Overview
HackerOne Challenge is powered by the world’s largest community of ethical hackers and security researchers to bring a preemptive, adversarial perspective to improving your attack resistance. HackerOne Challenge delivers many of the same outcomes as our premier bug bounty solution, HackerOne Bounty, with the key difference being that Challenge is an invite-only, time-bound engagement meant to satisfy specific security objectives.
Where HackerOne Bounty is meant to provide continuous security testing on your critical assets, HackerOne Challenge can be curated to meet your individual use case for assets that are not currently a part of an existing bug bounty program scope. These parameters provide an extra layer of control for businesses who need hyper-focused testing on sensitive assets but still require real-world vulnerability feedback that can only come from human ingenuity and expertise.
Sold by | HackerOne |
Categories | |
Fulfillment method | Professional Services |
Pricing Information
This service is priced based on the scope of your request. Please contact seller for pricing details.
Support
Each HackerOne Challenge engagement is pair with a Technical Engagement Manager (TEM). Your HackerOne TEM will help determine the scope of assets to be tested and helps to define the desired objective for the Challenge, be it flagging specific vulnerability classes, testing newly released code, or validating security controls in place. From there, HackerOne takes point on inviting hackers, testing, triaging results and producing reports once the Challenge concludes.
For more information, you can contact us at www.hackerone.com/contact, email our sales team at sales@hackerone.com, or visit our Platform documentation page at https://docs.hackerone.com/.