Avast CloudCare vs. HackerOne

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Avast CloudCare
Score 8.7 out of 10
N/A
Avast's CloudCare was a cloud-based security platform for IT professionals used to monitor threats and deliver layered security services to multiple offices, networks, and devices. The product is reaching EOL and is no longer sold. Avast now offers the Avast Business Hub in its place.N/A
HackerOne
Score 7.0 out of 10
N/A
HackerOne is a hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be exploited, from the company of the same name in San Francisco. The service is used for vulnerability location, pen testing, bug bounty, and vulnerability triage services.N/A
Pricing
Avast CloudCareHackerOne
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Avast CloudCareHackerOne
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional DetailsFor more information please email www.hackerone.com/contact or find us on the AWS Marketplace: https://aws.amazon.com/marketplace/seller-profile?id=10857e7c-011b-476d-b938-b587deba31cf
More Pricing Information
Best Alternatives
Avast CloudCareHackerOne
Small Businesses
NinjaOne
NinjaOne
Score 9.2 out of 10

No answers on this topic

Medium-sized Companies
NinjaOne
NinjaOne
Score 9.2 out of 10

No answers on this topic

Enterprises
Citrix Endpoint Management
Citrix Endpoint Management
Score 8.3 out of 10

No answers on this topic

All AlternativesView all alternativesView all alternatives
User Ratings
Avast CloudCareHackerOne
Likelihood to Recommend
5.5
(3 ratings)
7.0
(2 ratings)
Support Rating
8.0
(1 ratings)
-
(0 ratings)
User Testimonials
Avast CloudCareHackerOne
Likelihood to Recommend
Avast Software
Avast CloudCare is great when it comes to ease of installation and GUI. Working inside the web portal is pretty self-intuitive. Some of the issues revolve around computers coming up missing from the portal or from computer jumping sites.
Read full review
HackerOne
It is one of the good platforms for security researchers to submit bugs and other vulnerabilities, it however, has some challenges, in terms of un-verified and duplicate submissions.
Read full review
Pros
Avast Software
  • Virus alerts
  • webshield
  • backup services
  • threat protection
Read full review
HackerOne
  • Filter for spammy bug reports
  • Nice central interface
  • Payment/reward system is nice
Read full review
Cons
Avast Software
  • The base web portal as it is going away at the end of the year.
  • Tech help is very lacking.
  • Several times computers lost the AV and had to be reinstalled.
Read full review
HackerOne
  • A lot of duplicate bugs get reported, although it does offer automatic suggestion of previously reported bugs that may be duplicates, it is far from perfect.
  • Anyone can report bugs, a lot of them are not verified before submission. This sometimes leads to a lot of time spent in verifying if the bug is really actionable.
  • Each submission has to be treated with equal potential, a lot of time, some time gets invested in vulnerabilities that aren't as important as some others.
Read full review
Alternatives Considered
Avast Software
We used to use Norton AV exclusively for all our business and home users, but it got to where it was using a lot of system resources and would slow down some computers. We selected Avast cloud care since it was a lighter weight program and provided great results as far as protection.
Read full review
HackerOne
These were very close and we liked HackerOne better. For a time we did have both and we felt the need to consolidate the information into one platform and end of life our internal offering. Overall we've been fairly happy with HackerOne.
Read full review
Return on Investment
Avast Software
  • Avast CloudCare has stopped one of our customers for downloading a virus.
  • Reporting on immediate threats so we could deal with the issue before it infected the network.
  • Was alerted of an issue and was able to set a full scan on the entire network with one function.
Read full review
HackerOne
  • Bugs that can't be tracked internally are submitted by external researchers, which is an important factor for security vulnerabilities.
  • Even if the bugs reported are duplicates, there still is provision to award reputation points, that keep the researchers engaged.
  • It also requires a lot of verification and validation, as a lot of the submissions are unverified to begin with.
Read full review
ScreenShots