This is also how you can do it to avoid a hacker attack that relies on vulnerabilities: Varonis has started a public program for reporting vulnerabilities on the HackerOne bug bounty platform.
The Varonis Vulnerability Disclosure Program (VDP) enables the entire HackerOne community to easily report potential security issues related to Varonis enterprise and cloud environments, including Varonis SaaS products.
Ethical hackers look for vulnerabilities
“Varonis has had great success with its own vulnerability reporting program, so the next logical step was to partner with HackerOne, the undisputed leader in vulnerability coordination and bug bounty management,” said Guy Shamilov, Varonis CISO. “Our goal has always been to provide the best possible security for our platforms. With our new SaaS offering, we continue our huge investments in product security. The VDP at HackerOne allows security researchers to report problems easily and securely. This will help to make our products even safer and thus protect our customers even better.”
Bug Bounty platform rewards hackers
"Varonis' decision to adopt a VDP is a major proactive step in hardening attack surfaces and is a sign of an increasingly sophisticated approach to security," said Amanda Berger, Chief Customer Officer at HackerOne. "The diverse hacking community has an unmatched ability to keep up with the ever-evolving threat landscape and identify the vulnerabilities that cybercriminals are most likely to exploit."
More at www.varonis.de
About Varonis Since its founding in 2005, Varonis has taken a different approach than most IT security providers by placing company data stored both locally and in the cloud at the center of its security strategy: sensitive files and e-mails, confidential customer, patient and Employee data, financial data, strategy and product plans and other intellectual property. The Varonis data security platform (DSP) detects insider threats and cyber attacks through the analysis of data, account activities, telemetry and user behavior, prevents or limits data security breaches by locking sensitive, regulated and outdated data and maintains a secure state of the systems through efficient automation .,