New Pentest Type: Azure Security Configuration Review
Our newest pentest type is a premium tier engagement designed to evaluate an organization's Azure security configuration. It focuses on critical Azure services and configurations, ensuring they align with industry best practices and comply with standards like the CIS Microsoft Azure Foundations Benchmark and the security pillar of the Azure Well-Architected Framework. We have a talented pool of pentesters ready to assist in this new service!
What we did
Enhanced Cloud Security Posture: The review comprehensively assesses a customer's Azure security configuration, focusing on critical services and configurations to ensure alignment with industry best practices.
Reduced Risk of Security Breaches: By identifying and helping remediate security vulnerabilities, the review helps customers reduce the likelihood of security incidents and data breaches, protecting their valuable data and reputation.
Independent, Third-Party Evaluation: The review offers an objective and unbiased assessment of the customer's Azure security configuration, providing valuable insights and recommendations for improvement.
How to Get Started:
Existing Customers with Premium Pentest Hours:
Log in to the platform: Customers can access the pentest scoping questionnaire directly within the platform.
Select the Azure Security Configuration Review as the asset type for their new pentest.
The platform will guide them through defining the scope and initiating the review.
Prospects:
Contact Sales: Prospects can initiate the process by contacting our sales team.
The sales team will then provide them with the scoping questionnaire.
Once the prospect completes the questionnaire, the sales team will work with them to provide a quote.
Nav 3.0 π
We are excited to announce Nav 3.0! With Nav 3.0, it is now easier to access Hai and your engagement settings. The changes also bring cleaner and more scalable navigation with less page clutter.
What we did:
Moved Hai, profile, notifications, and help to the top-right and moved the organization dropdown to the top-left
Introduced an engagement dropdown for easy context switching between programs
Why we did it:
Fewer clicks for customers to use our products and features
Empowers users to manage the platform with less need for CSM support
Easy to expand our products and features without cluttering the nav
Who it helps:
Our users - features are now more discoverable, and time is saved with fewer clicks and page loads
Check it out in the platform now, or get an overview in our Navigation doc!
Hai Program Insights
We're excited to announce the general availability of Hai Program Insights - a powerful new way to explore your program analytics and benchmarking directly through Hai.
What we did:
Developed a powerful new analytics capability in Hai that provides comprehensive insights across all vulnerability management programs, leveraging our HAQL backend for consistent results
Delivering more than just visualizations - Hai provides contextual insights and meaningful explanations of your data
Fully integrated into the conversational Hai experience, enabling natural discussions about your program data and analytics
Why we did it:
Security teams needed better visibility into vulnerability trends across their programs without having to hunt down and analyze the data themselves
Leaders who access HackerOne infrequently can now ask Hai for the data they need without having to learn where to find it
Manual data analysis was time-consuming and often missed valuable patterns - now generating custom queries is just a single question away
Who it helps:
Security teams managing vulnerability programs
Program managers tracking performance metrics
Leadership teams to show value from their investment
How to use it
Open Hai by clicking on the menu at the top left and selecting "Analytics" from the Hai Plays options. Alternatively, customers can navigate to their analytics dashboards and click on the "explore with Hai" button. Then, start asking questions about your program's performance and trends! Learn more in our document.