2026 Best Software Awards are here!See the list
Inactive Profile: Need Admin Access?
No one has managed this profile for over a year.
If you work at Trilight Security Services, reclaim access to make changes.
Trilight Security Services

By Trilight Security

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at Trilight Security Services, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
5.0 out of 5 stars
4 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Trilight Security Services?

It's been two months since this profile received a new review
Leave a Review

Trilight Security Services Reviews & Provider Details

Product Avatar Image

Have you used Trilight Security Services before?

Answer a few questions to help the Trilight Security Services community

Trilight Security Services Reviews (3)

Reviews

Trilight Security Services Reviews (3)

5.0
3 reviews
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
hareesha P.
HP
Database Administrator
Enterprise (> 1000 emp.)
"The experts in their field"
What do you like best about Trilight Security Services?

They are experts , who can be relied upon for the best service and secure products. The cost is also reasonable for the quality of product and service that they provide Review collected by and hosted on G2.com.

What do you dislike about Trilight Security Services?

Nothing in particular, we are satisfied with their services. Review collected by and hosted on G2.com.

Verified User in Construction
GC
Small-Business (50 or fewer emp.)
"Essential cybersecurity services for architecture & construction company"
Describe the project or task Trilight Security Services helped with:

An architecture and construction company hired Trilight Security to provide essential cybersecurity services. They’re responsible for implementing an anti-virus solution, VPN, and more to increase security and protect client’s data. Review collected by and hosted on G2.com.

What do you like best about Trilight Security Services?

We are pleased with their ability to meet all our needs, even going beyond what was expected while keeping within the budget. Review collected by and hosted on G2.com.

Verified User in Information Services
GI
Small-Business (50 or fewer emp.)
"Cybersecurity for Cloud & Hosting Service Provider"
Describe the project or task Trilight Security Services helped with:

Trilight Security performed a vulnerability scan of a cloud and hosting services system and provided a comprehensive report. Review collected by and hosted on G2.com.

What do you like best about Trilight Security Services?

What we liked the most was the way they helped us implement most of their suggestions made in the vulnerability report. Review collected by and hosted on G2.com.

There are not enough reviews of Trilight Security Services for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Insight Assurance Logo
Insight Assurance
4.9
(112)
Developed by the American Institute of CPAs (AICPA), SOC 2 reports provide detailed information and assurance about the controls at a service organization relevant to the trust services categories security, availability, and integrity of the systems used to process data, as well as the confidentiality and privacy of the information processed.
2
SHI Logo
SHI
4.7
(109)
SHI is a provider of end-to-end IT solutions built on technologies from AWS, Cisco, Dell, Microsoft, and more. With 35 years of experience and nearly 6,000 global professionals, SHI helps over 17,000 organizations select, deploy, and manage IT solutions that drive growth and innovation. Combining the scale of a global integrator with the personalized service of a local partner, SHI empowers smart technology decisions to support your strategic goals.
3
Johanson Group Logo
Johanson Group
4.9
(98)
We are a client-focused professional services firm in operation for eight years, providing audit and attestation services to businesses of all sizes worldwide! Johanson Group brings integrity, efficiency, and flexibility to auditing while helping clients demonstrate conformance with their governance, risk management, and compliance (GRC) requirements.
4
PlutoSec Logo
PlutoSec
5.0
(47)
Plutosec is a cybersecurity firm specializing in web application penetration testing, API security, and cloud infrastructure protection. We help SaaS companies, fintech startups, and e-commerce businesses identify and fix critical vulnerabilities before they’re exploited.
5
Cybriant Logo
Cybriant
4.7
(34)
Cybriant assists companies in making informed business decisions and sustaining effectiveness in the design, implementation, and operation of their cyber risk management programs. We deliver a comprehensive and customizable set of strategic and managed cybersecurity services.
6
Corsica Technologies Logo
Corsica Technologies
4.5
(33)
Consistently recognized as one of the top managed IT and cybersecurity providers, Corsica Technologies helps companies leverage technology as a competitive business advantage. We bring cohesion to your technology strategy, addressing all your needs from one integrated partner. Through our specialized knowledge of IT and cybersecurity, we are a collaborative partner in driving your business forward.
7
CompuData Logo
CompuData
4.6
(33)
CompuData is an award-winning business technology solution provider celebrating 45 years in business.
8
ThreatSpike Logo
ThreatSpike
4.9
(31)
ThreatSpike is the first managed service for offensive security which provides unlimited testing for an affordable, fixed price. This means you can pentest your applications, identify your vulnerabilities and carry out a full-scale red team attack on your company continuously throughout the year. This all-in-one service includes: - Unlimited penetration tests and red team exercises - Internal, external, and web application testing - Engagements led by certified specialists - Detailed finding reports - Manual and automated testing - ISO 27001, SOC 2, PCI-DSS and Cyber Essentials aligned tests - Vulnerability scanning - Monthly account meetings
9
Nomic Networks Logo
Nomic Networks
4.8
(29)
To combat increasingly sophisticated cybersecurity threats, you need an equally sophisticated network-based approach. Nomic's MNDR thwarts stealthy intrusion and exploit attempts, and shines a light on anomalous network traffic.
10
Trava Security Logo
Trava Security
4.9
(27)
At Trava our vCISOs are experts in crafting a comprehensive compliance roadmap that guides you through planning, execution, and the audit and attestation process. Here's what you can expect from our outsourced vCISO services:
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Trilight Security Services