Listing Thumbnail

    HackerOne Challenge

     Info
    Sold by: HackerOne 
    Businesses of all sizes rely on the scalability of AWS to host their business critical applications and cloud workloads. But with new deployments come new vectors for malicious attacks unless rooted out in advance. Only by pressure testing your digital assets from an adversarial perspective can you understand their resilience to attack. HackerOne Challenge brings a tailored approach to offensive security testing by aligning the expertise of our legion of ethical hackers with your specific security objectives.
    Listing Thumbnail

    HackerOne Challenge

     Info
    Sold by: HackerOne 

    Overview

    HackerOne Challenge is powered by the world’s largest community of ethical hackers and security researchers to bring a preemptive, adversarial perspective to improving your attack resistance. HackerOne Challenge delivers many of the same outcomes as our premier bug bounty solution, HackerOne Bounty, with the key difference being that Challenge is an invite-only, time-bound engagement meant to satisfy specific security objectives.

    Where HackerOne Bounty is meant to provide continuous security testing on your critical assets, HackerOne Challenge can be curated to meet your individual use case for assets that are not currently a part of an existing bug bounty program scope. These parameters provide an extra layer of control for businesses who need hyper-focused testing on sensitive assets but still require real-world vulnerability feedback that can only come from human ingenuity and expertise.

    Highlights

    • Diverse Ethical Hacker Community: Tap into a legion of ethical hackers with varying backgrounds, skill sets, and perspectives to cover diverse attack surfaces including web, cloud, mobile, IoT, and more.
    • Customized to Fit Your Use Case: With HackerOne Challenge your team specifies the timeframe for the engagement, assets in and out of scope, and the specific skill set you wish to invite to participate.
    • DevSecOps Workflows and Actionable Reporting: Uncovering vulnerabilities is only half the battle. HackerOne Challenge generates comprehensive vulnerability reports to ensure engineers and developers have everything they need to fix critical vulnerabilities quickly. Vulnerability data and retest information can be fed into security, development, and DevOps workflows to help expedite remediation efforts.

    Details

    Delivery method

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Support

    Vendor support

    Each HackerOne Challenge engagement is pair with a Technical Engagement Manager (TEM). Your HackerOne TEM will help determine the scope of assets to be tested and helps to define the desired objective for the Challenge, be it flagging specific vulnerability classes, testing newly released code, or validating security controls in place. From there, HackerOne takes point on inviting hackers, testing, triaging results and producing reports once the Challenge concludes.

    For more information, you can contact us at www.hackerone.com/contact , email our sales team at sales@hackerone.com , or visit our Platform documentation page at