It's been two months since this profile received a new review
Leave a Review
Compare this with other toolsSave it to your board and evaluate your options side by side.
Save to board

Q-Sec Reviews & Provider Details

Profile Status

This profile is currently managed by Q-Sec but has limited features.

Are you part of the Q-Sec team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Product Avatar Image

Have you used Q-Sec before?

Answer a few questions to help the Q-Sec community

Q-Sec Reviews (1)

Reviews

Q-Sec Reviews (1)

5.0
1 reviews
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Łukasz J.
ŁJ
General Director
Mid-Market (51-1000 emp.)
"Strong SOC and infrastructure operations partner for a fintech environment"
What do you like best about Q-Sec?

The main value of Q-Sec is having a single partner that fully owns both infrastructure and security operations. SOC, cloud, network, and DevOps work together as one operating model, which removes gaps and finger-pointing.

Security monitoring is proactive and actionable. Detection usually happens within 15–20 minutes, and critical incidents are mitigated within about an hour. The SOC team has successfully handled ongoing attack activity, including large-scale DDoS attempts, without affecting service availability. Alerts are contextual and useful, not just raw noise. Review collected by and hosted on G2.com.

What do you dislike about Q-Sec?

Onboarding took time due to the scope of responsibility Q-Sec assumes. This is not a plug-and-play MDR service, and it requires alignment on processes and ownership. Reporting was solid but needed some initial tuning to better match executive and compliance expectations Review collected by and hosted on G2.com.

There are not enough reviews of Q-Sec for G2 to provide buying insight. Below are some alternatives with more reviews:

1
SHI Logo
SHI
4.7
(119)
SHI is a provider of end-to-end IT solutions built on technologies from AWS, Cisco, Dell, Microsoft, and more. With 35 years of experience and nearly 6,000 global professionals, SHI helps over 17,000 organizations select, deploy, and manage IT solutions that drive growth and innovation. Combining the scale of a global integrator with the personalized service of a local partner, SHI empowers smart technology decisions to support your strategic goals.
2
PlutoSec Logo
PlutoSec
5.0
(47)
Plutosec is a cybersecurity firm specializing in web application penetration testing, API security, and cloud infrastructure protection. We help SaaS companies, fintech startups, and e-commerce businesses identify and fix critical vulnerabilities before they’re exploited.
3
Corsica Technologies Logo
Corsica Technologies
4.6
(41)
Consistently recognized as one of the top managed IT and cybersecurity providers, Corsica Technologies helps companies leverage technology as a competitive business advantage. We bring cohesion to your technology strategy, addressing all your needs from one integrated partner. Through our specialized knowledge of IT and cybersecurity, we are a collaborative partner in driving your business forward.
4
Cybriant Logo
Cybriant
4.7
(34)
Cybriant assists companies in making informed business decisions and sustaining effectiveness in the design, implementation, and operation of their cyber risk management programs. We deliver a comprehensive and customizable set of strategic and managed cybersecurity services.
5
CompuData Logo
CompuData
4.6
(33)
CompuData is an award-winning business technology solution provider celebrating 45 years in business.
6
ThreatSpike Logo
ThreatSpike
4.9
(32)
ThreatSpike is the first managed service for offensive security which provides unlimited testing for an affordable, fixed price. This means you can pentest your applications, identify your vulnerabilities and carry out a full-scale red team attack on your company continuously throughout the year. This all-in-one service includes: - Unlimited penetration tests and red team exercises - Internal, external, and web application testing - Engagements led by certified specialists - Detailed finding reports - Manual and automated testing - ISO 27001, SOC 2, PCI-DSS and Cyber Essentials aligned tests - Vulnerability scanning - Monthly account meetings
7
Nomic Networks Logo
Nomic Networks
4.8
(30)
To combat increasingly sophisticated cybersecurity threats, you need an equally sophisticated network-based approach. Nomic's MNDR thwarts stealthy intrusion and exploit attempts, and shines a light on anomalous network traffic.
8
Capgemini Services Logo
Capgemini Services
3.9
(26)
Salesforce Consulting and Implementation Practice.
9
OneNeck IT Solutions Logo
OneNeck IT Solutions
4.6
(26)
The company offers a full suite of IT solutions including cloud and hosting solutions; ReliaCloud™ enterprise cloud services; managed services; ERP application management; professional services; and IT hardware.
10
Check Point Infinity Global Services Logo
Check Point Infinity Global Services
4.6
(26)
Check Point Software Technologies Ltd. is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyberattacks with an unmatched catch rate of malware and other types of threats.
Show More
People Icons

Start a Discussion about Q-Sec

Have a software question? Get answers from real users and experts.

Start a Discussion
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.