Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Astra Pentest Reviews & Ratings
    209 Ratings
    Company Website
  • Aikido Security Reviews & Ratings
    103 Ratings
    Company Website
  • Carbide Reviews & Ratings
    88 Ratings
    Company Website
  • Global App Testing Reviews & Ratings
    59 Ratings
    Company Website
  • Testeum Reviews & Ratings
    8 Ratings
    Company Website
  • NINJIO Reviews & Ratings
    391 Ratings
    Company Website
  • Chainguard Reviews & Ratings
    42 Ratings
    Company Website
  • ManageEngine Endpoint Central Reviews & Ratings
    2,336 Ratings
    Company Website
  • Eurekos Reviews & Ratings
    73 Ratings
    Company Website
  • Action1 Reviews & Ratings
    634 Ratings
    Company Website

What is YesWeHack?

YesWeHack is a prominent platform for Bug Bounty and Vulnerability Management, catering to clients such as ZTE, Tencent, Swiss Post, Orange France, and the French Ministry of Armed Forces. Established in 2015, YesWeHack serves as a bridge between organizations across the globe and a vast community of ethical hackers, all dedicated to identifying vulnerabilities in various digital assets, including websites and mobile applications. The offerings from YesWeHack encompass Bug Bounty programs, Vulnerability Disclosure Policies (VDP), Pentest Management, and Attack Surface Management, providing comprehensive security solutions. This innovative platform not only enhances cybersecurity but also fosters collaboration between organizations and the ethical hacking community.

What is Detectify?

Detectify leads the way in External Attack Surface Management (EASM) by offering vulnerability assessments with an impressive accuracy of 99.7%. Security teams in both ProdSec and AppSec rely on Detectify to reveal the precise methods attackers might use to compromise their Internet-facing applications. Our scanning technology is enhanced by insights from over 400 ethical hackers. The information they provide significantly exceeds what is found in traditional CVE libraries, which often fall short in evaluating contemporary application security. By leveraging this extensive knowledge, Detectify ensures a more comprehensive approach to identifying vulnerabilities that could be exploited by potential threats.

Media

Media

Integrations Supported

Jira
Akitra Andromeda
Blink
GitHub
GitLab
Jenkins
JupiterOne
Opsgenie
Phoenix Security
Slack
Splunk Enterprise
Trello
Tromzo
Workato

Integrations Supported

Jira
Akitra Andromeda
Blink
GitHub
GitLab
Jenkins
JupiterOne
Opsgenie
Phoenix Security
Slack
Splunk Enterprise
Trello
Tromzo
Workato

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

$89 per month
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

YesWeHack

Date Founded

2015

Company Location

France, Switzerland, Singapore and more than over 40 countries

Company Website

www.yeswehack.com

Company Facts

Organization Name

Detectify

Date Founded

2013

Company Location

Sweden

Company Website

detectify.com

Categories and Features

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Categories and Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Popular Alternatives

Popular Alternatives

Astra Pentest Reviews & Ratings

Astra Pentest

Astra Security
Acunetix Reviews & Ratings

Acunetix

Invicti Security