Data Sheets
Learn about the architecture and capabilities of HackerOne products and services.
-
HackerOne Product Offerings Overview
-
HackerOne Response
-
HackerOne Bounty Overview
-
HackerOne Pentest Overview
-
HackerOne Challenge Overview
-
Working with Vetted, Trusted Hackers
A one-page overview of how HackerOne provides several layers of control when it comes to hackers testing your applications.
-
VDP and Crowdsourced Security for State Local and Governments
As traditional penetration testing methods become insufficient, State and Local Departments and Agencies must rethink their approach.
-
Vulnerability Disclosure Policy and Crowdsourced Security for the Federal Governments White Paper
One-pager on crowdsourced security for the federal government.
-
Scale your Security With Hacker-Powered DevSecOps
One-pager that shows how bug bounties fit into a DevSecOps workflow.
-
On-demand Penetration Testing For The Modern World
Nice side-by-side matrix comparing traditional pen tests and hacker-powered pen tests.
-
HackerOne Clear VPN Technical FAQ
One-pager on FAQs regarding HackerOne Clear VPN.
-
HackerOne Clear VPN Brief
One-pager on HackerOne Clear and how HackerOne Clear VPN delivers increased visibility into and control over your HackerOne Bounty and Challenge programs.
-
HackerOne Private and Public bounty Program Brief
One-pager on how to determine whether a Private or Public program will best fit your objectives.
-
HackerOne Managed Services Brief
Introduction to HackerOne's Managed Services and how they improve and scale security capabilities. PDF
-
HackerOne Integrations and API Brief
One-pager on how HackerOne fits seamlessly into the workflows your security, software development, and DevOps teams use every day to help you build more secure applications faster. PDF
-
Attract Hackers and Budget Predictably with HackerOne Bounty Tables
One-pager on Bounty Tables to help align customer program’s monetary incentives with their objectives. PDF
-
European Roots, Unlimited Reach: How HackerOne's Global Community Protects Applications and Users
One-pager highlighting the power of a global community.
-
Are You Using the 3-Pillars of AWS Security
96 percent of decision makers have cloud initiatives underway. One-pager highlighting the simple steps to a more secure AWS environment. PDF
-
5 Critical Elements VDP Guide
One-pager providing advice for creating a vulnerability disclosure program
-
Loading More...