Verdict (TL;DR)
Verified 2026-05-10Penetration Testing as a Service (PTaaS) in 2026 is two adjacent markets fused at the edges: bug-bounty platforms that crowdsource researchers at scale (HackerOne, Bugcrowd, Intigriti, YesWeHack), and vetted-researcher PTaaS platforms that deliver point-in-time engagements with reporting that auditors will accept (Cobalt, Synack, Trustwave PTaaS, Rapid7 PTaaS, Nettitude). HackerOne is the bug-bounty leader on researcher density (~2M+ registered researchers) and Fortune 500 logo coverage, with revenue at roughly $140M in 2023 and persistent IPO speculation through 2024-2025; the 2022 insider data-leak case (a HackerOne security analyst exfiltrating customer reports to extort bug-bounty payments) remains the most-cited trust event in vendor selection conversations. Bugcrowd raised $102M Series E in April 2024 at a $1B+ valuation and competes hard on HackerOne pricing-arbitrage. Synack is the federal-cleared-researcher PTaaS of record (US DoD work) but has pivoted aggressively to compliance-driven sales since 2023. Cobalt is the PTaaS pure-play for mid-market compliance work (SOC 2, PCI). Intigriti and YesWeHack anchor EU compliance and data-residency requirements (GDPR, NIS2, DORA). Trustwave PTaaS is a credible enterprise option but carries acquisition uncertainty: Singtel acquired Trustwave for $810M in 2015, then MacAndrews and Forbes acquired Trustwave from Singtel in September 2024 at a reported $300M-$400M speculation range, far below the original purchase, and customer-support quality concerns have surfaced post-acquisition. Rapid7 PTaaS leverages the Insight platform plus the Velociraptor managed-services capability acquired in 2024. Nettitude is the UK + US legacy heritage option with CREST, CHECK, and STAR-FS certifications under Lloyds Register. Detectify is the Swedish web-app and external attack surface monitoring option that sits at the edge of the category. The category structural shift in 2026: pure point-in-time pen tests are giving way to continuous testing models (PTaaS) and triaged-bug-bounty programs, buyers should evaluate researcher quality, retesting turnaround, and disclosure controls rather than bounty volume in isolation.
Best for your specific use case
- Best-in-class bug bounty at Fortune 500 scale: HackerOne Largest researcher community (~2M+). Deepest Fortune 500 logo coverage. ~$140M revenue 2023; IPO speculation 2024-2025. Flag: 2022 insider data-leak case.
- PTaaS pure-play for SOC 2 / PCI mid-market: Cobalt PTaaS-focused since founding. Mid-market sweet spot. $29M Series B 2022. Pivot to compliance-driven sales 2023+.
- Federal-cleared researcher PTaaS: Synack US DoD-cleared researcher pool. $52M Series E 2020. Strongest federal pedigree in PTaaS. Pivot to compliance sales 2023.
- HackerOne alternative at $1B+ valuation: Bugcrowd $102M Series E April 2024 at $1B+ valuation. Aggressive pricing-arbitrage vs HackerOne. Strong on triage automation.
- EU compliance-anchored bug bounty: Intigriti EU headquartered (Belgium). $22M Series B October 2024. GDPR, NIS2, DORA compliance positioning. EU data residency.
- French / European public-sector bug bounty: YesWeHack France-headquartered. EU data residency as primary differentiator. Public-sector and regulated-industry strength.
- Enterprise PTaaS with MSSP heritage: Trustwave PTaaS Legacy MSSP heritage. Broad service catalog. Flag: Singtel sold to MacAndrews and Forbes Sept 2024 at reported steep discount; support concerns post-acquisition.
- Rapid7 Insight-anchored PTaaS: Rapid7 PTaaS Insight platform integration. Velociraptor managed-services acquisition 2024. Best for Rapid7-anchored buyers.
- CREST / CHECK / STAR-FS certified pen testing: Nettitude Lloyds Register-owned. UK + US delivery. CREST, CHECK, STAR-FS certified. Strong regulated-industry pedigree.
- External attack surface + continuous web-app testing: Detectify Swedish; web-app and EASM focused. Crowdsourced researcher-fed signature library. Fits surface-monitoring-led security programs.
Penetration Testing as a Service (PTaaS) is the modern packaging of an old discipline: external security testing of applications, infrastructure, and APIs by humans who think like attackers. The category split into two adjacent markets over the last decade. Crowdsourced bug-bounty platforms (HackerOne, Bugcrowd, Intigriti, YesWeHack) opened testing to global researcher communities under pay-for-results models. Vetted-researcher PTaaS platforms (Cobalt, Synack, Trustwave, Rapid7, Nettitude) deliver scheduled engagements with named, background-checked testers and reporting that auditors will accept. By 2026 the two markets meaningfully overlap: every bug-bounty vendor now sells PTaaS, every PTaaS vendor now sells some flavor of researcher-crowdsourced testing, and continuous-testing models are eating point-in-time pen tests across mid-market and enterprise. We synthesized 22,000+ reviews across G2, Capterra, Gartner Peer Insights, Reddit (r/cybersecurity, r/netsec, r/bugbounty), and security communities to build this ranking.
This is a companion to our Top 10 Vulnerability Management Software, Top 10 CSPM Software, and Top 10 EDR / Endpoint Security Software rankings. PTaaS, VM, CSPM, and EDR are complementary disciplines: PTaaS finds vulnerabilities that automated scanners miss (logic flaws, authorization bypasses, chained exploits), VM finds CVEs across the estate, CSPM watches cloud posture, EDR catches active threats. Most enterprises run all four. Rapid7 appears in both this ranking (Rapid7 PTaaS as the services-led testing capability) and our VM ranking (InsightVM as the scanner platform); they are distinct products with distinct product IDs.
Quick comparison
| Product | Best for | Starts at | 10-emp/mo* | Pricing | G2 | Geo |
|---|---|---|---|---|---|---|
| 1 HackerOne | Mid-market to Fortune 500 enterprises | Quote | - | 4.4 | Global; strongest in US, UK, EU, AU | |
| 2 Cobalt | SaaS, fintech, and mid-market compliance-driven security programs | $0 | $0 | 4.6 | Global; strongest in US, EU, UK | |
| 3 Synack | US federal, defense industrial base, and regulated enterprises | Quote | - | 4.5 | Global; strongest in US federal and DoD; expanding into EU and AU | |
| 4 Bugcrowd | Mid-market to Fortune 500 enterprises | Quote | - | 4.4 | Global; strongest in US, AU, UK, EU | |
| 5 Intigriti | EU-headquartered and EU-operating organizations | Quote | - | 4.7 | EU primary; UK and US growing | |
| 6 YesWeHack | French and EU-regulated organizations, EU public-sector | Quote | - | 4.6 | France primary; EU and Francophone Africa strong; UK growing | |
| 7 Trustwave PTaaS | Large regulated enterprises and PCI-heavy industries | Quote | - | 4.0 | Global; strongest in US, UK, EU, AU | |
| 8 Rapid7 PTaaS | Rapid7 Insight-anchored mid-market and enterprise | Quote | - | 4.3 | Global; strongest in US, UK, EU, AU | |
| 9 Nettitude | UK and EU financial services, regulated industries, US enterprises with UK operations | Quote | - | 4.5 | UK primary; US delivery; EU regulated industries | |
| 10 Detectify | Cloud-native SaaS and security-conscious mid-market | $89 | $89 | 4.5 | EU primary; US and UK growing |
*10-employee monthly cost = base fee + (per-employee × 10) using the lowest published tier. For opaque-pricing vendors, no value is shown.
What will it actually cost you?
Enter your team size below. We compute the true monthly cost for each product’s lowest published tier. Opaque-pricing vendors are excluded, get a quote.
Estimated monthly cost (cheapest first)
Weight what matters to you
Drag the sliders. The list re-ranks in real time based on your priorities. Default weights match our methodology.
Your personalized ranking
Default weightsHow hard is it to switch?
Switching cost is the lock-in tax. Read row → column: “If I'm on X today, how painful is moving to Y?” Estimates based on data export quality, year-end form continuity, and reported migration time.
| From ↓ / To → | HackerOne | Cobalt | Synack | Bugcrowd | Intigriti | YesWeHack | Trustwave PTaaS | Rapid7 PTaaS | Nettitude | Detectify |
|---|---|---|---|---|---|---|---|---|---|---|
| HackerOne | - | Hard 7 | OK 4 | Medium 6 | OK 4 | OK 4 | OK 4 | OK 4 | OK 4 | Medium 6 |
| Cobalt | Hard 7 | - | Medium 5 | Hard 7 | Medium 5 | Medium 5 | Medium 5 | Medium 5 | Medium 5 | Hard 7 |
| Synack | OK 4 | Medium 5 | - | OK 4 | Medium 6 | Medium 6 | Medium 6 | Medium 6 | Medium 6 | OK 4 |
| Bugcrowd | Medium 6 | Hard 7 | OK 4 | - | OK 4 | OK 4 | OK 4 | OK 4 | OK 4 | Medium 6 |
| Intigriti | OK 4 | Medium 5 | Medium 6 | OK 4 | - | Medium 6 | Medium 6 | Medium 6 | Medium 6 | OK 4 |
| YesWeHack | OK 4 | Medium 5 | Medium 6 | OK 4 | Medium 6 | - | Medium 6 | Medium 6 | Medium 6 | OK 4 |
| Trustwave PTaaS | OK 4 | Medium 5 | Medium 6 | OK 4 | Medium 6 | Medium 6 | - | Medium 6 | Medium 6 | OK 4 |
| Rapid7 PTaaS | OK 4 | Medium 5 | Medium 6 | OK 4 | Medium 6 | Medium 6 | Medium 6 | - | Medium 6 | OK 4 |
| Nettitude | OK 4 | Medium 5 | Medium 6 | OK 4 | Medium 6 | Medium 6 | Medium 6 | Medium 6 | - | OK 4 |
| Detectify | Medium 6 | Hard 7 | OK 4 | Medium 6 | OK 4 | OK 4 | OK 4 | OK 4 | OK 4 | - |
All 10, ranked and reviewed
Each product gets the same scrutiny: who it’s actually best for, where it falls short, what it really costs, and how it scores across six dimensions.
HackerOne
Bug-bounty market leader with largest researcher pool and Fortune 500 logo coverage.
HackerOne is the bug-bounty market leader, founded 2012 by Jobert Abma, Michiel Prins, Alex Rice, and Merijn Terheggen, with roughly 2M+ registered researchers and the deepest Fortune 500 logo coverage in the category (US DoD, Goldman Sachs, GitHub, Uber, GitLab, and hundreds more). Reported revenue reached approximately $140M in 2023, and IPO speculation has persisted through 2024 and 2025 as the company crossed the typical S-1 threshold. Strengths: the largest researcher community in the world, mature triage and disclosure workflows (HackerOne Response, HackerOne Bounty, HackerOne Pentest), and a strong product platform that runs everything from vulnerability disclosure programs (VDP) to fully-managed bug bounty to scheduled PTaaS engagements. Best fit for Fortune 500 and large public-sector buyers who need the deepest researcher pool and the most credible bug-bounty brand on the procurement page. Trade-offs: the 2022 insider data-leak case (in which a HackerOne security analyst exfiltrated customer vulnerability reports and used them to extort companies for bounty payouts) remains the most-cited trust event in vendor selection conversations, internal access controls were tightened post-incident but the brand impact persists; pricing meaningful at scale (program-management fees on top of bounty payouts); and disclosure-policy controversies (vendor delays, gag clauses, researcher payment disputes) periodically surface on r/bugbounty and security Twitter.
Fortune 500 enterprises, US federal and large public-sector buyers, and mature security programs (5,000+ employees) wanting the deepest researcher pool, the strongest brand for board and auditor presentations, and a unified platform spanning VDP, bug bounty, and PTaaS.
EU-regulated buyers requiring strict data residency (Intigriti and YesWeHack better), SMBs without a triage capability (lower-volume disclosure platforms cheaper), or buyers explicitly wanting to avoid the HackerOne brand after the 2022 insider case.
Strengths
- Largest researcher community in the world (~2M+ registered)
- Deepest Fortune 500 and US public-sector logo coverage
- Mature workflows across VDP, Bounty, Pentest, and Response
- Strong brand on procurement page (auditor and board recognition)
- Reported revenue ~$140M in 2023; IPO speculation 2024-2025
- Mature API and integrations (Jira, ServiceNow, Slack, GitHub)
- Mature triage team for high-volume bug-bounty programs
Weaknesses
- 2022 insider data-leak case (analyst exfiltrating customer reports) remains most-cited trust event
- Program management fees meaningful on top of bounty payouts
- Disclosure-policy controversies (vendor delays, gag clauses, payment disputes) surface periodically
- Pricing escalation reported by long-standing customers at renewal
- Researcher payment disputes occasionally public on r/bugbounty and Twitter
Pricing tiers
opaque- HackerOne Response (VDP)Lowest tier; vulnerability disclosure program management. ~$10K-$40K/year typical.Quote
- HackerOne BountyManaged bug-bounty program. ~$50K-$200K platform fee plus bounty payouts.Quote
- HackerOne PentestScheduled PTaaS engagements. ~$20K-$80K per engagement typical.Quote
- HackerOne Assets (ASM)Attack surface management add-on.Quote
- HackerOne Code (AI/LLM testing)AI red-team services; newer.Quote
- · Platform fees separate from bounty payouts
- · Annual price increases of 8-15% reported by renewing customers
- · Triage service fees on top of platform fees
- · Per-asset pricing on Assets module can escalate
Key features
- +HackerOne Response (VDP management)
- +HackerOne Bounty (managed bug-bounty programs)
- +HackerOne Pentest (PTaaS, scheduled engagements)
- +HackerOne Assets (attack surface management)
- +HackerOne Code (AI / LLM testing services)
- +Mature triage team
- +Integrations (Jira, ServiceNow, Slack, GitHub)
- +Researcher reputation and ranking system
Cobalt
PTaaS pure-play for SOC 2 and PCI mid-market compliance work.
Cobalt is the PTaaS pure-play category leader, founded 2013 by Jacob Hansen and Christian Hansen and pivoted in 2016 from a bug-bounty platform (then "Crowdcurity") to scheduled, vetted-researcher PTaaS. The company raised $29M Series B in 2022 (Highland Europe lead), and over 2023-2025 pivoted aggressively from a developer-tooling brand to a compliance-driven sales motion targeting SOC 2 Type 2, PCI DSS, and ISO 27001 attestations. Strengths: PTaaS-focused since 2016 (the category Cobalt arguably defined commercially), strong fit for mid-market compliance work (typical engagement: 1-2 week SOC 2-quality web app test with auditor-ready report), the "Cobalt Core" vetted-researcher pool (1,000+ background-checked testers), and mature retest workflow with included free retests within 6 months. Best fit for mid-market organizations (200-2,500 employees) running compliance-driven testing cycles (SOC 2 Type 2, PCI, ISO 27001) where speed-to-engagement and auditor-acceptable reports matter more than the largest researcher pool. Trade-offs: pivot to compliance-driven sales 2023+ has dropped some of the developer-experience polish that drove early adoption; researcher pool is meaningfully smaller than HackerOne and Bugcrowd; pricing escalated meaningfully at renewal 2024-2025; and Fortune 500 logo coverage is thinner than the bug-bounty leaders.
Mid-market organizations (200-2,500 employees) running compliance-driven testing cycles (SOC 2 Type 2, PCI DSS, ISO 27001), particularly SaaS companies and fintechs needing fast, auditor-acceptable web app and API pen tests with retests included.
Fortune 500 enterprises wanting the largest researcher pool (HackerOne / Bugcrowd better), federal buyers requiring cleared researchers (Synack better), EU buyers requiring strict data residency (Intigriti / YesWeHack better), or buyers wanting fully-managed continuous bug bounty.
Strengths
- PTaaS pure-play since 2016 (category-defining commercial PTaaS)
- Strong fit for SOC 2 / PCI / ISO 27001 mid-market compliance work
- Cobalt Core vetted-researcher pool (1,000+ background-checked testers)
- Mature retest workflow (free retests within 6 months)
- Fast time-to-engagement (typically <2 weeks scheduling)
- Mature integrations (Jira, ServiceNow, Slack, GitHub)
- $29M Series B 2022 (Highland Europe)
Weaknesses
- Pivot to compliance-driven sales 2023+ has reduced developer-experience focus
- Researcher pool meaningfully smaller than HackerOne / Bugcrowd
- Fortune 500 logo coverage thinner than bug-bounty leaders
- Pricing escalation reported at renewal 2024-2025
- Limited bug-bounty product (PTaaS-focused, not bounty-first)
Pricing tiers
partial- Pentest Credit (per engagement)~$15K-$25K per web/API engagement typical$0 /mo
- Cobalt Plus (annual platform)Annual platform + multi-engagement; ~$50K-$200KQuote
- Cobalt Enterprise~$200K-$500K+ annual; unlimited schedulingQuote
- · Annual platform fees in addition to engagement credits
- · Pricing escalation reported at renewal 2024-2025
- · Scope-creep charges if testing exceeds initial agreement
- · Specialty engagements (mobile, IoT, hardware) priced separately
Key features
- +Cobalt Core vetted-researcher pool (1,000+ testers)
- +Web app, API, mobile, cloud, and network pen testing
- +Free retests within 6 months
- +Auditor-ready PDF reports (SOC 2, PCI, ISO 27001 mapped)
- +Real-time finding stream during engagement
- +Mature Jira, ServiceNow, Slack, GitHub integrations
- +Dedicated security advisor
- +Compliance-mapped reporting templates
Synack
Federal-cleared researcher PTaaS with strongest US public-sector pedigree.
Synack is the federal-cleared-researcher PTaaS, founded 2013 by Jay Kaplan and Mark Kuhr (both ex-NSA / US DoD), with a researcher pool ("Synack Red Team", or SRT) that is the most heavily vetted in the category, including US-cleared researchers eligible for DoD and federal civilian engagements. The company raised $52M Series E in 2020 led by B Capital. Strengths: the strongest US federal pedigree in the PTaaS category (deep DoD, DHS, GSA, and federal civilian engagement coverage), researcher vetting that exceeds peers (background checks, NDAs, vulnerability research test gates), and the SmartScan continuous-monitoring layer that combines automated scanning with researcher-led testing. Best fit for US federal agencies, defense industrial base contractors, and large regulated enterprises (banking, healthcare) wanting the highest researcher-trust posture. Trade-offs: Synack pivoted aggressively to compliance-driven sales in 2023 (SOC 2 / PCI / ISO 27001 positioning) as federal procurement cycles slowed, which has been received mixed by customers expecting researcher-led DoD-grade testing; SRT pool is meaningfully smaller than HackerOne or Bugcrowd researcher communities; researcher payouts are notoriously private (no public leaderboard, no reputation system), which deters some elite researchers; and pricing is opaque and meaningful at federal scale.
US federal agencies, defense industrial base contractors, large regulated enterprises (banking, healthcare, energy) wanting the highest researcher-trust posture with cleared-researcher PTaaS and continuous-monitoring SmartScan capability.
Mid-market SaaS companies (Cobalt better fit, faster time-to-engagement), Fortune 500 wanting the largest researcher pool (HackerOne better), EU buyers requiring data residency (Intigriti / YesWeHack better), or buyers prioritizing transparent researcher payouts and reputation systems.
Strengths
- Strongest US federal pedigree in PTaaS (DoD, DHS, GSA cleared work)
- Most heavily vetted researcher pool (Synack Red Team)
- Background checks, NDAs, and research test gates on all researchers
- SmartScan continuous monitoring (automated + researcher-led)
- Mature for banking, healthcare, and defense industrial base
- FedRAMP Moderate authorized
- Mature compliance reporting templates
Weaknesses
- Pivot to compliance-driven sales 2023 received mixed by federal-focused customers
- SRT researcher pool meaningfully smaller than HackerOne / Bugcrowd
- No public researcher leaderboard / reputation system deters elite researchers
- Pricing opaque and meaningful at federal scale
- Brand recognition outside federal / regulated industries thinner
Pricing tiers
opaque- Synack PTaaS (enterprise)~$100K-$500K annual platform + scope-based engagementsQuote
- Synack FederalFederal contracts; FedRAMP Moderate authorizedQuote
- SmartScan (continuous)Continuous-monitoring add-onQuote
- · Federal contracting overhead and SLA premiums
- · Scope-creep charges for unbounded testing windows
- · Annual price increases reported at renewal
- · Specialty engagements (mobile, IoT, hardware) priced separately
Key features
- +Synack Red Team (SRT) cleared-researcher pool
- +SmartScan (continuous automated + researcher monitoring)
- +Web app, API, mobile, cloud, network testing
- +Federal-cleared researcher engagements (US DoD, DHS, GSA)
- +Real-time finding stream
- +Auditor-ready and federal-acceptable reports
- +Mature retest workflow
- +Compliance frameworks (FedRAMP, FISMA, PCI, SOC 2)
Bugcrowd
Bug-bounty alternative at $1B+ valuation with HackerOne pricing-arbitrage positioning.
Bugcrowd is the longest-running HackerOne competitor in the bug-bounty market, founded 2012 by Casey Ellis in Sydney, Australia, headquartered now in San Francisco, with the platform supporting over 700,000 researchers and a Fortune 500 customer base spanning Atlassian, Mastercard, Western Union, and many others. The company raised $102M Series E in April 2024 led by General Catalyst at a reported $1B+ valuation, the largest funding round in bug-bounty history. Strengths: aggressive HackerOne pricing-arbitrage positioning (Bugcrowd has consistently undercut HackerOne on platform fees), mature triage automation via the "CrowdMatch" model that pairs researchers to specific programs based on skill match, broad product breadth (Bug Bounty, VDP, Pentest, Attack Surface Management), and a researcher community that some elite researchers prefer to HackerOne for payment transparency and program responsiveness. Best fit for Fortune 500 and large mid-market buyers wanting bug bounty at scale without locking into the HackerOne brand and pricing. Trade-offs: Fortune 500 logo coverage thinner than HackerOne (especially in US federal); researcher community smaller than HackerOne; triage quality variable per program reported on r/bugbounty; and pricing escalation reported at renewal 2024-2025 as the company pursues post-Series E margin expansion.
Fortune 500 and large mid-market enterprises (500-50,000 employees) wanting bug bounty at scale at lower platform fees than HackerOne, particularly buyers comfortable with secondary-leader brand positioning in exchange for pricing-arbitrage savings.
US federal buyers (HackerOne / Synack better federal pedigree), EU buyers requiring strict data residency (Intigriti / YesWeHack better), or SMBs without triage capacity (managed-bounty overhead meaningful).
Strengths
- $102M Series E April 2024 at $1B+ valuation (largest in bug-bounty history)
- Aggressive HackerOne pricing-arbitrage positioning
- Mature CrowdMatch researcher-to-program pairing
- Broad product breadth (Bug Bounty + VDP + Pentest + ASM)
- 700,000+ researchers in community
- Strong on Atlassian, Mastercard, Western Union, and similar Fortune 500 logos
- Mature integrations (Jira, ServiceNow, Slack)
Weaknesses
- Fortune 500 logo coverage thinner than HackerOne (especially US federal)
- Researcher community smaller than HackerOne (~700K vs ~2M)
- Triage quality variable per program (reported on r/bugbounty)
- Pricing escalation reported at renewal 2024-2025
- Less brand recognition than HackerOne on board / procurement page
Pricing tiers
opaque- Bugcrowd Disclosure (VDP)Lowest tier; vulnerability disclosure program. ~$10K-$30K/yearQuote
- Bugcrowd Bug BountyManaged bug-bounty program. ~$40K-$180K platform fee plus bounty payoutsQuote
- Bugcrowd PentestScheduled PTaaS engagements. ~$18K-$70K per engagementQuote
- Bugcrowd ASMAttack surface managementQuote
- Bugcrowd AI SafetyAI / LLM red-team servicesQuote
- · Platform fees separate from bounty payouts
- · Pricing escalation reported at renewal 2024-2025
- · Triage service fees on top of platform fees
- · Per-asset pricing on ASM module
Key features
- +Bugcrowd Bug Bounty (managed programs)
- +Bugcrowd Disclosure (VDP)
- +Bugcrowd Pentest (PTaaS, scheduled)
- +Bugcrowd ASM (attack surface management)
- +Bugcrowd AI Safety (LLM red-team)
- +CrowdMatch researcher-to-program pairing
- +Mature triage automation
- +Integrations (Jira, ServiceNow, Slack, GitHub)
Intigriti
EU-headquartered bug bounty with GDPR, NIS2, and DORA compliance anchoring.
Intigriti is the EU-headquartered bug-bounty and PTaaS platform, founded 2016 in Antwerp, Belgium by Stijn Jans and Inti De Ceukelaire, with a researcher community of approximately 100,000+ and a customer base that is heavily European and UK with growing US presence. The company raised $22M Series B in October 2024 led by Octopus Ventures, positioning the round explicitly around EU compliance momentum (GDPR enforcement maturity, NIS2 transposition through 2024-2025, and DORA financial-services compliance in January 2025). Strengths: the strongest EU-compliance-anchored positioning in PTaaS (GDPR data-handling, NIS2 incident-reporting requirements, DORA ICT risk requirements built into platform reporting), EU data residency on platform infrastructure (Frankfurt and Paris regions), a researcher community that skews European with deep penetration into EU public-sector and regulated-industry engagements, and mature integrations for European compliance frameworks. Best fit for EU-headquartered organizations and US organizations with significant EU operations needing data-residency-anchored testing under GDPR, NIS2, and DORA. Trade-offs: researcher community meaningfully smaller than HackerOne / Bugcrowd (~100K vs 700K-2M); US Fortune 500 logo coverage limited; brand recognition outside EU thinner; and product breadth narrower than HackerOne / Bugcrowd (no separate ASM product as of early 2026).
EU-headquartered organizations and US organizations with significant EU operations needing GDPR, NIS2, and DORA-anchored testing with EU data residency and EU-fluent triage, particularly EU public-sector and EU regulated-industry buyers.
US Fortune 500 wanting the largest researcher pool (HackerOne / Bugcrowd better), US federal buyers (Synack / HackerOne better), or buyers wanting broad ASM and AI-safety product breadth (Bugcrowd / HackerOne broader).
Strengths
- Strongest EU-compliance positioning (GDPR, NIS2, DORA)
- EU data residency on platform infrastructure (Frankfurt, Paris)
- Researcher community skews European; deep EU public-sector coverage
- Mature integrations for European compliance frameworks
- $22M Series B October 2024 (Octopus Ventures)
- EU-headquartered (Antwerp, Belgium); GDPR-native
- Mature triage workflow with EU-fluent triage team
Weaknesses
- Researcher community meaningfully smaller than HackerOne / Bugcrowd
- US Fortune 500 logo coverage limited
- Brand recognition outside EU thinner
- Product breadth narrower than HackerOne / Bugcrowd (no separate ASM product)
- US federal pedigree absent (FedRAMP not applicable; EU-focused)
Pricing tiers
partial- Intigriti Disclosure (VDP)Lowest tier; vulnerability disclosure program. EUR 8K-25K/yearQuote
- Intigriti BountyManaged bug bounty. EUR 35K-150K platform fee plus bounty payoutsQuote
- Intigriti Hybrid Pentest (PTaaS)Scheduled PTaaS. EUR 15K-60K per engagementQuote
- Intigriti EnterpriseMulti-program enterprise tier with unlimited schedulingQuote
- · Platform fees separate from bounty payouts
- · Annual price increases reported at 6-10%
- · Scope-creep charges on bounded engagements
- · EUR-denominated billing creates FX exposure for US buyers
Key features
- +Intigriti Bug Bounty (managed programs)
- +Intigriti Disclosure (VDP)
- +Intigriti Hybrid Pentest (PTaaS)
- +EU data residency (Frankfurt, Paris)
- +GDPR, NIS2, DORA compliance-mapped reporting
- +EU-fluent triage team
- +Mature integrations (Jira, ServiceNow, Slack, GitHub)
- +Researcher reputation and ranking system
YesWeHack
French bug-bounty platform with EU data residency as primary differentiator.
YesWeHack is the French bug-bounty and PTaaS platform, founded 2013 in Paris by Guillaume Vassault-Houliere, Manuel Dorne, and Romain Lecoeuvre, with a researcher community of approximately 60,000+ and a customer base heavily concentrated in France, EU public-sector, EU financial services, and EU regulated industries. Strengths: EU data residency on platform infrastructure (France-based), strong French public-sector pedigree (ANSSI-recognized; widely used across French ministries and OIVs/OSEs under LPM and NIS), GDPR-native handling by default, and a mature researcher community with strong French and Francophone Africa penetration. Best fit for French organizations, EU regulated industries (particularly financial services under DORA and OIVs/OSEs under NIS2), and EU public-sector buyers needing France-anchored data residency and ANSSI-aligned testing. Trade-offs: researcher community smaller than Intigriti (~60K vs ~100K) and meaningfully smaller than HackerOne / Bugcrowd; US logo coverage essentially nil; product breadth narrower than HackerOne / Bugcrowd (no ASM product); platform UX has been reported as dated relative to newer competitors; and pricing is denominated in EUR with limited US-buyer-friendly contracting.
French organizations, EU public-sector buyers (ministries, OIVs, OSEs under LPM and NIS2), EU regulated industries (particularly financial services under DORA), and Francophone Africa enterprises needing France-anchored data residency and ANSSI-aligned testing.
US enterprises (HackerOne / Bugcrowd / Cobalt better), US federal buyers (Synack / HackerOne better), buyers wanting broad ASM / AI-safety product breadth, or buyers prioritizing modern platform UX (Intigriti / Cobalt newer).
Strengths
- EU data residency (France-based platform infrastructure)
- Strong French public-sector pedigree (ANSSI-recognized)
- Widely used across French ministries and OIVs/OSEs under LPM, NIS, NIS2
- GDPR-native handling by default
- Researcher community with French and Francophone Africa penetration
- Mature for EU financial services under DORA
- Mature triage team fluent in French and English
Weaknesses
- Researcher community smaller than Intigriti / HackerOne / Bugcrowd
- US logo coverage essentially nil
- Product breadth narrower (no ASM product)
- Platform UX reported as dated relative to newer competitors
- EUR-denominated billing with limited US-buyer-friendly contracting
Pricing tiers
partial- YesWeHack Disclosure (VDP)Lowest tier; EUR 5K-20K/yearQuote
- YesWeHack Bug BountyManaged bug bounty. EUR 30K-120K platform fee plus bounty payoutsQuote
- YesWeHack Pentest (PTaaS)Scheduled PTaaS. EUR 12K-50K per engagementQuote
- YesWeHack EnterpriseMulti-program tierQuote
- · Platform fees separate from bounty payouts
- · EUR-denominated billing creates FX exposure for US buyers
- · Scope-creep charges on bounded engagements
- · Specialty engagements (mobile, IoT, hardware) priced separately
Key features
- +YesWeHack Bug Bounty (managed programs)
- +YesWeHack Disclosure (VDP)
- +YesWeHack Pentest (PTaaS)
- +EU data residency (France-based)
- +GDPR, NIS2, DORA, LPM compliance-mapped reporting
- +ANSSI-recognized program management
- +French and English triage team
- +Researcher reputation and ranking system
Trustwave PTaaS
Legacy-MSSP heritage PTaaS; acquisition uncertainty material after Singtel sale.
Trustwave is one of the oldest commercial penetration-testing and managed-security-services brands, founded 1995 in Chicago, with a legacy MSSP heritage anchored on SpiderLabs (the internal research and pen-testing team) and broad service catalog spanning managed detection and response, threat hunting, digital forensics, and PTaaS. The ownership history is the most-cited concern: Singtel acquired Trustwave in 2015 for $810M, then MacAndrews and Forbes (the Ron Perelman holding company) acquired Trustwave from Singtel in September 2024 at a reported $300M-$400M speculation range, a meaningful discount to the original purchase that suggests value impairment over the Singtel ownership period. Strengths: SpiderLabs has a long, credible research pedigree and continues to publish notable threat-intelligence work, broad service catalog allows bundling PTaaS with MDR and DFIR (a one-stop-shop for some buyers), and PCI DSS / PCI Forensic Investigator (PFI) credentials are strong in payment-card industries. Best fit for large regulated enterprises (5,000+ employees) wanting bundled MSSP services with PTaaS included, particularly PCI-heavy buyers. Trade-offs: post-MacAndrews and Forbes acquisition (September 2024) customer-support quality concerns have surfaced in renewal conversations and r/cybersecurity threads, legacy MSSP heritage means the PTaaS product is less product-led than Cobalt / HackerOne PTaaS (more services-led), pricing is opaque and meaningful at enterprise scale, and brand momentum has been flat-to-down over the Singtel-and-now-PE ownership cycle.
Large regulated enterprises (5,000+ employees) wanting bundled MSSP services (MDR + DFIR + PTaaS) under a single contract, particularly PCI DSS-heavy buyers in payment-card industries.
Mid-market SaaS companies (Cobalt better fit), US federal buyers (Synack better federal pedigree), EU buyers requiring strict data residency (Intigriti / YesWeHack better), or buyers concerned about acquisition uncertainty and post-PE customer-support quality.
Strengths
- SpiderLabs research and pen-testing team has long credible pedigree
- Broad MSSP service catalog (MDR + DFIR + PTaaS bundling)
- Strong PCI DSS and PCI Forensic Investigator (PFI) credentials
- Built for large regulated enterprises (5,000+ employees)
- Mature for payment-card industries
- Long delivery history since 1995
Weaknesses
- MacAndrews and Forbes acquisition Sept 2024 at reported $300M-$400M (vs Singtel $810M 2015); value impairment under Singtel ownership
- Customer-support quality concerns post-acquisition
- PTaaS product less product-led than Cobalt / HackerOne PTaaS (more services-led)
- Pricing opaque and meaningful at enterprise scale
- Brand momentum flat-to-down over multi-acquisition cycle
Pricing tiers
opaque- Trustwave PTaaS (per engagement)~$25K-$100K per engagement typicalQuote
- Trustwave MSSP + PTaaS bundleBundled MDR + PTaaS + DFIR; custom enterprise pricingQuote
- Trustwave PCI servicesPCI-specific testing and PFI servicesQuote
- · Custom contracts with limited published pricing
- · Scope-creep charges common in services-led model
- · Bundled MSSP commitments required for best PTaaS pricing
- · Specialty engagements priced separately
Key features
- +SpiderLabs pen-testing team
- +Web app, API, mobile, network, internal pen testing
- +PCI DSS and PFI services
- +Bundled MSSP services (MDR, DFIR, threat hunting)
- +Compliance-mapped reporting (PCI, HIPAA, SOC 2)
- +Mature retest workflow
- +Threat intelligence integration (SpiderLabs research)
Rapid7 PTaaS
PTaaS leveraging Insight platform and Velociraptor managed-services capability.
Rapid7 PTaaS is the penetration-testing-as-a-service offering from Rapid7 (NASDAQ:RPD), built on the Rapid7 Insight platform and meaningfully expanded with the May 2024 acquisition of Velociraptor (the open-source DFIR project) and the underlying managed-services capability. Strengths: tight integration with the Insight platform (InsightVM, InsightIDR, InsightAppSec) creates a unified view of pen-test findings alongside scanner output and SIEM events, mature managed-services delivery muscle (Rapid7 has run managed services for years and the Velociraptor acquisition strengthened DFIR depth), and public-company financial transparency. Best fit for organizations already running the Rapid7 Insight platform who want PTaaS integrated into the existing security stack rather than a separate point solution. Trade-offs: outside the Rapid7 Insight ecosystem the PTaaS offering is less compelling than Cobalt / HackerOne PTaaS / Synack on standalone merit; Rapid7 revenue growth has been under pressure 2024-2025 (activist investor Jana Partners disclosed a stake in 2024 and pushed for a strategic review); per-engagement pricing meaningful at enterprise scale; and the PTaaS product is less mature on researcher-led testing than the dedicated PTaaS vendors.
Mid-market and enterprise (500-25,000 employees) already running the Rapid7 Insight platform (InsightVM, InsightIDR, InsightAppSec) who want PTaaS integrated into the existing security stack rather than a separate point solution.
Non-Rapid7 stacks (Cobalt / HackerOne PTaaS / Synack better as standalone), US federal buyers (Synack better federal pedigree), EU buyers requiring strict data residency (Intigriti / YesWeHack better), or buyers concerned about Rapid7 vendor stability post-Jana Partners review.
Strengths
- Tight integration with Rapid7 Insight platform (InsightVM, InsightIDR, InsightAppSec)
- Velociraptor acquisition May 2024 strengthened DFIR and managed-services depth
- Mature managed-services delivery muscle
- Public company financial transparency
- Best for Rapid7 Insight-anchored security stacks
- Compliance-mapped reporting (SOC 2, PCI, HIPAA)
- Mature retest workflow
Weaknesses
- Outside Rapid7 Insight ecosystem less compelling than Cobalt / HackerOne PTaaS / Synack
- Rapid7 revenue growth under pressure 2024-2025; Jana Partners activist stake disclosed
- Per-engagement pricing meaningful at enterprise scale
- PTaaS product less mature on researcher-led testing than dedicated PTaaS vendors
- Innovation pace slower than Cobalt on PTaaS-specific workflow
Pricing tiers
partial- Rapid7 PTaaS (per engagement)~$18K-$80K per engagement typicalQuote
- Rapid7 PTaaS + Insight bundleBundled with InsightVM / InsightIDR; custom pricingQuote
- Rapid7 MDR + PTaaSBundled managed services; enterprise pricingQuote
- · Bundled Insight platform commitments for best PTaaS pricing
- · Scope-creep charges on bounded engagements
- · Annual price increases reported
- · Specialty engagements (mobile, IoT) priced separately
Key features
- +Web app, API, mobile, network, internal pen testing
- +Insight platform integration (InsightVM, InsightIDR, InsightAppSec)
- +Velociraptor DFIR capability
- +Managed services delivery
- +Compliance-mapped reporting
- +Mature retest workflow
- +Threat intelligence (Rapid7 Labs)
Nettitude
UK + US-based pen testing with CREST, CHECK, and STAR-FS certifications under Lloyds Register.
Nettitude is the UK-headquartered pen-testing and PTaaS firm acquired by Lloyds Register (the marine and industrial classification society) in 2018, with delivery teams in the UK and US, and a customer base concentrated in UK financial services, EU regulated industries, and US enterprises with UK operations. Strengths: an unusually deep portfolio of UK and EU regulator-recognized certifications (CREST member firm, CHECK Green Light status for UK government work, STAR-FS for Bank of England intelligence-led pen testing, PCI Qualified Security Assessor), the Lloyds Register backing provides unusual long-term ownership stability in a category dominated by VC-backed and PE-owned vendors, and a strong pedigree in TIBER-EU and TIBER-style threat-led pen testing for financial regulators. Best fit for UK and EU financial services, EU regulated industries, and US enterprises with UK operations needing CREST / CHECK / STAR-FS-certified testing or TIBER-EU intelligence-led red teaming. Trade-offs: researcher-led delivery model rather than crowdsourced (smaller delivery surface than HackerOne / Bugcrowd); product/platform layer is less mature than Cobalt / HackerOne PTaaS (services-led, not product-led); pricing opaque; brand recognition outside UK / EU regulated industries thinner; and US logo coverage limited.
UK and EU financial services (particularly Bank of England-regulated firms requiring STAR-FS), EU regulated industries needing TIBER-EU threat-led red teaming, and US enterprises with UK operations needing CREST / CHECK-certified testing under Lloyds Register backing.
US Fortune 500 wanting the largest researcher pool (HackerOne / Bugcrowd better), US federal buyers (Synack better federal pedigree), mid-market SaaS companies (Cobalt better fit), or buyers prioritizing product-led platform workflow over services-led delivery.
Strengths
- CREST member firm; CHECK Green Light; STAR-FS for Bank of England
- Lloyds Register backing provides long-term ownership stability
- Strong TIBER-EU and TIBER-style threat-led red team pedigree
- UK and US delivery teams
- Mature PCI Qualified Security Assessor capability
- Built for UK financial services and EU regulated industries
- Long delivery history since 2003
Weaknesses
- Services-led delivery; smaller surface than crowdsourced platforms
- Product / platform layer less mature than Cobalt / HackerOne PTaaS
- Pricing opaque
- Brand recognition outside UK / EU regulated industries thinner
- US Fortune 500 logo coverage limited
Pricing tiers
opaque- Nettitude PTaaS (per engagement)~GBP 18K-75K per engagement typicalQuote
- Nettitude TIBER-EU red teamThreat-led red team; GBP 100K-400K per programQuote
- Nettitude STAR-FSBank of England intelligence-led pen testQuote
- Nettitude MSSP + PTaaSBundled MSSP servicesQuote
- · Custom services-led contracts with limited published pricing
- · GBP-denominated billing creates FX exposure for US buyers
- · Scope-creep charges common in services-led model
- · Specialty engagements (TIBER, STAR-FS) priced separately
Key features
- +Web app, API, mobile, network, internal pen testing
- +TIBER-EU and STAR-FS threat-led red teaming
- +CREST, CHECK, PCI QSA credentials
- +Lloyds Register backing
- +Compliance-mapped reporting (PCI, SOC 2, ISO 27001)
- +Mature retest workflow
- +Threat intelligence capability
Detectify
Swedish web-app and external attack surface monitoring with crowdsourced signature library.
Detectify is the Swedish web-application and external attack surface monitoring platform, founded 2013 in Stockholm by former bug-bounty researchers, with a customer base concentrated in EU and US SaaS companies and security-conscious mid-market organizations. Strengths: a crowdsourced researcher-fed signature library (Crowdsource program pays researchers for novel vulnerability modules that then get added to the scanner, this is the closest the category has to PTaaS-meets-DAST), strong fit for continuous external monitoring of web-facing assets (Surface Monitoring and Application Scanning products), EU data residency on platform infrastructure (Stockholm), and a developer-friendly UX that engineering teams adopt. Best fit for cloud-native SaaS companies and security-conscious mid-market organizations (100-2,500 employees) needing continuous external web-app and surface monitoring rather than scheduled point-in-time pen tests. Trade-offs: this is meaningfully more of a DAST + EASM product than a true PTaaS (no scheduled human-led pen tests, no researcher-led engagement model); product breadth narrower than HackerOne / Bugcrowd / Cobalt; researcher pool meaningfully smaller; brand recognition in US Fortune 500 thinner; and the position at the edge of the PTaaS category means buyers should be clear-eyed about what they are buying (continuous scanning enriched by researcher-contributed signatures, not human-delivered pen tests).
Cloud-native SaaS companies and security-conscious mid-market organizations (100-2,500 employees) needing continuous external web-app and surface monitoring enriched by researcher-contributed signatures, particularly EU-headquartered or EU-operating companies.
Buyers wanting true scheduled human-led pen tests (Cobalt / HackerOne PTaaS / Synack better), Fortune 500 wanting the largest researcher pool (HackerOne / Bugcrowd better), US federal buyers (Synack better federal pedigree), or buyers needing broad PTaaS product breadth (Bugcrowd / HackerOne broader).
Strengths
- Crowdsource program pays researchers for novel vulnerability modules
- Strong continuous external monitoring (Surface Monitoring, Application Scanning)
- EU data residency (Stockholm-based platform infrastructure)
- Developer-friendly UX engineering teams adopt
- Mature for cloud-native SaaS and mid-market
- GDPR-native handling
- Fast deployment and time-to-value
Weaknesses
- Meaningfully more DAST + EASM than true PTaaS (no human-led pen tests)
- Product breadth narrower than HackerOne / Bugcrowd / Cobalt
- Researcher pool meaningfully smaller
- Brand recognition in US Fortune 500 thinner
- Edge-of-category positioning requires clear-eyed buying
Pricing tiers
public- Surface MonitoringPer domain per month; external attack surface monitoring$89 /mo
- Application ScanningPer application per month; deep web-app scanning$289 /mo
- Surface Monitoring + Application Scanning bundleCustom; bundled at discountQuote
- EnterpriseCustom; multi-asset, dedicated CSMQuote
- · Per-domain and per-application pricing escalates with asset sprawl
- · Annual price increases reported at 5-10%
- · Specialty modules priced separately
- · Enterprise contracting required at multi-asset scale
Key features
- +Surface Monitoring (external attack surface)
- +Application Scanning (deep web-app scanning)
- +Crowdsource program (researcher-contributed vulnerability modules)
- +Continuous scanning (not scheduled point-in-time)
- +EU data residency (Stockholm)
- +GDPR-native handling
- +Mature integrations (Jira, Slack, GitHub)
- +Developer-friendly UX
8 steps to pick the right penetration testing as a service (ptaas)
- 1 1. Decide bug bounty, PTaaS, or both
Compliance work (SOC 2 Type 2, PCI annual, ISO 27001, federal) points to PTaaS with scheduled engagements and auditor-acceptable reports (Cobalt, Synack, Trustwave, Rapid7, Nettitude). Continuous coverage and broad attack-surface attention points to bug-bounty (HackerOne, Bugcrowd, Intigriti, YesWeHack). Most mature programs run both: PTaaS for compliance cycles, bug bounty for continuous coverage.
- 2 2. Decide US-headquartered or EU-headquartered platform
EU-headquartered organizations and US organizations with significant EU operations (particularly under DORA, NIS2, GDPR enforcement) should default to Intigriti (Belgium) or YesWeHack (France) for EU data residency and EU-fluent triage. US Fortune 500 and federal default to HackerOne, Bugcrowd, Synack, or Cobalt. EU regulated industries needing CREST, CHECK, or STAR-FS should look at Nettitude. Confirm data residency requirements with legal and compliance before procurement.
- 3 3. Distinguish researcher pool size from researcher quality
Bug volume is correlated to researcher pool size: HackerOne (~2M+ researchers) and Bugcrowd (~700K) lead on pool. Researcher quality and vetting is a different axis: Synack SRT (cleared, background-checked) is the most heavily vetted, Cobalt Core (1,000+ vetted) is the strongest mid-market vetted pool. Federal work needs vetted-cleared researchers; commercial compliance work can use crowdsourced researchers with appropriate scope controls.
- 4 4. Plan retest and remediation workflow integration
A pen-test report sitting in a PDF is operationally useless. Verify integrations into your ticketing (Jira, ServiceNow), your VM platform (Tenable, Qualys, Rapid7, Wiz), and your SIEM (Splunk, Sentinel, InsightIDR) before signing. Confirm included retest windows: Cobalt offers free retests within 6 months; HackerOne / Bugcrowd / Synack vary by tier. Retest cadence is the highest-leverage workflow control in PTaaS.
- 5 5. Negotiate platform fees separately from bounty payouts
HackerOne, Bugcrowd, Intigriti, YesWeHack platform fees are typically 20-40% of total program spend, with the remainder going to bounty payouts to researchers. Negotiate platform fees down separately from bounty payouts (the latter are pay-for-results and align incentives, the former are pure margin). Multi-year platform-fee locks with annual-increase caps are common at enterprise scale.
- 6 6. Review vendor disclosure-handling and insider-threat controls
The 2022 HackerOne insider data-leak case (analyst exfiltrating customer reports to extort bounties) is the most-cited PTaaS trust event. Practical procurement controls: (1) review the vendor SOC 2 Type 2 report for access controls on customer vulnerability data, (2) ask explicitly about insider-threat detection on customer-data access, (3) negotiate breach-notification SLAs into the contract, and (4) confirm researcher payment dispute escalation paths.
- 7 7. Plan for vendor concentration and acquisition risk
PTaaS vendor stability is a real procurement consideration in 2026: Trustwave under MacAndrews and Forbes (acquired Sept 2024 at reported steep discount from Singtel), HackerOne IPO speculation 2024-2025, Synack pivot to compliance-driven sales 2023+, Rapid7 under Jana Partners activist pressure 2024+, Cobalt post-2022 Series B pivot. Practical guidance: (1) require 30-day exit / data-export plans in every contract, (2) avoid single-vendor concentration if PTaaS is mission-critical for compliance, and (3) re-evaluate vendor stability at every renewal cycle.
- 8 8. Map to compliance frameworks before scoping
SOC 2 Type 2 expects evidence of regular pen testing with remediation tracking; PCI DSS 4.0 has explicit pen-test scoping requirements; ISO 27001 expects pen testing as part of A.12.6.1 controls; DORA expects threat-led pen testing for systemically-important EU financial services; CMMC and NIST 800-171 expect pen testing in their respective control families. Confirm the auditor-acceptable report format with your assessor before signing the PTaaS contract; rework on report format after engagement close is expensive and common.
Frequently asked questions
The questions buyers actually ask before they sign a penetration testing as a service (ptaas) contract.
PTaaS vs traditional pen test, which one?
Vetted-researcher PTaaS vs crowd, which model?
Bug bounty vs PTaaS, what is the difference?
How do vulnerability-disclosure controversies affect vendor selection?
When do federal-cleared researchers matter?
How does the EU compliance angle change vendor selection?
How do AI-augmented PTaaS and AI red-teaming change the category?
How much should I budget for PTaaS?
How long does PTaaS deployment take?
How does this differ from your VM and CSPM rankings?
Glossary
- PTaaS
- Penetration Testing as a Service. Platform-delivered penetration testing with real-time finding stream, integrations into ticketing, included retests, and compliance-mapped reporting. Cobalt arguably defined the commercial PTaaS category.
- Bug bounty
- Pay-for-results security testing model: researchers are paid for valid vulnerabilities they find. Managed by platforms (HackerOne, Bugcrowd, Intigriti, YesWeHack) that handle scope, triage, and payout workflows.
- VDP
- Vulnerability Disclosure Program. Public-facing program where external researchers can report vulnerabilities to a vendor under a defined safe-harbor policy. Usually unpaid (distinct from bug bounty).
- CVE
- Common Vulnerabilities and Exposures. Public catalog of disclosed software vulnerabilities, each with a unique identifier (e.g. CVE-2024-XXXX). Maintained by MITRE.
- CVSS
- Common Vulnerability Scoring System. Standardized 0.0-10.0 severity score. Useful for triage but insufficient on its own for prioritization in mature programs.
- OWASP Top 10
- The OWASP Top 10 Web Application Security Risks. Industry-standard list of the most critical web application security risks (currently in the 2021 revision; 2025 revision in draft). Every web-app pen test report maps findings to OWASP Top 10 categories.
- Vetted-researcher PTaaS
- PTaaS using named, background-checked testers under NDA. Cobalt Core, Synack SRT, Trustwave SpiderLabs, Rapid7 services, Nettitude consultants. Wins for compliance and federal work.
- Crowdsourced bug bounty
- Bug-bounty model using an open or curated researcher community paid for results. HackerOne, Bugcrowd, Intigriti, YesWeHack. Wins on volume and continuous coverage.
- CREST / CHECK / STAR-FS
- CREST is the UK-based pen-test certification body; CHECK is the UK government scheme for pen testing government systems (CHECK Green Light is the highest tier); STAR-FS is the Bank of England intelligence-led pen-testing framework for systemically-important financial services firms.
- TIBER-EU
- Threat Intelligence-Based Ethical Red Teaming, European Union. The ECB framework for intelligence-led red-team testing of EU financial-services firms. Required or strongly recommended for systemically-important banks and financial market infrastructures.
- DORA
- Digital Operational Resilience Act. EU regulation enforced January 2025, sets ICT risk management and third-party risk requirements for EU financial-services firms. Includes threat-led pen testing requirements aligned with TIBER-EU.
- NIS2
- Network and Information Security Directive 2. EU directive (transposed by member states through 2024-2025) expanding cybersecurity requirements to a broader set of essential and important entities. Includes incident-reporting and risk-management obligations relevant to PTaaS engagements.
Final word
See the full intelligence profile for any product on this page, including verified pricing, vendor trust scores, and review patterns. Browse the Penetration Testing as a Service (PTaaS) category page →
Last updated 2026-05-10. Pricing data is reverified quarterly. Found something inaccurate? Tell us.