Overview
HackerOne Challenge is powered by the world’s largest community of ethical hackers and security researchers to bring a preemptive, adversarial perspective to improving your attack resistance. HackerOne Challenge delivers many of the same outcomes as our premier bug bounty solution, HackerOne Bounty, with the key difference being that Challenge is an invite-only, time-bound engagement meant to satisfy specific security objectives.
Where HackerOne Bounty is meant to provide continuous security testing on your critical assets, HackerOne Challenge can be curated to meet your individual use case for assets that are not currently a part of an existing bug bounty program scope. These parameters provide an extra layer of control for businesses who need hyper-focused testing on sensitive assets but still require real-world vulnerability feedback that can only come from human ingenuity and expertise.
Highlights
- Diverse Ethical Hacker Community: Tap into a legion of ethical hackers with varying backgrounds, skill sets, and perspectives to cover diverse attack surfaces including web, cloud, mobile, IoT, and more.
- Customized to Fit Your Use Case: With HackerOne Challenge your team specifies the timeframe for the engagement, assets in and out of scope, and the specific skill set you wish to invite to participate.
- DevSecOps Workflows and Actionable Reporting: Uncovering vulnerabilities is only half the battle. HackerOne Challenge generates comprehensive vulnerability reports to ensure engineers and developers have everything they need to fix critical vulnerabilities quickly. Vulnerability data and retest information can be fed into security, development, and DevOps workflows to help expedite remediation efforts.
Details
Pricing
Custom pricing options
Legal
Content disclaimer
Resources
Support
Vendor support
Each HackerOne Challenge engagement is pair with a Technical Engagement Manager (TEM). Your HackerOne TEM will help determine the scope of assets to be tested and helps to define the desired objective for the Challenge, be it flagging specific vulnerability classes, testing newly released code, or validating security controls in place. From there, HackerOne takes point on inviting hackers, testing, triaging results and producing reports once the Challenge concludes.
For more information, you can contact us at www.hackerone.com/contact , email our sales team at sales@hackerone.com , or visit our Platform documentation page at