Pentest-as-a-Service offering for large companies

Pentest-as-a-Service offering for large companies

Share post

HackerOne, the leading security platform in Attack Resistance Management, has unveiled its enhancements: Pentest-as-a-Service (PTaaS) offering. The innovations include self-service capabilities for scoping and launching tests, as well as new automation features to streamline the user experience on the HackerOne platform.

Enterprises can now manage their jobs more efficiently and receive real-time insights from experienced pentesters to reduce security risks and improve attack defenses. To date, HackerOne's pentesters have reported more than 6.000 verified vulnerabilities.

6.000 vulnerabilities uncovered

"HackerOne Pentest eliminates the inefficient aspects of traditional pentesting solutions," said Ashish Warty, SVP of Product and Engineering at HackerOne. “Traditional pen tests typically take four to six weeks to start and return static results after testing is complete. HackerOne Pentest's improved capabilities allow customers to launch tests within a week and receive in-platform results from pentesters throughout the test deployment.”

Through the HackerOne platform, HackerOne Pentest combines the actual pentesting, retesting, communicating with the testers and analyzing the results into an all-in-one PTaaS experience. New enhancements reduce the complexity of testing, giving customers a number of benefits. This includes:

  • Faster testing – Simplified procurement process based on total hours of testing; self-service scoping makes it easier to start and run multiple tests per year.
  • maintain program efficiency - New automation and self-service capabilities keep programs flexible and in step with evolving digital security needs.
  • Reduce risk in real time - Critical results are delivered to customers as soon as pentesters encounter them, allowing customers to close their vulnerabilities in less time, thereby rapidly reducing their so-called Attack Resistance Gap.

HackerOne Pentest is backed by a group of more than 100 vetted and verified testers from around the world, ensuring high quality and consistent results every time. Each pentester must provide rigorous credentials, including at least three years of proven experience as a professional pentester. In addition, they must either have an OSCP/OSCE/OSWE/CREST certification or have more than 500 HackerOne reputation points.

More at HackerOne.com

 


About HackerOne

HackerOne closes the security gap between what companies own and what they can protect. HackerOne Attack Resistance Management combines the security expertise of ethical hackers with an inventory of assets and continuous evaluation and improvement of processes to find and close gaps in the ever-evolving digital attack surface.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more