Introducing G2.ai, the future of software buying.Try now
Aikido Security
Sponsored
Aikido Security
Visit Website
Product Avatar Image
TrustedSec

By TrustedSec

5.0 out of 5 stars
4 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with TrustedSec?

Aikido Security
Sponsored
Aikido Security
Visit Website
It's been two months since this profile received a new review
Leave a Review

TrustedSec Reviews & Provider Details

Profile Status

This profile is currently managed by TrustedSec but has limited features.

Are you part of the TrustedSec team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Product Avatar Image

Have you used TrustedSec before?

Answer a few questions to help the TrustedSec community

TrustedSec Reviews (1)

Reviews

TrustedSec Reviews (1)

5.0
1 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
AUBREY L D C.
AC
Data Scientist
Small-Business (50 or fewer emp.)
"Trusted security testing team"
Describe the project or task TrustedSec helped with:

On our website people pay for services and buy goods online. This type of website can fall into hands of attacks to steal from customers. Trustedsec helped us to explore all security advancements to protect our site. Review collected by and hosted on G2.com.

What do you like best about TrustedSec?

These guys are more than willing to do their job and their service is the more than the value of money they charge. Review collected by and hosted on G2.com.

There are not enough reviews of TrustedSec for G2 to provide buying insight. Below are some alternatives with more reviews:

1
SHI Logo
SHI
4.7
(109)
SHI is a provider of end-to-end IT solutions built on technologies from AWS, Cisco, Dell, Microsoft, and more. With 35 years of experience and nearly 6,000 global professionals, SHI helps over 17,000 organizations select, deploy, and manage IT solutions that drive growth and innovation. Combining the scale of a global integrator with the personalized service of a local partner, SHI empowers smart technology decisions to support your strategic goals.
2
Insight Assurance Logo
Insight Assurance
4.9
(99)
Developed by the American Institute of CPAs (AICPA), SOC 2 reports provide detailed information and assurance about the controls at a service organization relevant to the trust services categories security, availability, and integrity of the systems used to process data, as well as the confidentiality and privacy of the information processed.
3
Johanson Group Logo
Johanson Group
4.9
(97)
We are a client-focused professional services firm in operation for eight years, providing audit and attestation services to businesses of all sizes worldwide! Johanson Group brings integrity, efficiency, and flexibility to auditing while helping clients demonstrate conformance with their governance, risk management, and compliance (GRC) requirements.
4
7 Layer Solutions Logo
7 Layer Solutions
4.8
(69)
The 7 Layer organization is comprised of three main verticals which include: 1) Managed Services – ongoing IT support and ownership across the entire environment, enterprise infrastructure staff aug 2) Cybersecurity – MSSP services, fractional CISO, security assessments and penetration testing, risk remediation. 3) Advisory Services – infrastructure assessment, IT strategy and roadmap, cost rationalization, IT project delivery, fractional CIO
5
GSI, Inc. Logo
GSI, Inc.
4.9
(47)
GSI, Inc. specializes in providing a broad spectrum of business, functional, and technical consulting services for Oracle JD Edwards, Oracle NetSuite, Oracle Cloud, ServiceNow, HubSpot and other enterprise applications. GSI also offers an extensive array of cloud/hosting solutions using Oracle Cloud (OCI), Amazon Web Services (AWS), Microsoft Azure and private cloud options.
6
PlutoSec Logo
PlutoSec
5.0
(47)
Plutosec is a cybersecurity firm specializing in web application penetration testing, API security, and cloud infrastructure protection. We help SaaS companies, fintech startups, and e-commerce businesses identify and fix critical vulnerabilities before they’re exploited.
7
RSA Services Logo
RSA Services
4.6
(45)
RSA Business-Driven Security solutions help customers comprehensively and rapidly link security incidents with business context, enabling them to respond effectively and protect what matters most.
8
Cybriant Logo
Cybriant
4.7
(34)
Cybriant assists companies in making informed business decisions and sustaining effectiveness in the design, implementation, and operation of their cyber risk management programs. We deliver a comprehensive and customizable set of strategic and managed cybersecurity services.
9
Corsica Technologies Logo
Corsica Technologies
4.5
(31)
Consistently recognized as one of the top managed IT and cybersecurity providers, Corsica Technologies helps companies leverage technology as a competitive business advantage. We bring cohesion to your technology strategy, addressing all your needs from one integrated partner. Through our specialized knowledge of IT and cybersecurity, we are a collaborative partner in driving your business forward.
10
AIMLEAP - Outsource Bigdata Logo
AIMLEAP - Outsource Bigdata
5.0
(28)
AIMLEAP - Outsource Big Data offers trustworthy data scraping and crawling solutions for our customers. We are delivering various outsource data scraping services such as smart data scraping, bulk data scraping, scheduled data scraping, and more. Our enthusiastic professionals assist to extract the data from different resources. Features: Deliver high-quality data, save time, stay up-to-date, and improve ROI.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
TrustedSec
View Alternatives