Listing Thumbnail

    HackerOne

     Info
    Sold by: HackerOne 
    Deployed on AWS
    Vendor Insights
    HackerOne is a global leader in offensive security solutions. Our HackerOne Platform combines AI with the ingenuity of the largest community of security researchers to find and fix security, privacy, and AI vulnerabilities across the software development lifecycle. The platform offers bug bounty, vulnerability disclosure, pentesting, AI red teaming, and code security. We are trusted by industry leaders like Amazon, Anthropic, Crypto.com, General Motors, GitHub, Goldman Sachs, Uber, and the U.S. Department of Defense. HackerOne was named a Best Workplace for Innovators by Fast Company in 2023 and a Most Loved Workplace for Young Professionals in 2024.

    Overview

    Play video

    HackerOne is a global leader in offensive security solutions. Our HackerOne Platform combines AI with the ingenuity of the largest community of security researchers to find and fix security, privacy, and AI vulnerabilities across the software development lifecycle. The platform offers bug bounty, vulnerability disclosure, pentesting, AI red teaming, and code security.

    For custom pricing, EULA, or a private contract, please contact AWS-Marketplace@hackerone.com , for a private offer.

    HackerOne Response -Receive expert guidance on VDP policy creation and launch, using best practices from hundreds of programs -Tailor setup and implementation to meet your business needs and industry regulations -Gain a unified view of report trends to refine security measures and strengthen your overall security

    HackerOne Pentest -Get started quickly with streamlined scoping tailored to your needs Integrate directly into your SDLC for continuous, real-time collaboration -Gain clear, actionable insights with fully transparent delivery -Accelerate issue resolution with rapid, effective remediation -Simplify retesting and ensure consistency with easy repeat engagement

    HackerOne Bounty -24/7 coverage of your growing attack surface -Catch exploits that automated tools miss -Hone in on specific areas of concerns as needed -Attract new talent with time-bound incentives -Scale the reach of your security team

    HackerOne AI Red Teaming -Engage in offensive testing with complete control over scope, timeframe, and required skills -Integrate vulnerability reports directly into security and DevOps workflows -Get expert guidance on threat modeling, policy creation, and mitigation before and after testing

    HackerOne Challenge -Deploy targeted testing quickly, aligning with immediate security needs without long-term commitments. -Integrate vulnerability findings directly into your security and DevSecOps workflows for efficient remediation. -Receive expert guidance on every step, ensuring comprehensive support before and after testing.

    Streamlined integrations and automation: HackerOne offers robust APIs and built-in integrations and automation, simplifying vulnerability management and streamlining workflows.

    Together, these integrated solutions provide indispensable capabilities for organizations. They ensure that vulnerabilities are continuously identified, prioritized, and remediated, providing unmatched protection from code to the cloud.

    Learn more about each one of our offerings designed to address specific security challenges with our Defense-in-Depth strategy at https://www.hackerone.com/product/overview 

    Highlights

    • Maintain continuous vigilance for your expanding digital attack surface, including applications, cloud assets, APIs, IoT, and the software supply chain. Quickly meet compliance and regulatory standards to ensure your product launches stay on track. Measure threats, examine the landscape, and demonstrate value to stakeholders, customers, and partners.
    • Flag elusive vulnerability classes that only human ingenuity and precision can uncover and avoid the false positives that come from automated scanners. Access security skills that align with your technology stack and free up internal resources to focus on more strategic initiatives. Direct communication with researchers: The platform facilitates real-time communication between organizations and security researchers, enabling remediation suggestions and quick vulnerability resolution.
    • Hai - AI copilot provides a deeper and more immediate understanding of your security program so you can make decisions and deliver fixes faster. Effortlessly translate natural language into precise queries, enrich vulnerability reports with relevant context, and use platform data to generate insightful recommendations. Integrate Hai's features into your current processes and tools with custom vulnerability scanner templates, API integrations, and dynamic automation.

    Details

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Vendor Insights

     Info
    Skip the manual risk assessment. Get verified and regularly updated security info on this product with Vendor Insights.
    Security credentials achieved
    (3)

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Pricing is based on the duration and terms of your contract with the vendor, and additional usage. You pay upfront or in installments according to your contract terms with the vendor. This entitles you to a specified quantity of use for the contract duration. Usage-based pricing is in effect for overages or additional usage not covered in the contract. These charges are applied on top of the contract price. If you choose not to renew or replace your contract before the contract end date, access to your entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (1)

     Info
    Dimension
    Description
    Cost/12 months
    HackerOne Platform
    Proven human-powered security testing, enhanced by AI
    $500,000.00

    Additional usage costs (1)

     Info

    The following dimensions are not included in the contract terms, which will be charged based on your usage.

    Dimension
    Cost/unit
    Rewards overage fee
    $0.01

    Vendor refund policy

    There are no refund options available.

    Custom pricing options

    Request a private offer to receive a custom quote.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    To ensure that you receive timely assistance, it's important to be aware of our Support & Mediation team's business hours. This documentation details when our Support Team is available, how to reach them, and additional resources for self-help outside of these hours.

    Support Team Operating Hours Our dedicated Support team is available to assist you during the following hours:

    Monday to Friday: Mediation (Customers)

    8:00am - 5:00pm PT

    Support

    12:00am-4:30pm PT

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    10
    In Observability, Testing
    Top
    10
    In Assessments
    Top
    25
    In Testing

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    11 reviews
    Insufficient data
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Vulnerability Management
    Comprehensive platform for identifying, prioritizing, and remediating security vulnerabilities across software development lifecycle
    AI-Powered Security Research
    Combines artificial intelligence with human security researchers to detect complex security and privacy vulnerabilities
    Security Testing Methodologies
    Offers multiple offensive security approaches including bug bounty, vulnerability disclosure, pentesting, AI red teaming, and code security testing
    Integration Capabilities
    Provides robust APIs and built-in integrations to streamline vulnerability management workflows and enable direct integration with security and DevOps systems
    Attack Surface Monitoring
    Continuous vigilance and testing across diverse digital environments including applications, cloud assets, APIs, IoT, and software supply chain
    Penetration Testing Methodology
    Comprehensive security testing across multiple domains including AI, applications, mainframes, cloud, and network infrastructure
    Attack Surface Management
    Continuous discovery and monitoring of external and cyber assets with real-time vulnerability identification and prioritization
    Security Control Validation
    Breach and attack simulation to validate effectiveness of existing cybersecurity tools and detect potential security gaps
    Asset Discovery and Monitoring
    Automated identification and tracking of unknown assets, security control coverage, and contextual risk assessment
    Expert-Driven Security Assessment
    Manual validation and expert-led analysis of security vulnerabilities with advanced threat detection capabilities
    Security Testing Techniques
    Comprehensive multi-vector security testing integrating automated tools, AI, and ethical hacking across SAST, DAST, SCA, CSPM, PTaaS, and reverse engineering
    Continuous Security Integration
    CI/CD agent that continuously reviews source code changes and breaks build to prevent deployment of vulnerable software
    Cloud Platform Security
    Seamless security integration with major cloud platforms including AWS, Microsoft Azure, and Google Cloud Platform for infrastructure vulnerability assessment
    Vulnerability Remediation
    AI-powered vulnerability detection and remediation with customized fix options, including automatic code fixes and expert consulting
    Software Supply Chain Analysis
    Detailed component and dependency inventory tracking with dynamic SBOM updates across software development lifecycle changes

    Security credentials

     Info
    Validated by AWS Marketplace
    FedRAMP
    GDPR
    HIPAA
    ISO/IEC 27001
    PCI DSS
    SOC 2 Type 2
    -
    -
    -
    No security profile
    No security profile

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    |
    4 external reviews
    Star ratings include only reviews from verified AWS customers. External reviews can also include a star rating, but star ratings from external reviews are not averaged in with the AWS customer star ratings.
    Faizan Nehal

    Platform supports skill development with effective vulnerability reporting

    Reviewed on Feb 03, 2025
    Review provided by PeerSpot

    What is our primary use case?

    My use case is similar to DuckTron. The processes I use for DuckTron are exactly the same for HackerOne . Therefore, there isn't much of a difference. I use HackerOne  for finding vulnerabilities and reporting them, then receiving rewards akin to a bug bounty program. 

    Within my organization, HackerOne is used for vulnerability coordination through its user interface, which lists programs and websites for reporting vulnerabilities.

    What is most valuable?

    HackerOne is larger than WebCloud and has a better reputation than BugCloud, which results in a smoother process. Both platforms are similar in using their interfaces to list programs and facilitate reporting vulnerabilities, whether public or private.

    What needs improvement?

    Everything has become slower on HackerOne. I have noticed that older researchers receive all the private invites while newer ones receive fewer. The same goes for real-life events, where the same people are invited repeatedly. There are no clear guidelines for being invited to programs and conferences, and the process for receiving invitations appears arbitrary.

    For how long have I used the solution?

    I have used it for the same duration as other cloud services.

    What do I think about the stability of the solution?

    I have never faced any stability issues on HackerOne for the past four years. Everything was always completely smooth.

    What do I think about the scalability of the solution?

    HackerOne has high scalability. It is a large platform with many programs and clients, so I would rate it a nine out of ten.

    How are customer service and support?

    Technical support at HackerOne has slowed down considerably compared to four years ago. Previously, the support was quicker and more detailed, which is not the case now.

    Which solution did I use previously and why did I switch?

    I have tried Integrity and reported vulnerabilities there, and I have tried SVHack. However, I spend 90% of my time on HackerOne.

    How was the initial setup?

    The initial setup is simple and straightforward, which I would rate a nine out of ten. I have never faced any difficulties during this process.

    What was our ROI?

    HackerOne is free of cost for us. We receive rewards without needing to invest any money, so the return on investment is substantial.

    What's my experience with pricing, setup cost, and licensing?

    The cost is rated as one since there is no need to pay anything, not even a fee or commission.

    Which other solutions did I evaluate?

    I have tried other platforms like Integrity and YesLack, however, I focus most of my time on HackerOne.

    What other advice do I have?

    I rate HackerOne a nine out of ten. 

    It is slightly better than BugCloud. While some aspects have slowed down, HackerOne is still a strong platform for enhancing skills and offers an excellent initial setup. They should improve their invitation process.

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    reviewer2543502

    They have streamlined the complete process, which gives a sense of security to the users

    Reviewed on Sep 16, 2024
    Review provided by PeerSpot

    What is our primary use case?

    I mainly use it for downtime activities, earning extra cash alongside a full-time job, and to get new sales and profits.

    How has it helped my organization?

    It helps me to get new sales, profits, and other benefits.

    What is most valuable?

    The main thing I like about HackerOne  is that it provides a direct way to contact the program directly without the need to wait for weeks to get issues finalized and validated. They have streamlined the complete process, which gives a sense of security to the users.

    What needs improvement?

    The ability to view the conversation between the triagers and the programs will be really good. When an issue gets reported, the understanding conveyed to the program by the triagers is not visible to the reporter. This can cause gaps between what the finder has reported and what is explained to the program. If this communication is visible, it would benefit both parties.

    For how long have I used the solution?

    I have been using it for over three years, around three years.

    What do I think about the stability of the solution?

    I have not had any issues with stability like bugs or breakdowns.

    What do I think about the scalability of the solution?

    The scalability is good. It is easy to scale up or down data.

    How are customer service and support?

    The responsiveness has been good.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I did not use any different solution before using HackerOne .

    How was the initial setup?

    The initial setup is not rocket science. It is something easy.

    What's my experience with pricing, setup cost, and licensing?

    It is free.

    What other advice do I have?

    The improvements which I have listed should be considered.

    Jagdish SM

    Has a variety of programs but needs to implement AI to reduce duplicates

    Reviewed on Aug 30, 2024
    Review provided by PeerSpot

    What is our primary use case?

    I use the tool for vulnerability assessment and testing. 

    What is most valuable?

    The most valuable feature of HackerOne is its variety of programs. These programs provide depth into various areas, such as mobile, API, and websites. 

    What needs improvement?

    Response time can be improved. The HackerOne Trust team can be slow to respond sometimes. They're not using AI, which could help reduce the number of duplicate reports.

    For how long have I used the solution?

    I have been using the product for one and a half years. 

    What do I think about the stability of the solution?

    The tool is stable and has only minor bugs. 

    What do I think about the scalability of the solution?

    The solution is only scalable for registered users, not for mass people.

    What's my experience with pricing, setup cost, and licensing?

    The solution is free. 

    What other advice do I have?

    Integrating HackerOne into existing security protocols is impossible because it's just a platform. I rate the overall solution a six out of ten. For beginners, HackerOne is quite intuitive if you know the basics. You can easily create an account and start exploring different things.

    Hrithik Kumar

    Offers bug bounty opportunities and helps to earn extra money

    Reviewed on May 28, 2024
    Review provided by PeerSpot

    What is our primary use case?

    I use the tool for hacking, practicing, and doing responsible vulnerability disclosure.

    What is most valuable?

    I don't use the tool in my day-to-day work. It's more for freelancing. I search for open platforms where I can do penetration testing on websites. If I find any bugs or vulnerabilities, I get paid. So, I do it as a freelancing activity, and it's really helpful.

    Apart from getting all the bug bounty opportunities, we also get the chance to practice in a safe environment, like a demo setup. These features are great for beginners who want to explore bug bounties in the future.

    What needs improvement?

    One issue I've experienced is traffic. Many people try to participate when an opportunity with a bounty of around 1,000-15,000 dollars comes up. In this case, the first person to report the vulnerability gets the bounty. If a second person reports the same vulnerability, they are marked as duplicated instead of receiving some recognition. The second person also invested time finding the issue, so I think this can be improved.

    For how long have I used the solution?

    I have been using the product for three to four years. 

    What do I think about the stability of the solution?

    HackerOne is stable. 

    How are customer service and support?

    I haven't contacted the tool's technical support yet. 

    Which solution did I use previously and why did I switch?

    I decided to go with HackerOne because I have experience with three bug bounty platforms: HackerOne and Bugcrowd. With Bugcrowd, you have to search for opportunities. In contrast, HackerOne presents opportunities directly when you log in. Additionally, other platforms' server response time and reporting methods are longer compared to HackerOne. HackerOne's reporting process is straightforward, with dropdown options for selecting the website and type of vulnerability.

    How was the initial setup?

    The solution doesn't need an installation since it's a SaaS model. It's very easy to use. When you log in for the first time, you'll directly see the opportunities page, where companies are ready for you to hack. The opportunities are right before you, so you don't have to search for them like on other platforms. 

    What's my experience with pricing, setup cost, and licensing?

    The tool is open-source and free for bug bounty hunters. 

    What other advice do I have?

    In college, I started using HackerOne and taught my 10-20 juniors how to use it. I'm sure they might still be using it in their lives right now. The biggest challenge integrating HackerOne into my existing security protocols has been on my side, not the tool's. I need to take the time out to use and practice with it, but currently, I'm unable to give it the time I used to. There's no issue from the application side.

    To use the tool, you first need a basic knowledge of cybersecurity terms, like exploits and vulnerabilities, and how to identify them. Once familiar with these basics, you can learn more from the resources and platforms HackerOne provides. They offer tickets and guides to help you understand the methods for finding and exploiting vulnerabilities.

    Before deciding to use the solution in your organization, consider the purpose. HackerOne is a multi-platform. If the goal is to spread awareness about cybersecurity or to make the security team more active in learning about hacking methods and new vulnerabilities, then it can be very effective. It allows the team to earn extra money while learning and exploring new vulnerabilities in the market, potentially even finding zero-day vulnerabilities.

    I would rate HackerOne around an eight to nine out of ten. The application is simple to use, offering numerous opportunities and scopes for exploration. It covers many platforms, including web, Android, and iOS applications. However, the high traffic can sometimes be a drawback. If they manage this issue by implementing features like consolidation pricing for duplicate vulnerabilities, it could easily be a ten out of ten.

    View all reviews