FAQ For Business

D
25 articles in this collection
Written by Dmytro
General

How the connection HackenProof -> Discord works

Get notifications about new reports, report status, and report severity changes
D
Written by Dmytro
Updated over a week ago

How connection HackenProof -> Telegram works

Get notifications about new reports, report status, and report severity changes
D
Written by Dmytro
Updated over a week ago

How works the connection HackenProof -> Jira

D
Written by Dmytro
Updated over a week ago

Company users and their roles

D
Written by Dmytro
Updated over a week ago

VDP iFrame for Bug Bounty program

Vulnerability Disclosure Page (VDP) for your website
D
Written by Dmytro
Updated over a week ago

Manage your bug bounty program

This guide describes all the possible stages of your bug bounty program
D
Written by Dmytro
Updated over a week ago

What is a Bug Bounty?

D
Written by Dmytro
Updated over a week ago

How do bug bounties fit with traditional security assessment methods?

Why is a crowdsourced approach to security important
D
Written by Dmytro
Updated over a week ago

What types of bug bounty programs can be launched for my product?

We explain the 3 main types of bug bounty programs. They are next.
D
Written by Dmytro
Updated over a week ago

What’s the difference between public and private programs?

D
Written by Dmytro
Updated over a week ago

How does it work?

The general workflow of a bug bounty program
D
Written by Dmytro
Updated over a week ago

Who performs the testing?

D
Written by Dmytro
Updated over a week ago

What conditions are required to qualify for a bounty reward?

D
Written by Dmytro
Updated over a week ago