Overview

HackerOne is the #1 hacker-powered security platform that helps organizations find and fix critical vulnerabilities before they're criminally exploited.

HackerOne offers 3 different products that you can choose from:

  • HackerOne Response
  • HackerOne Challenge
  • HackerOne Bounty

HackerOne Response

Establish an ISO 29147 compliant disclosure policy to safely receive and act on vulnerabilities discovered by external third-parties. This welcomes a "See Something, Say Something" process that helps ensure that security reports end up with your security team instead of unreliable channels like social media.

overview-2

HackerOne Challenge

A private, project-based, and time-bound vulnerability assessment program. Challenges are perfect for organizations looking to supplement or replace traditional penetration tests with ethical hackers looking for severe vulnerabilities. Every Challenge includes a detailed report to help meet compliance requirements. Learn more about hacker-powered pen testing versus traditional pen testing.

overview-1

HackerOne Bounty

A program where trusted hackers are incentivized to continuously test for critical vulnerabilities. Bounty programs can be private and invite-only or fully public, and all incentives will reflect the organization’s priorities.

overview-3

Next Steps

If you've decided to:

  • Start a HackerOne Bounty or Response program, see: Program Start-Up Guide.
  • Start a HackerOne Challenge program, send a note to challenge@hackerone.com.