Their proven technical expertise, business-oriented approach and strong commitment to adapting solutions to each customer's specific environment. Velstadt's team takes responsibility from the initial consultation through to post-deployment support. Review collected by and hosted on G2.com.
Their high attention to detail sometimes results in a slightly longer engagement ramp-up time, but this reflects their commitment to quality. Once the final outcome is delivered, it becomes clear that the additional time invested resulted in a more thorough and detailed result. To sum up, there’s really nothing to complain about - everything meets expectations. Review collected by and hosted on G2.com.
Unlike many security companies that deliver generic reports filled with automated findings, Velstadt's approach was methodical and strategic. Every step of their testing process was transparent, and their insights were tailored to our specific environment. They provided detailed walkthroughs of potential attack chains, demonstrating exactly how a threat actor could exploit our vulnerabilities and what steps we should take to close those gaps.
One of the outstanding aspects was their ability to translate technical findings into actionable business risks. Instead of just listing CVEs, they mapped out real-world attack scenarios, making it easy for our executive team to understand why investing in security improvements was critical. Review collected by and hosted on G2.com.
Nothing to complain about. Their process was thorough, and communication was excellent. If anything, we only wish we had engaged them sooner. Review collected by and hosted on G2.com.
Velstadt's deep expertise in Active Directory and EDR hardening helped us close critical security gaps. Their hands-on approach provided clear, actionable steps that improved our security posture and reduced risk. In addition, their detailed technical reports were easily understood by our C-level managers, making it simpler to communicate security needs and priorities across the organisation. Review collected by and hosted on G2.com.
We're highly satisfied with Velstadt's work. They delivered on time and with minimal impact on our operations. Review collected by and hosted on G2.com.
We were impressed by Velstadt’s in-depth knowledge of EU cybersecurity regulations and their ability to turn complex legal requirements into clear, structured and actionable practices. Their team combined technical precision with regulatory insight, delivering guidance that was not only compliant but also practical and business-aligned. We also appreciated their responsiveness and flexibility throughout the project. Review collected by and hosted on G2.com.
There were no notable drawbacks. The process required some internal involvement on our side, which is natural when developing a security framework tailored for long-term resilience and compliance. Review collected by and hosted on G2.com.
The testing was thorough and covered all aspects of mobile security, from insecure data storage to improper session handling. The reports were comprehensive, with clear and precise recommendations that helped us prioritise and remediate issues. The team used industry best practices and up-to-date methodologies, which significantly increased our confidence in the overall security of our mobile applications. Review collected by and hosted on G2.com.
We have had no issues with the service. The team has been responsive and thorough in their assessments. Review collected by and hosted on G2.com.
Velstadt excels at delivering intelligence that is both context-rich and actionable. Instead of overwhelming us with raw data, they provide clear, practical insights that empower us to act confidently and mitigate risks efficiently. Review collected by and hosted on G2.com.
We have had no problems with Velstadt. The service has been great overall. Review collected by and hosted on G2.com.
Velstadt demonstrated strong technical expertise and a highly professional approach throughout the project. We particularly appreciated their ability to translate technical findings into business context, helping us to focus on what really mattered. The penetration testing report was well-structured, clear, and actionable, which streamlined our remediation efforts. Their social engineering simulation was realistic and tailored to our environment, making the awareness exercise highly effective. We also valued their transparent communication and flexibility in adapting to our internal workflows. Review collected by and hosted on G2.com.
No concerns from our side. Everything went smoothly and as expected. Review collected by and hosted on G2.com.
The combination of expertise and clarity. Their team doesn't just find issues - they explain them in a way that makes sense to non-technical stakeholders. The final report was well organized, prioritizing risks based on impact and their recommendations were practical and actionable. Review collected by and hosted on G2.com.
We had a great experience overall. No complaints. Review collected by and hosted on G2.com.
Their hands-on expertise is second to none. The testing process is thorough, their reports are well-structured and easy to act on, and they don't just identify problems - they provide detailed steps to remediate or mitigate the issues. Review collected by and hosted on G2.com.
The level of service was of the highest standard, so, nothing to mention here. Review collected by and hosted on G2.com.
Comprehensive and tailored approach; deep understanding of product's needs and challenges; optimal solution proposal; integration of security features into our existing network infrastructure; proactive threat management. Review collected by and hosted on G2.com.
Nothing to highlight, wishing to go forward with more challenges. Review collected by and hosted on G2.com.