"Bugcrowd does a wonderful job weeding out the noise so we can get to the real issues."
“By adding the power of the talented researcher community to our Product Security program, we’ve learned a lot about how people outside the company think about our products, additional scenarios where products can be at risk and what else we could do to protect our products. We’ve used this information to put a sharper focus on the areas of greatest risk, which has been invaluable to us as we scale.”
"By working with Bugcrowd, we’ve been able to continuously improve our security metrics and maturity, ensuring we maintain customer trust in the Directly platform, which is vital for our reputation and continued growth."
"We now have greater peace of mind that our platforms and data are protected, which is invaluable to the business and our customers."
“We looked at several programs, but Bugcrowd offered the best services for validating submissions while avoiding spurious effort."
"Their testers dig deep in their testing. Not only will they take a URL and test it for many days, but they have also found what other systems have not identified. No system can be proven to have zero vulnerabilities, so continuous testing at this level of depth is great."
“The biggest benefit we see from Bugcrowd is the team’s ability to help in managing the bug bounty program so that once reports get to our security team, the are already deduped, validated and triaged. All our security team has to do is fix the bug. Bugcrowd has the best managed services.”
"Unlike a scheduled penetration test, time is not a factor. And given the number of researchers on the Bugcrowd platform this means eventually the majority of customer facing applications end up being discovered and further tested. This allows us to ‘even up’ the playing field between security testers and the technology teams."
"Softdocs’ partnership with Bugcrowd is a key strategy for securing the Etrieve product for our customers. In today’s threat landscape, focused, crowdsourced attention to our digital footprint is important to securing the integrity and privacy of their data."
“Our bug bounty plays a key role in our Product Security program. It has helped us to define and shape this program. We are getting access to a large talent pool who are incentivized to test, find and report security vulnerabilities on our platform. This is a win-win situation for everyone.”
“Intercom’s business relies on customer trust. To keep this trust we need to use the best tools available to keep our customers’ data secure. Our private bug bounty program with Bugcrowd allowed us to tap into the creativity and abilities of hundreds of security researchers to find and report the most complex bugs – the ones vulnerability scanners just can’t uncover. Now we’re expanding our program for access to a bigger pool of researchers to improve our ability to find and fix vulnerabilities.”
“If a company says it’s running a bug bounty program, then every security researcher and hacker already knows that the company has already done a lot of security work and has an entire security environment in place. A bug bounty program is one of the last measures in the chain, and it’s an indicator of how well a company manages its security.”
“I could have called anyone to get a clean bill of health, but that`s not our business. We called Bugcrowd because we wanted the most in-depth vetting of our security posture. It`s beyond compliance it`s about true risk reduction.”
“Our bug bounty program is a key part of our security strategy.”
"What is amazing about Bugcrowd — With all the security technology and process that we have in place at Motorola we always find bugs when product goes live. Bugcrowd has saved us close to $60 million, simply because we’ve avoided major data breaches in the eyes of our customers."