Product Offerings

Organizations: Learn about the different products HackerOne offers.

Updated over a week ago

HackerOne is the #1 hacker-powered security platform that helps organizations find and fix critical vulnerabilities before they're criminally exploited.

HackerOne offers five different products that you can choose from:

Establish an ISO 29147 compliant disclosure policy to safely receive and act on vulnerabilities discovered by external third parties. This welcomes a "See Something, Say Something" process that helps ensure that security reports end up with your security team instead of unreliable channels like social media.

A program where trusted hackers are incentivized to continuously test for critical vulnerabilities. Bounty programs can be private, invite-only, or fully public; all incentives will reflect the organization’s priorities.

You can choose between 2 types of programs:

  • A managed program enables HackerOne to design, manage, and support your program from end to end.

  • A hosted program enables you to run and manage your own program.

HackerOne Bounty also includes spot checks and campaigns.

A private, project-based, and time-bound security test. Challenges are perfect for organizations that need focused, time-constrained security testing ahead of major initiatives, such as new product releases, code reviews, feature releases, or tightly focused spot checks on key assets.

A program that requires proven hackers to be background-checked to participate in them. Only hackers who are background-checked can participate in such programs due to the sensitive nature of their systems.

Authorized hackers simulate a cyberattack on a specific application to test how secure the application is. HackerOne pentests are performed by select hackers from the HackerOne community with skills and experience that best match your applications in scope.

Reduce noise while increasing your ability to take fast remediation actions with the help of our Triage team. HackerOne’s Triage Services are a paid offering any customer can purchase along with their BBP or VDP.

This service includes access to our worldwide team of security professionals, called Triage Analysts, who may update the report’s metadata, suggest severity and bounty, and leave a summary with steps to reproduce for faster remediation. We do this by communicating with both hackers and customers on vulnerability reports directly within their H1 program inboxes.

Next Steps

If you've decided to:

Uncover complex vulnerabilities that scanners alone can’t. Our network of background-checked, skills-vetted engineers scour your source code for security flaws, escalating risks that need attention and providing context-specific remediation guidance so issues can be resolved fast without slowing down progress.

Did this answer your question?