Best Software for 2025 is now live!

Service Provider

Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated Black Belt Security Alternatives

Black Belt Security Reviews & Provider Details

Katelyn R.
KR
Employer Relations Specialist
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: Organic
Describe the project or task Black Belt Security helped with:

I reached out to Black Belt Security back in late July, early August, inquiring about the potential to mentor a senior Information Technology / Cyber Security Bachelor student. Veronika and her team investigated what this would look like and how it may work with the initiatives they were working on. We discussed the options where we exchanged great questions and thorough communication, resulting in a well-thought-out internship option for the student, providing them the necessary experience and exposure to the field. Students need to exercise their skill set before being thrust into the field. It is security, afterall. Black Belt knew this and took the time to ensure that it would be a meaningful, enriching experience. Review collected by and hosted on G2.com.

What do you like best about Black Belt Security?

Black Belt Security is comprehensive and detailed. They take the time to understand and apply how they can assist with the project at hand. They have exceptional customer service and communication! Review collected by and hosted on G2.com.

What do you dislike about Black Belt Security?

I have yet to experience anything that would be a dislike. Especially now, in the times we are in, it is essential to be transparent. Black Belt is that in every way. They make it a point to clarify and understand to ensure the best possible outcome! Review collected by and hosted on G2.com.

What problems is Black Belt Security solving and how is that benefiting you?

The problems we were solving with Black Belt Security were the need for / lack of access to young security professionals to learn and grow in the field, having access to quality experiences where they are doing, and solving security-based problems. Black Belt knows this is a need and takes security seriously. They are passionate about security and having it done and protected correctly. This type of attention is what you want from a security protection company! Review collected by and hosted on G2.com.

Black Belt Security Overview

What is Black Belt Security?

Black Belt Security specializes in delivering premium quality cybersecurity services and solutions such as manual penetration testing, security risk assessments, code analysis, and architecture reviews. We are powered by our vast wealth of expertise, our passion in the field, as well as our many proprietary methodologies and tools in our toolbox. Find out more at www.blackbeltsec.com

Black Belt Security Details
Show LessShow More
Provider Description

Black Belt Security specializes in delivering premium quality cybersecurity services and solutions such as manual penetration testing, security risk assessments, code analysis, and architecture reviews. We are powered by our vast wealth of expertise, our passion in the field, as well as our many proprietary methodologies and tools in our toolbox. Find out more at www.blackbeltsec.com


Seller Details
Year Founded
2019
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®

Veronika S.
VS
Overview Provided by:

Recent Black Belt Security Reviews

JK
James K.Small-Business (50 or fewer emp.)
5.0 out of 5
"Great and Generous Partner!"
They're nice and accessible folks who generously reviewed our charity's (The Lucky Foundation) systems and website. They provided detailed guidance...
Verified User
G
Verified UserEnterprise (> 1000 emp.)
4.0 out of 5
"Review on Black Belt Security"
When I worked on a new project, they helped with reviewing the security design and did a lot of testings
Katelyn R.
KR
Katelyn R.Mid-Market (51-1000 emp.)
5.0 out of 5
"Super Supportive / Exceptional Communication"
I reached out to Black Belt Security back in late July, early August, inquiring about the potential to mentor a senior Information Technology / Cyb...

Black Belt Security Media

Answer a few questions to help the Black Belt Security community
Have you used Black Belt Security before?
Yes

2 out of 3 Total Reviews for Black Belt Security

4.7 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
G2 reviews are authentic and verified.
JK
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about Black Belt Security?

They're nice and accessible folks who generously reviewed our charity's (The Lucky Foundation) systems and website. They provided detailed guidance and advice in a very timely manner! Review collected by and hosted on G2.com.

What do you dislike about Black Belt Security?

Nothing! Well, maybe the fact that Black Belt Security can't all become part of our organization! Review collected by and hosted on G2.com.

Recommendations to others considering Black Belt Security:

The Lucky Foundation recommends Black Belt Security without hesitation! Review collected by and hosted on G2.com.

What problems is Black Belt Security solving and how is that benefiting you?

Vulnerability scanning and general advice relating to our systems and website Review collected by and hosted on G2.com.

Verified User in Internet
GI
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: Organic
Describe the project or task Black Belt Security helped with:

When I worked on a new project, they helped with reviewing the security design and did a lot of testings Review collected by and hosted on G2.com.

What do you like best about Black Belt Security?

I like that they are easy to work with and open to communications Review collected by and hosted on G2.com.

What do you dislike about Black Belt Security?

I would love it better if the response time could be speeded up a little bit, but I understand that they might have multiple projects going on with different priorities Review collected by and hosted on G2.com.

What problems is Black Belt Security solving and how is that benefiting you?

it was required by my company's paranoids team to review my design. They helped with the review. I was able to make the design more secure after their review. Review collected by and hosted on G2.com.

There are not enough reviews of Black Belt Security for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Johanson Group Logo
Johanson Group
4.9
(80)
We are a client-focused professional services firm in operation for eight years, providing audit and attestation services to businesses of all sizes worldwide! Johanson Group brings integrity, efficiency, and flexibility to auditing while helping clients demonstrate conformance with their governance, risk management, and compliance (GRC) requirements.
2
GSI, Inc. Logo
GSI, Inc.
4.9
(37)
GSI, Inc. specializes in providing a broad spectrum of business, functional, and technical consulting services for Oracle JD Edwards, Oracle NetSuite, Oracle Cloud, ServiceNow, HubSpot and other enterprise applications. GSI also offers an extensive array of cloud/hosting solutions using Oracle Cloud (OCI), Amazon Web Services (AWS), Microsoft Azure and private cloud options.
3
Cybriant Logo
Cybriant
4.7
(34)
Cybriant assists companies in making informed business decisions and sustaining effectiveness in the design, implementation, and operation of their cyber risk management programs. We deliver a comprehensive and customizable set of strategic and managed cybersecurity services.
4
AIMLEAP - Outsource Bigdata Logo
AIMLEAP - Outsource Bigdata
5.0
(28)
AIMLEAP - Outsource Big Data offers trustworthy data scraping and crawling solutions for our customers. We are delivering various outsource data scraping services such as smart data scraping, bulk data scraping, scheduled data scraping, and more. Our enthusiastic professionals assist to extract the data from different resources. Features: Deliver high-quality data, save time, stay up-to-date, and improve ROI.
5
Insight Assurance Logo
Insight Assurance
4.9
(26)
Developed by the American Institute of CPAs (AICPA), SOC 2 reports provide detailed information and assurance about the controls at a service organization relevant to the trust services categories security, availability, and integrity of the systems used to process data, as well as the confidentiality and privacy of the information processed.
6
OneNeck IT Solutions Logo
OneNeck IT Solutions
4.6
(26)
The company offers a full suite of IT solutions including cloud and hosting solutions; ReliaCloud™ enterprise cloud services; managed services; ERP application management; professional services; and IT hardware.
7
ThreatSpike Logo
ThreatSpike
4.9
(24)
ThreatSpike is the first managed service for offensive security which provides unlimited testing for an affordable, fixed price. This means you can pentest your applications, identify your vulnerabilities and carry out a full-scale red team attack on your company continuously throughout the year. This all-in-one service includes: - Unlimited penetration tests and red team exercises - Internal, external, and web application testing - Engagements led by certified specialists - Detailed finding reports - Manual and automated testing - ISO 27001, SOC 2, PCI-DSS and Cyber Essentials aligned tests - Vulnerability scanning - Monthly account meetings
8
SHI Logo
SHI
4.4
(23)
SHI is a leading technology solutions provider that supports organizations with their IT needs. We work closely with your team to analyze your current environment, identify areas of improvement, and recommend the most suitable IT solutions. Our in-house data center integration, device configuration, and deployment and license advisory services, plus top-tier status with vendors and flexible financing helps simplify IT decision makers processes. SHI’s mission is to make life easier for business, IT, and procurement professionals through our scalable and cost-effective technology services.
9
Vumetric Cybersecurity Logo
Vumetric Cybersecurity
4.8
(20)
Vumetric is an ISO9001 certified company offering penetration testing, IT security audits and specialized cybersecurity services. We bring proven best practices to every project and have delivered our services across five continents. Our clients include S&P 500 companies, SMEs and government agencies.
10
Packetlabs Logo
Packetlabs
4.9
(19)
Application Security Testing evaluates the security of web and mobile applications to protect them from cyber-attacks. From source-code all the way up to the browser, an application security assessment measures the effectiveness of the controls you currently have in place by simulating a hack. Our OWASP-based Application Security Testing goes far beyond the OWASP Top 10 and helps to uncover even the more hard-to-find vulnerabilities exploited by more sophisticated adversaries. We have developed a unique approach to source top talent which has resulted in far more thorough testing than industry standards. Each of our consultants has at a minimum, the coveted 24-hour OSCP certification. Most application security testers rely on automated testing alone. This is only the beginning of our process, which is followed by extensive manual processes to provide one of the most thorough services the industry offers. The problem with automation alone is that it is prone to false positives (e.g., incorrect findings) and false negatives (e.g., missing critical areas of the application, lack of context, chained exploits, and more). By never relying on automation, our experts explore opportunities for more advanced attackers, mimicking a real-world scenario. Packetlabs’ unique approach to application security testing begins with developing a threat model and taking the time to understand the overall purpose, the components, and their interaction with sensitive information or functionality. This approach enables realistic simulation of how an attacker would target your application and in turn, provides you with more value. Only after thorough analysis do we begin attempting to manually compromise each layer of defence within the environment.
Show More