Find products trusted by professionals in your network
See which products are used by connections in your network and those that share similar job titles Sign in to view full insights
Software used to attempt security breaches in order to detect vulnerabilities, defects, and penetration points in production. - Run simulated cyberattacks, gather insights, and produce reports of results - Target known or potential weaknesses in computer systems and applications - Test communication channels and make assessments of organizational impact
161 results
A Bug Bounty program gives you access to a diverse, unlimited pool of skilled security researchers. Our community of hunters provides a continuous audit of your growing attack surface to uncover high impact vulnerabilities – even on heavily-pentested scopes. - Private Bug Bounty Programs: Private Bug Bounty programs are restricted to a specific number of handpicked security researchers and the program rules are not publicly disclosed. YesWeHack chooses hunters whose skillset and experience are best suited to your assets, budget and testing requirements. Only thoroughly vetted and high-ranking hunters are eligible for private programs. - Public Bug Bounty Programs: Public Bug Bounty programs are open to our entire community of ethical hackers and their basic details are publicly disclosed. By crowdsourcing security testing at such scale, you can potentially maximise test coverage and showcase your commitment to security to your customers, partners, and shareholders.
The world's leading toolkit for web application security testing. Burp Suite Professional allows users to test, find, and exploit vulnerabilities faster, accelerate penetration testing workflows, and perform powerful manual testing. It's the web security tester's toolkit of choice. Use it to automate repetitive testing tasks - then dig deeper with its expert-designed manual and semi-automated security testing tools. Burp Suite Professional can help you to test for OWASP Top 10 vulnerabilities - as well as the very latest hacking techniques.
Astra Security is a cyber security SaaS company that makes otherwise chaotic penetration tests a breeze with its one of a kind Pentest Platform. Astra's continuous vulnerability scanner emulates hacker behavior to scan applications for 9300+ security tests. CTOs & CISOs love Astra because it helps them fix vulnerabilities in record time and move from DevOps to DevSecOps with Astra's CI/CD integrations. Astra is loved by 650+ companies across the globe. Last year, Astra uncovered 2,000,000+ vulnerabilities for its customers, saving customers $69M+ in potential losses due to security vulnerabilities. We've been awarded by the President of France Mr. François Hollande at the La French Tech program with Prime Minister of India Mr. Narendra Modi at the Global Conference on Cyber Security.
Intigriti is a rapidly growing cybersecurity company that specializes in crowdsourced security services to help organizations protect themselves from cybercrime. Our industry-leading bug bounty platform enables companies to tap into our global community of 125,000 ethical hackers, who use their unique expertise to find and report vulnerabilities to protect businesses. More than 200 organizations including Intel, Yahoo!, and Red Bull trust our platform to reduce the risk of cyber-attacks and data breaches. Our range of complementary security testing services help companies keep their digital assets secure and reduce the risk of damage resulting from breaches. Founded in 2016, Intigriti now has a global team of 100+ employees spread across Belgium, the UK, the Netherlands, and South Africa. Our services can be divided into three main categories: • Bug Bounty • Managed VDP • PTaaS • Focused Sprints • Live Hacking Events
See which products are used by connections in your network and those that share similar job titles Sign in to view full insights
YesWeHack is a leading Offensive Security and Exposure Management platform delivering integrated, API-based solutions to secure organisations’ growing attack surfaces. Its human-in-the-loop model combines Bug Bounty, Autonomous Pentesting, Continuous Pentesting and unified vulnerability management to deliver agile, exhaustive security testing at scale. Customers include Louis Vuitton, Ferrero, the European Commission, Tencent and L’Oréal Groupe. ISO 27001-certified, CREST-accredited, and EU-hosted with full GDPR compliance.
XM Cyber is a leading hybrid cloud security company that’s changing the way organizations approach cyber risk. XM Cyber transforms exposure management by demonstrating how attackers leverage and combine misconfigurations, vulnerabilities, identity exposures, and more, across AWS, Azure, GCP and on-prem environments to compromise critical assets. With XM Cyber, you can see all the ways attackers might go, and all the best ways to stop them, pinpointing where to remediate exposures with a fraction of the effort. Founded by top executives from the Israeli cyber intelligence community, XM Cyber has offices in North America, Europe, and Israel.
Veracode Manual Penetration Testing combines the skills of world-class penetration testers with automated security testing scan results to dramatically reduce application risk, meet compliance requirements, and help teams understand and report on security posture.