52 Bugcrowd Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • "What is amazing about Bugcrowd — With all the security technology and process that we have in place at Motorola we always find bugs when product goes live. Bugcrowd has saved us close to $60 million, simply because we’ve avoided major data breaches in the eyes of our customers."

  • “Security is the foundation on which users trust Schoology. We are committed to users privacy and it is important that we continue to be a platform that users trust. We partnered with Bugcrowd to make our security program stronger, harnessing the breadth and depth of skilled security testers matched with an incredibly powerful platform and team.”

  • “It’s a win-win situation—either the Crowd finds something we didn’t see, in which case we can fix it. Or they don’t find anything, which validates our efforts.”

  • "Bugcrowd provides a variety of resources to look at our site and have many different eyes looking at our security and vulnerabilities."

  • “Intercom’s business relies on customer trust. To keep this trust we need to use the best tools available to keep our customers’ data secure. Our private bug bounty program with Bugcrowd allowed us to tap into the creativity and abilities of hundreds of security researchers to find and report the most complex bugs – the ones vulnerability scanners just can’t uncover. Now we’re expanding our program for access to a bigger pool of researchers to improve our ability to find and fix vulnerabilities.”

  • “The cybersecurity landscape is an ever evolving one, so we knew we had to do something different, something innovative with this year’s audit, and that is what Bugcrowd offered us.”

  • “We’re dealing with customers who trust us with the security of their applications, assets, and user data. We need to demonstrate how we’re protecting their data, so for us, being a step ahead of that is very important. That’s why a service like Bugcrowd is perfect for us.”

  • "For us, the managed approach reduced required time and effort by at least 80% - freeing up our security team to focus on implementing remediations and other important components of our security program."

  • “It’s a no brainer. You’re getting a much larger pool of people with different back grounds. Whether they’re cloud or mobile or firmware and they’re looking at the product. You get a much better sense of the quality and security of the device rather than going to one or two people.”

  • "We have products that cover a wide variety of applications that utilize various technologies, so we need security testing that can cover all those areas. Bugcrowd’s Ongoing Private Bug Bounty is the best way to get the coverage. Of course, this entire line of thinking starts with the premise that we think product security is of the utmost importance – we want to find the problems before someone else does so that we can help keep our customers secure."

  • “The biggest benefit we see from Bugcrowd is the team’s ability to help in managing the bug bounty program so that once reports get to our security team, the are already deduped, validated and triaged. All our security team has to do is fix the bug. Bugcrowd has the best managed services.”

  • "Bugcrowd allows us to focus on our core business, knowing that our systems are in safe hands."

  • “We think of the bug bounty program as ‘part of this complete breakfast’. You have all these internal activities, and the Bugcrowd program for us is a nice supplement to those things–it catches bugs that our internal testing didn’t catch. It also gives us information in what it doesn’t report.”

  • “At Okta, we’re squarely focused on customer success. For my security team, that translates directly to customer security and assurance. Our private bug bounty program with Bugcrowd expanded coverage of my internal attack team by adding a solid bench of diversity and breadth of capabilities.”

  • "Their testers dig deep in their testing. Not only will they take a URL and test it for many days, but they have also found what other systems have not identified. No system can be proven to have zero vulnerabilities, so continuous testing at this level of depth is great."