Bug Bounty as a Service

In a digital world, every company has a digital footprint.
Systems exposed to the internet can include web applications, webshops, web portals, as well as API interfaces to ERPs, time-tracking systems, and more. These systems offer attack surfaces and therefore represent a cyber risk.

A 100% protection against attackers is not possible. Reducing risk is therefore all the more important. To achieve this, companies often conduct one-time tests such as penetration tests or assessments. Such traditional security testing approaches are usually fragmented, often with the background of being “compliant” with a regulation or management requirement.

Bug bounty programs enable continuous and more comprehensive transparency. Ethical hackers deliberately attack exposed systems, look for vulnerabilities and configuration errors, and are rewarded for their findings.

The Problem

Resilience Shield

Bug bounty programs are not affordable for small companies

Bug bounty programs work by providing a reward through which hackers can be compensated. If the possible reward is too small, the program loses its attractiveness for ethical hackers.

Bug bounty programs require expertise and continuous orchestration. We dynamically manage the hackers’ search scopes and remove the affected scope from active testing as soon as a vulnerability is discovered, ensuring that reward funds are used efficiently and for their intended purpose.

Both the budget for compensating ethical hackers and the available resources are often limited in smaller companies. For this reason, isolutions developed the isolutions Resilience Shield.

The Solution

How Bug Bounty as a Service works

Together with Bug Bounty Switzerland, isolutions provides a Resilience Shield under which several companies are protected. The described compensation for ethical hackers as well as all handling with the hackers is ensured by Bug Bounty as a Service.

The global network of ethical hackers receives the customer’s root domain and becomes active.
Once a critical vulnerability is found, the customer is removed from the program to ensure that the available compensation is not completely depleted. The detected vulnerabilities are monitored by the isolutions Cyber Defense Center and communicated to the customer within an SLA, including actionable recommendations.

The following services are included in the offering

  • Continuous test coverage until a vulnerability is found (hacker activity throughout the entire contract period)

  • Reporting of discovered vulnerabilities within 48 hours by the Cyber Defense Center

  • Concrete remediation recommendations provided by the Cyber Defense Center

  • Guidance in deriving preventive measures from the identified vulnerability (billed separately)

  • Quarterly reports on hacker activity (number of activities and duration)

Benefits

Icon Increase

52% more vulnerabilities found compared to conventional scanners

scanners and tools are only as effective as they are configured and applied.

Icon Cost Reduction

Lower cost

for continuous test coverage or critical vulnerabilities compared to traditional security testing methods.

Cybersecurity

Continuous improvement of security maturity

If hackers do not find any vulnerabilities, you know your systems are securely configured. If hackers do find a vulnerability, it can be remediated quickly.

Download the full service description as PDF

Download PDF

Contact

Do not hesitate to contact me.

Markus Kaegi

Business Unit Lead - Cyber Security

markus.kaegi@isolutions.ch
Markus Kaegi

Successes & News

More about Cybersecurity