Introducing G2.ai, the future of software buying.Try now
Inactive Profile: Need Admin Access?
No one has managed this profile for over a year.
If you work at Vulnerability Assessment & Penetration Testing (VAPT), reclaim access to make changes.

Service Provider

Vulnerability Assessment & Penetration Testing (VAPT)
Save to My Lists
Unclaimed
Unclaimed

Top Rated Vulnerability Assessment & Penetration Testing (VAPT) Alternatives

Vulnerability Assessment & Penetration Testing (VAPT) Reviews & Provider Details

Vulnerability Assessment & Penetration Testing (VAPT) Product Details

Claimed

Vulnerability Assessment & Penetration Testing (VAPT) Media

Product Avatar Image

Have you used Vulnerability Assessment & Penetration Testing (VAPT) before?

Answer a few questions to help the Vulnerability Assessment & Penetration Testing (VAPT) community

G2 reviews are authentic and verified.

There are not enough reviews of Vulnerability Assessment & Penetration Testing (VAPT) for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Johanson Group Logo
Johanson Group
4.9
(91)
We are a client-focused professional services firm in operation for eight years, providing audit and attestation services to businesses of all sizes worldwide! Johanson Group brings integrity, efficiency, and flexibility to auditing while helping clients demonstrate conformance with their governance, risk management, and compliance (GRC) requirements.
2
SHI Logo
SHI
4.6
(77)
SHI is a leading technology solutions provider that supports organizations with their IT needs. We work closely with your team to analyze your current environment, identify areas of improvement, and recommend the most suitable IT solutions. Our in-house data center integration, device configuration, and deployment and license advisory services, plus top-tier status with vendors and flexible financing helps simplify IT decision makers processes. SHI’s mission is to make life easier for business, IT, and procurement professionals through our scalable and cost-effective technology services.
3
7 Layer Solutions Logo
7 Layer Solutions
4.8
(57)
The 7 Layer organization is comprised of three main verticals which include: 1) Managed Services – ongoing IT support and ownership across the entire environment, enterprise infrastructure staff aug 2) Cybersecurity – MSSP services, fractional CISO, security assessments and penetration testing, risk remediation. 3) Advisory Services – infrastructure assessment, IT strategy and roadmap, cost rationalization, IT project delivery, fractional CIO
4
Insight Assurance Logo
Insight Assurance
4.9
(58)
Developed by the American Institute of CPAs (AICPA), SOC 2 reports provide detailed information and assurance about the controls at a service organization relevant to the trust services categories security, availability, and integrity of the systems used to process data, as well as the confidentiality and privacy of the information processed.
5
GSI, Inc. Logo
GSI, Inc.
4.9
(37)
GSI, Inc. specializes in providing a broad spectrum of business, functional, and technical consulting services for Oracle JD Edwards, Oracle NetSuite, Oracle Cloud, ServiceNow, HubSpot and other enterprise applications. GSI also offers an extensive array of cloud/hosting solutions using Oracle Cloud (OCI), Amazon Web Services (AWS), Microsoft Azure and private cloud options.
6
Cybriant Logo
Cybriant
4.7
(34)
Cybriant assists companies in making informed business decisions and sustaining effectiveness in the design, implementation, and operation of their cyber risk management programs. We deliver a comprehensive and customizable set of strategic and managed cybersecurity services.
7
PlutoSec Logo
PlutoSec
5.0
(40)
Plutosec is a cybersecurity firm specializing in web application penetration testing, API security, and cloud infrastructure protection. We help SaaS companies, fintech startups, and e-commerce businesses identify and fix critical vulnerabilities before they’re exploited.
8
ThreatSpike Logo
ThreatSpike
4.9
(29)
ThreatSpike is the first managed service for offensive security which provides unlimited testing for an affordable, fixed price. This means you can pentest your applications, identify your vulnerabilities and carry out a full-scale red team attack on your company continuously throughout the year. This all-in-one service includes: - Unlimited penetration tests and red team exercises - Internal, external, and web application testing - Engagements led by certified specialists - Detailed finding reports - Manual and automated testing - ISO 27001, SOC 2, PCI-DSS and Cyber Essentials aligned tests - Vulnerability scanning - Monthly account meetings
9
OneNeck IT Solutions Logo
OneNeck IT Solutions
4.6
(26)
The company offers a full suite of IT solutions including cloud and hosting solutions; ReliaCloud™ enterprise cloud services; managed services; ERP application management; professional services; and IT hardware.
10
Corsica Technologies Logo
Corsica Technologies
4.4
(24)
Consistently recognized as one of the top managed IT and cybersecurity providers, Corsica Technologies helps companies leverage technology as a competitive business advantage. We bring cohesion to your technology strategy, addressing all your needs from one integrated partner. Through our specialized knowledge of IT and cybersecurity, we are a collaborative partner in driving your business forward.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Vulnerability Ass...