Overview
ProductRatingMost Used ByProduct SummaryStarting Price
HackerOne
Score 9.0 out of 10
N/A
HackerOne is a hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be exploited, from the company of the same name in San Francisco. The service is used for vulnerability location, pen testing, bug bounty, and vulnerability triage services.N/A
Intigriti
Score 7.5 out of 10
N/A
Intigriti is an ethical hacking and bug bounty platform oprating primarily in the European Union, allowing users to carry out research and conduct security evaluations.N/A
YesWeHack
Score 0.0 out of 10
N/A
YesWeHack is an Offensive Security and Exposure Management platform. It provides a suite of integrated, API-based solutions designed to secure organisations’ growing attack surfaces. The YesWeHack platform comprises: - Bug Bounty: Crowdsourced vulnerability discovery leveraging a global community of 135,000+ skilled ethical hackers through a platform-driven model. - Autonomous Pentest: Comprehensive asset discovery combined with ongoing exposure validation to…N/A
Pricing
HackerOneIntigritiYesWeHack
Editions & Modules
No answers on this topic
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
HackerOneIntigritiYesWeHack
Free Trial
NoNoNo
Free/Freemium Version
NoNoNo
Premium Consulting/Integration Services
NoNoYes
Entry-level Setup FeeNo setup feeOptionalNo setup fee
Additional DetailsFor more information please email www.hackerone.com/contact or find us on the AWS Marketplace: https://aws.amazon.com/marketplace/seller-profile?id=10857e7c-011b-476d-b938-b587deba31cf
More Pricing Information
Community Pulse
HackerOneIntigritiYesWeHack
User Ratings
HackerOneIntigritiYesWeHack
Likelihood to Recommend
7.0
(2 ratings)
-
(0 ratings)
-
(0 ratings)
User Testimonials
HackerOneIntigritiYesWeHack
Likelihood to Recommend
HackerOne
It is one of the good platforms for security researchers to submit bugs and other vulnerabilities, it however, has some challenges, in terms of un-verified and duplicate submissions.
Read full review
Intigriti
No answers on this topic
YesWeHack
No answers on this topic
Pros
HackerOne
  • Filter for spammy bug reports
  • Nice central interface
  • Payment/reward system is nice
Read full review
Intigriti
No answers on this topic
YesWeHack
No answers on this topic
Cons
HackerOne
  • A lot of duplicate bugs get reported, although it does offer automatic suggestion of previously reported bugs that may be duplicates, it is far from perfect.
  • Anyone can report bugs, a lot of them are not verified before submission. This sometimes leads to a lot of time spent in verifying if the bug is really actionable.
  • Each submission has to be treated with equal potential, a lot of time, some time gets invested in vulnerabilities that aren't as important as some others.
Read full review
Intigriti
No answers on this topic
YesWeHack
No answers on this topic
Alternatives Considered
HackerOne
These were very close and we liked HackerOne better. For a time we did have both and we felt the need to consolidate the information into one platform and end of life our internal offering. Overall we've been fairly happy with HackerOne.
Read full review
Intigriti
No answers on this topic
YesWeHack
No answers on this topic
Return on Investment
HackerOne
  • Bugs that can't be tracked internally are submitted by external researchers, which is an important factor for security vulnerabilities.
  • Even if the bugs reported are duplicates, there still is provision to award reputation points, that keep the researchers engaged.
  • It also requires a lot of verification and validation, as a lot of the submissions are unverified to begin with.
Read full review
Intigriti
No answers on this topic
YesWeHack
No answers on this topic
ScreenShots

YesWeHack Screenshots

Screenshot of a few public programs. These give the entire hunter community access to an organization's program to benefit from their diverse skills. YesWeHack Hunters can access all public programs of the platform.Screenshot of the Report Lifecycle dashboard, used to track key operational metrics and benchmark data against industries, other programs, country averages, or even the overall platform average - to improve an organization's security posture.Screenshot of the Business Unit Manager dashboard, used to track the performance of programs with a of display real-time metrics.Screenshot of a Bug Timeline dashboad, used to analyze the timeline to understand trends in reported bugs over time, grouped by severity level.Screenshot of a leaderboard. Here, organizations can earn ranking points by submitting vulnerability reports, based on the severity of the issue and the applicable reward grid.