Introducing G2.ai, the future of software buying.Try now
NLX
Sponsored
NLX
Visit Website
Product Avatar Image
Secure Voice

By Assertion

3.8 out of 5 stars
5 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Secure Voice?

NLX
Sponsored
NLX
Visit Website
It's been two months since this profile received a new review
Leave a Review

Secure Voice Reviews & Product Details

Profile Status

This profile is currently managed by Secure Voice but has limited features.

Are you part of the Secure Voice team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Secure Voice Media

Secure Voice Demo - Live Dashboard of SBC Security
Get your Session Border Controller's security posture and risk score in the real world after a FREE scan.
Product Avatar Image

Have you used Secure Voice before?

Answer a few questions to help the Secure Voice community

Secure Voice Reviews (2)

Reviews

Secure Voice Reviews (2)

3.8
2 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Rajat J.
RJ
Corporate Trainer
Small-Business (50 or fewer emp.)
"Assertion SBC Security- Let the Spam Away from you."
What do you like best about Secure Voice?

Assertion SBC Security provides the complete protection from the unwanted junk calls, spam and robo calls.

It detects the spam calls in real time thus it is used wideky in our enterprise.

It is very easy to use and implement.

The customer support is also good . It can be integrated with different devices at a time.

It is frequently used in our organisation as a safeguard against spoofing and to reduce the cost.

The best thing about it is it provides the detailed view of security and protection. Review collected by and hosted on G2.com.

What do you dislike about Secure Voice?

The data overload sometimes becomes messy. Review collected by and hosted on G2.com.

Verified User in Telecommunications
IT
Enterprise (> 1000 emp.)
"AI powered detection and protection you can trust"
What do you like best about Secure Voice?

The breakdown is super detailed, drilling into all areas of protection and security. Review collected by and hosted on G2.com.

What do you dislike about Secure Voice?

Sometimes the data overload can be a little overwhelming but with the right filters that's easily rectified. Review collected by and hosted on G2.com.

There are not enough reviews of Secure Voice for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Palo Alto Expedition Logo
Palo Alto Expedition
4.3
(21)
The open-source Expedition tool speeds your migration to next-generation firewall technologies and more efficient processes, enabling you to keep pace with emerging security threats and industry best practices.
2
Suhosin Logo
Suhosin
4.4
(17)
Suhosin is an advanced protection system for PHP 5 installations. It is designed to protect servers and users from known and unknown flaws in PHP applications and the PHP core.
3
mSpy Logo
mSpy
3.1
(13)
mSpy is a computer security for parental control. Helps parents to give attention to their children online activities. It checks WhatsApp, Facebook, massage and snapchat messages.
4
SecureBridge Logo
SecureBridge
4.9
(12)
SecureBridge is a tool that represents clients and servers for SSH, SFTP and SSL protocols as a network security solution, it protects any TCP traffic using SSH or SSL secure transport layer protocols, that provide authentication for both client and server, strong data encryption, and data integrity verification.
5
Execweb Logo
Execweb
5.0
(7)
Execweb is a leading Cybersecurity Executive Network that connects vendors with CISOs/CIOs via 1:1 virtual meetings & roundtables
6
DICloak Antidetect Browser Logo
DICloak Antidetect Browser
5.0
(6)
DICloak modifies and hides your digital identity by simulating all parameters that websites can see. This can effectively circumvent detections by systems. With DICloak, you can create multiple independent browser profiles for easy multi-accounting. Each account is run within its own independent browser profile, reducing the risk of account bans.
7
Remoasset Logo
Remoasset
4.7
(5)
Everything you need to manage your remote workforce's hardware lifecycle, from procurement to recovery, in one unified platform. From procurement to recovery, we handle every aspect of your remote device management with transparency and automation
8
Outlook PST Recovery Logo
Outlook PST Recovery
4.7
(5)
Voimakas Outlook PST Recovery is a software that recover emails from corrupted PST file save them into new PST files or existing PST file with whole emails items and attachments and also recovers deleted Outlook emails items without any data defeat.
9
Sentinel Software Logo
Sentinel Software
4.7
(5)
Sentinel gives you the tools to mitigate security risks, improve compliance and reduce the cost of PeopleSoft Security administration.
10
SysTools VBA Password Recovery Logo
SysTools VBA Password Recovery
4.6
(4)
Tool to Unlock and Recover Password from a Protected VBA File
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Secure Voice
View Alternatives