities across a wide variety of operating systems, software applications, databases, network devices and configurations
6
Symantec Managed Security Services Logo
Symantec Managed Security Services
3.4
(4)
Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure.
7
Check Point Services Logo
Check Point Services
4.8
(3)
Check Point Software Technologies Ltd. is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyberattacks with an unmatched catch rate of malware and other types of threats.
8
AlixPartners Logo
AlixPartners
4.3
(3)
AlixPartners is a firm that provides business and financial advisory services including operations efficiency, revenue optimization, cost management, margin expansion, and enterprise transformation advisory services.
9
Cylance Consulting Logo
Cylance Consulting
4.2
(3)
Cylance Consulting is a cybersecurity products and services company focusing on stopping tomorrow's attacks today.
10
Leidos Logo
Leidos
2.8
(2)
For more than 40 years we have been tackling some of the biggest problems that face our nation and our world.
Show more
Kate from G2

Learning about Mythics Consulting?

I can help.
* We monitor all Mythics Consulting reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.