Best Software for 2025 is now live!

Service Provider

Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated TrustedSec Alternatives

TrustedSec Reviews & Provider Details

TrustedSec Overview

What is TrustedSec?

TrustedSec specializes in Information Security consulting services focused on promoting a healthy information security program.

TrustedSec Details
Show LessShow More
Provider Description

TrustedSec specializes in Information Security consulting services focused on promoting a healthy information security program.


Seller Details
Twitter
@TrustedSec
75,735 Twitter followers

Nathan N.
NN
Overview Provided by:
Cybersecurity Marketing Specialist

Recent TrustedSec Reviews

AUBREY L D C.
AC
AUBREY L D C.Small-Business (50 or fewer emp.)
5.0 out of 5
"Trusted security testing team"
On our website people pay for services and buy goods online. This type of website can fall into hands of attacks to steal from customers. Trustedse...

TrustedSec Media

Answer a few questions to help the TrustedSec community
Have you used TrustedSec before?
Yes

1 TrustedSec Reviews

5.0 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
1 TrustedSec Reviews
5.0 out of 5
1 TrustedSec Reviews
5.0 out of 5
G2 reviews are authentic and verified.
AUBREY L D C.
AC
Data Scientist
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
Describe the project or task TrustedSec helped with:

On our website people pay for services and buy goods online. This type of website can fall into hands of attacks to steal from customers. Trustedsec helped us to explore all security advancements to protect our site. Review collected by and hosted on G2.com.

What do you like best about TrustedSec?

These guys are more than willing to do their job and their service is the more than the value of money they charge. Review collected by and hosted on G2.com.

What do you dislike about TrustedSec?

Sometimes the vulnerability assessments can take time to bring out reports and solutions Review collected by and hosted on G2.com.

Recommendations to others considering TrustedSec:

Best security improvement service Review collected by and hosted on G2.com.

What problems is TrustedSec solving and how is that benefiting you?

We are now sure that our site is fully protected as we enquire from them from time to time to perform the vulnerability tests. Review collected by and hosted on G2.com.

There are not enough reviews of TrustedSec for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Johanson Group Logo
Johanson Group
4.9
(80)
We are a client-focused professional services firm in operation for eight years, providing audit and attestation services to businesses of all sizes worldwide! Johanson Group brings integrity, efficiency, and flexibility to auditing while helping clients demonstrate conformance with their governance, risk management, and compliance (GRC) requirements.
2
7 Layer Solutions Logo
7 Layer Solutions
4.8
(56)
The 7 Layer organization is comprised of three main verticals which include: 1) Managed Services – ongoing IT support and ownership across the entire environment, enterprise infrastructure staff aug 2) Cybersecurity – MSSP services, fractional CISO, security assessments and penetration testing, risk remediation. 3) Advisory Services – infrastructure assessment, IT strategy and roadmap, cost rationalization, IT project delivery, fractional CIO
3
McAfee Security Services Logo
McAfee Security Services
4.0
(45)
Armed with the latest tools, strategies, and knowledge to address your global security needs, our comprehensive services include everything from incident response and security risk assessments to comprehensive, customized deployments and training. We offer a full range of services that span the entire McAfee portfolio of solutions and ensure you get heightened visibility into your overall security posture.
4
RSA Services Logo
RSA Services
4.6
(45)
RSA Business-Driven Security solutions help customers comprehensively and rapidly link security incidents with business context, enabling them to respond effectively and protect what matters most.
5
GSI, Inc. Logo
GSI, Inc.
4.9
(37)
GSI, Inc. specializes in providing a broad spectrum of business, functional, and technical consulting services for Oracle JD Edwards, Oracle NetSuite, Oracle Cloud, ServiceNow, HubSpot and other enterprise applications. GSI also offers an extensive array of cloud/hosting solutions using Oracle Cloud (OCI), Amazon Web Services (AWS), Microsoft Azure and private cloud options.
6
Cybriant Logo
Cybriant
4.7
(34)
Cybriant assists companies in making informed business decisions and sustaining effectiveness in the design, implementation, and operation of their cyber risk management programs. We deliver a comprehensive and customizable set of strategic and managed cybersecurity services.
7
AIMLEAP - Outsource Bigdata Logo
AIMLEAP - Outsource Bigdata
5.0
(28)
AIMLEAP - Outsource Big Data offers trustworthy data scraping and crawling solutions for our customers. We are delivering various outsource data scraping services such as smart data scraping, bulk data scraping, scheduled data scraping, and more. Our enthusiastic professionals assist to extract the data from different resources. Features: Deliver high-quality data, save time, stay up-to-date, and improve ROI.
8
OneNeck IT Solutions Logo
OneNeck IT Solutions
4.6
(26)
The company offers a full suite of IT solutions including cloud and hosting solutions; ReliaCloud™ enterprise cloud services; managed services; ERP application management; professional services; and IT hardware.
9
Insight Assurance Logo
Insight Assurance
4.9
(26)
Developed by the American Institute of CPAs (AICPA), SOC 2 reports provide detailed information and assurance about the controls at a service organization relevant to the trust services categories security, availability, and integrity of the systems used to process data, as well as the confidentiality and privacy of the information processed.
10
Check Point Services Logo
Check Point Services
4.6
(24)
Check Point Software Technologies Ltd. is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyberattacks with an unmatched catch rate of malware and other types of threats.
Show More