#

CROWDSOURCED CYBERSECURITY TESTING PLATFORM

Run custom-tailored Bug Bounty Programs to secure your business and assets

HOW IT WORKS

STEP 1.

Your program goals

We help to set a clear scope, agree on a budget and make recommendations based on your company`s needs.

STEP 2.

Bug Bounty Program Launch

We launch your program and reach out to our committed crowd of hackers, attracting top talent to your bounty program by with consistent and coordinated attention.

STEP 3.

Bug Hunting

Our community of hackers starts searching for vulnerabilities.

STEP 4.

Reporting

Vulnerabilities are submitted and managed via our Coordination platform.

STEP 5.

Triage and Fixes

Reports are reviewed and triaged by the HackenProof team, and then passed on to your security team for fixing.

Depending on preference, you can choose to publicly disclose any reports, once the issues are resolved.

THE CHALLENGE

  • Cybercrime is relentless, undiminished, and unlikely to stop
  • By estimates from McAfee, cybercrime now costs the world almost $600 billion, or 0.8% of global GDP.
  • The Privacy Rights Clearing House estimates there were 4.8 billion records lost as a result of data breaches in 2016, with hacking responsible for about 60% of these.

CROWDSOURCED SOLUTION

A proven approach to security: don't deal with hacking attacks, prevent them instead. Since there is no product that doesn't have an attack vector, the question is: how can we minimize risks?

We connect business with a community of hackers from different parts of the globe. Our bug bounty platform allows you to get continuous information on the condition of security of your company and allows independent security researchers to report the discovered breaches in a legal way.

COMPANIES THAT HAVE ALREADY TRIED TOKENIZED BUG BOUNTY

Are you sure you are not under surveillance?

  • The security team at Kuna have been operating their public bug bounty program with HackenProof for over 12 months. They have worked with HackenProof to successfully engage the white hat hacker community, enabling them to create a secure crypto exchange.

    Roman Cherednik, CTO at KUNA:
    "Running a bug bounty program is an extra measure for us that improves our security by leveraging the community of white hackers."

    • reports

      12

    • vulnerabilities

      3

    • mode

      public bug bounty

  • VeChain is a leading global enterprise level public blockchain platform. It aims to connect blockchain technology to the real world by providing a comprehensive governance structure, a robust economic model, as well as advanced IoT integration, and pioneers in real-world applications.

    In order to help secure data of their customers, VeChain Foundation turned to HackenProof to run a Private Bug Bounty Program at first, and later switched to a Public Program.

    VeChain COO Kevin Feng: “VeChain values security as the first priority for a public blockchain platform made for enterprises adoption. And we chose the HackenProof platform to host a bug bounty to leverage the power of the community.”

    • reports

      12

    • vulnerabilities

      3

    • mode

      public bug bounty

  • Registered in Zug Switzerland, everiToken is world's first token-customized public chain aiming to be the best infrastructure to tokenize everything and for token economy.

    Built on everiToken blockchain, everiPay provides world's fastest, safest and commerically avaiable micropayments solutions.

    everiToken CTO Harry Wong: Hackenproof is such an important and necessary platform for everiToken blockchain. Security is our first priority, so I appreciate the significance of the cooperation with Hackenproof.

  • Interkassa is a payment processing system that operates with funds and requires a careful and rigorous approach to security.

    Previously Interkassa participated in a CTF game with elements of bug hunting at hacker`s conference HackIT.

    They had some doubts in a crowdsourced approach for their infrastructure’s security improvement that were vanished after choosing the right researchers and making a pre-launch of vulnerability rewarding program in a private mode.

    • reports

      19

    • vulnerabilities

      13

    • mode

      public bug bounty

  • OSA is an innovative project with AI and Big Data for automatic recognition, sorting and inventory of products at stores.

    Data breaches can cause massive damage to any company. This is especially true for companies operating with Big Data and holding a lot of sensitive information about vendors and companies.

    We launched a private bug bounty for OSA.

    • mode

      private bug bounty

  • NapoleonX is the first crypto asset manager project piloting trading bots.

    The vulnerability rewarding program was a magic wand which helped to deal with annoying blackmailers actively threatening and extorting payout in exchange for vulnerability disclosure.

    After some rapid crowd testing, we figured out that the project’s security was solid and the blackmailers had no choice but to retreat or move on to another target.

Meet most active researchers

Jack Cable

United States

Sandeep “Geekboy” Singh

India

Tanner “cache-money”

United States

Julian “subzero1993” Keller

Germany

Parth Malhotra

India

Shahmeer Amir

Pakistan

Yasser Ali

Egypt

Try crowdsourced security testing for free

Sign up for a free trial and see how crowdsourced testing can reinforce your security, no strings attached.

Start today