
Program Features
|
![]() Enterprise Program
|
![]() Private Managed Program
|
![]() Public Programs
|
Vulnerability Management | |||
Security page |
|
|
|
ISO 2914 Compliance |
|
|
|
Bounty Management | |||
Bounty Guidance |
|
|
|
Bounty Processing |
|
|
|
Researcher Engagement |
|
|
|
Managed bounty services |
|
|
|
Program management | |||
Hacker Reputation |
|
|
|
Hacker messaging |
|
|
|
Hacker invitation |
|
||
Triage Services |
|
||
Mediation Services | Limited | Unlimited |
Programs has been designed for enterprises based on their level of security maturity. Early adopters are recommended to start with enterprise program. It is designed for enterprises who want to conduct penetration testing at fixed intervals. Security matured enterprises are recommended with private managed program.
Safehats team will manage the entire program so that they could focus on bug fixing. Once the enterprise is confident of his security posture and want to expose its application to public to receive vulnerability reports that is difficult to exploit.
Security is a continuous effort. With Safehats program, you can run continuous security testing of your applications. With pay per bug (PPB) model approach, it is extremely cost effective solution compared to traditional penetration testing.
We will provide you guidance in setting the bounty amount and bounty budget. It is advisable to allocate budget for minimum six months to one year to see significant benefits and returns on your investment.
Yes it is possible to hold or disable program after the program runs for few months on case to case basis.