France verdict (TL;DR)
Verified 2026-05-19France has a genuine home-built PTaaS champion: YesWeHack (Paris, 2015-founded, EUR 16M+ funded, EU sovereign bug-bounty platform) is the definitive French-built choice for French public sector, regulated industry, and OIV (Operateurs d'Importance Vitale) bug bounty programs. YesWeHack is ANSSI-aligned, RGPD-native, and the platform of record for French government bug bounty (DINUM-led programs). HackerOne and Intigriti are both active in French private-sector enterprise; Intigriti (Belgian, EUR-native) has strong French mid-market adoption. French compliance context: RGPD (CNIL enforcement) governs penetration testing data handling; ANSSI (Agence nationale de la securite des systemes d'information) publishes French cybersecurity methodology guidelines; LPM (Loi de Programmation Militaire, 2013 and 2024 update) creates specific pen testing obligations for French OIV and OSE (Operateurs de Services Essentiels); NIS2 transposition into French law (SRSSI 2024) extends these obligations to broader sectors.
Picks for France
- French public sector, OIV, and OSE bug bounty (French sovereign champion): yeswehack Paris-built, EUR 16M+ funded. EU sovereign bug-bounty platform. ANSSI-aligned, RGPD-native. Platform of record for French government bug bounty programs. Rank #1 for France.
- French enterprise bug bounty with global researcher scale: hackerone Active France go-to-market, EUR billing available. Largest researcher pool including French researchers. Used at French CAC 40 and global French corporations for enterprise bug bounty programs.
- French mid-market EU-compliant bug bounty: intigriti Belgian, EUR-native, GDPR-compliant. Strong French mid-market adoption. $22M Series B October 2024. Closer geographic and cultural alignment to France than US-headquartered vendors.
- French enterprise PTaaS for ISO 27001 and SOC 2: cobalt-ptaas Fast time-to-engagement for French companies pursuing ISO 27001 and SOC 2 certifications for EU and US customers. EUR equivalent pricing via EU billing.
How the penetration testing as a service (ptaas) market looks in France
France's PTaaS market is shaped by two overlapping forces: the strong French government cybersecurity apparatus (ANSSI, DINUM, ComCyberMI) and the French OIV regulatory framework that creates hard pen testing requirements for critical infrastructure operators.
YesWeHack is the most strategically important French PTaaS story. Founded in Paris in 2015 by Guillaume Vassault-Houliere and colleagues, YesWeHack is a EUR 16M+ funded (Omnes Capital, Normandie Participations, BPI France) EU-sovereign bug-bounty platform with a specific mandate to serve French and EU public-sector and regulated-industry bug bounty needs that require data sovereignty. YesWeHack has run bug bounty programs for the French Ministry of Defence, DINUM (Direction Interministérielle du Numérique), and multiple French OIV and OSE operators. Its data is hosted in France (OVHcloud infrastructure), ANSSI guidance is embedded in its platform, and it has EUR-denominated pricing with French-language support.
ANSSI (the French national cybersecurity agency) publishes methodological guides for penetration testing (PASSI methodology, Guide de qualification des prestataires de détection d'incidents de sécurité) that are the de facto standard for formal French pen testing engagements. ANSSI qualification (PASSI - Prestataires d'Audit de Sécurité des Systèmes d'Information) is required for pen testing of French OIV and OSE information systems; only ANSSI-PASSI-qualified auditors may conduct these assessments. YesWeHack partners with PASSI-qualified firms; HackerOne and Cobalt do not hold PASSI qualification directly.
LPM 2024 (Loi de Programmation Militaire 2024-2030) extended cybersecurity obligations for French critical infrastructure and defense-industrial base (BITD) companies. French BITD companies must now comply with enhanced cybersecurity audit requirements that include regular penetration testing by PASSI-qualified auditors.
ANSSI PASSI qualification: pen testing of French OIV and OSE systems, and increasingly BITD companies, requires PASSI-qualified auditors; verify PASSI qualification on the ANSSI registered provider list before engaging for French regulated-sector assessments; YesWeHack partners with PASSI-qualified firms. RGPD (CNIL enforcement): penetration testing generating vulnerability data about systems that process personal data is a data processing activity under RGPD; ensure your PTaaS vendor has a RGPD-compliant DPA with EU data residency; YesWeHack (French hosting) and Intigriti (Belgian, EU hosting) have native RGPD compliance; US vendors require additional CNIL-compliant documentation. LPM and NIS2 transposition: French OIV and OSE operators have formal pen testing obligations under LPM and the French NIS2 transposition (SRSSI 2024); engage ANSSI for the current list of sector-specific obligations and verify your PTaaS engagement meets scope and frequency requirements. SecNumCloud: for sensitive French public-sector and OIV data, SecNumCloud-qualified hosting (OVHcloud, Outscale) may be required for vulnerability reports; verify report storage location with your PTaaS vendor.
Quick comparison, ranked for France
| Product | Best for | Starts at | 10-emp/mo* | Pricing | G2 | Geo |
|---|---|---|---|---|---|---|
| 6 YesWeHack | French and EU-regulated organizations, EU public-sector | Quote | - | 4.6 | France primary; EU and Francophone Africa strong; UK growing | |
| 1 HackerOne | Mid-market to Fortune 500 enterprises | Quote | - | 4.4 | Global; strongest in US, UK, EU, AU | |
| 5 Intigriti | EU-headquartered and EU-operating organizations | Quote | - | 4.7 | EU primary; UK and US growing | |
| 2 Cobalt | SaaS, fintech, and mid-market compliance-driven security programs | $0 | $0 | 4.6 | Global; strongest in US, EU, UK | |
| 3 Synack | US federal, defense industrial base, and regulated enterprises | Quote | - | 4.5 | Global; strongest in US federal and DoD; expanding into EU and AU | |
| 4 Bugcrowd | Mid-market to Fortune 500 enterprises | Quote | - | 4.4 | Global; strongest in US, AU, UK, EU | |
| 7 Trustwave PTaaS | Large regulated enterprises and PCI-heavy industries | Quote | - | 4.0 | Global; strongest in US, UK, EU, AU | |
| 8 Rapid7 PTaaS | Rapid7 Insight-anchored mid-market and enterprise | Quote | - | 4.3 | Global; strongest in US, UK, EU, AU | |
| 9 Nettitude | UK and EU financial services, regulated industries, US enterprises with UK operations | Quote | - | 4.5 | UK primary; US delivery; EU regulated industries | |
| 10 Detectify | Cloud-native SaaS and security-conscious mid-market | $89 | $89 | 4.5 | EU primary; US and UK growing |
*10-employee monthly cost = base fee + (per-employee × 10) using the lowest published tier. For opaque-pricing vendors, no value is shown.
What buyers in France actually pay
Median annual deal size by employee band, in EUR. Crowdsourced from anonymized buyer disclosures.
| Product | Employee band | Median annual (EUR) | Sample | Notes |
|---|---|---|---|---|
| YesWeHack | French enterprise and public sector | €45,000 | 34 | YesWeHack annual program; EUR-billed; bounty payouts separate |
| Intigriti | French mid-market bug bounty | €48,000 | 22 | Intigriti France; EUR-billed |
| HackerOne | French CAC 40 enterprise | €110,000 | 18 | HackerOne France; EUR equivalent; bounty payouts separate |
| Cobalt | French mid-market ISO 27001 / SOC 2 | €24,000 | 28 | Cobalt France; EUR equivalent |
France-built or France-strong vendors worth knowing
Not yet ranked in our global top 10, but credible options for France buyers and worth a shortlist.
YesWeHack
Visit ↗Paris-founded EU sovereign bug-bounty platform. EUR 16M+ funded. ANSSI-aligned, RGPD-native, French-hosted (OVHcloud). Platform of record for French government and OIV bug bounty programs. The definitive French-built PTaaS champion; rank #1 for French public sector and regulated industry buyers.
Yogosha
Visit ↗Paris-founded private bug-bounty platform for sensitive-sector clients. Vetted-researcher pool with security clearance options. Targeted at French defense, banking, and critical infrastructure needing sovereign data handling beyond YesWeHack scope.
All 10, ranked for France
Same intelligence as the global ranking, vendor trust, review patterns, verified pricing, compliance, reordered for the France market.
YesWeHack
French bug-bounty platform with EU data residency as primary differentiator.
YesWeHack is the French bug-bounty and PTaaS platform, founded 2013 in Paris by Guillaume Vassault-Houliere, Manuel Dorne, and Romain Lecoeuvre, with a researcher community of approximately 60,000+ and a customer base heavily concentrated in France, EU public-sector, EU financial services, and EU regulated industries. Strengths: EU data residency on platform infrastructure (France-based), strong French public-sector pedigree (ANSSI-recognized; widely used across French ministries and OIVs/OSEs under LPM and NIS), GDPR-native handling by default, and a mature researcher community with strong French and Francophone Africa penetration. Best fit for French organizations, EU regulated industries (particularly financial services under DORA and OIVs/OSEs under NIS2), and EU public-sector buyers needing France-anchored data residency and ANSSI-aligned testing. Trade-offs: researcher community smaller than Intigriti (~60K vs ~100K) and meaningfully smaller than HackerOne / Bugcrowd; US logo coverage essentially nil; product breadth narrower than HackerOne / Bugcrowd (no ASM product); platform UX has been reported as dated relative to newer competitors; and pricing is denominated in EUR with limited US-buyer-friendly contracting.
French organizations, EU public-sector buyers (ministries, OIVs, OSEs under LPM and NIS2), EU regulated industries (particularly financial services under DORA), and Francophone Africa enterprises needing France-anchored data residency and ANSSI-aligned testing.
US enterprises (HackerOne / Bugcrowd / Cobalt better), US federal buyers (Synack / HackerOne better), buyers wanting broad ASM / AI-safety product breadth, or buyers prioritizing modern platform UX (Intigriti / Cobalt newer).
Strengths
- EU data residency (France-based platform infrastructure)
- Strong French public-sector pedigree (ANSSI-recognized)
- Widely used across French ministries and OIVs/OSEs under LPM, NIS, NIS2
- GDPR-native handling by default
- Researcher community with French and Francophone Africa penetration
- Mature for EU financial services under DORA
- Mature triage team fluent in French and English
Weaknesses
- Researcher community smaller than Intigriti / HackerOne / Bugcrowd
- US logo coverage essentially nil
- Product breadth narrower (no ASM product)
- Platform UX reported as dated relative to newer competitors
- EUR-denominated billing with limited US-buyer-friendly contracting
Pricing tiers
partial- YesWeHack Disclosure (VDP)Lowest tier; EUR 5K-20K/yearQuote
- YesWeHack Bug BountyManaged bug bounty. EUR 30K-120K platform fee plus bounty payoutsQuote
- YesWeHack Pentest (PTaaS)Scheduled PTaaS. EUR 12K-50K per engagementQuote
- YesWeHack EnterpriseMulti-program tierQuote
- · Platform fees separate from bounty payouts
- · EUR-denominated billing creates FX exposure for US buyers
- · Scope-creep charges on bounded engagements
- · Specialty engagements (mobile, IoT, hardware) priced separately
Key features
- +YesWeHack Bug Bounty (managed programs)
- +YesWeHack Disclosure (VDP)
- +YesWeHack Pentest (PTaaS)
- +EU data residency (France-based)
- +GDPR, NIS2, DORA, LPM compliance-mapped reporting
- +ANSSI-recognized program management
- +French and English triage team
- +Researcher reputation and ranking system
HackerOne
Bug-bounty market leader with largest researcher pool and Fortune 500 logo coverage.
HackerOne is the bug-bounty market leader, founded 2012 by Jobert Abma, Michiel Prins, Alex Rice, and Merijn Terheggen, with roughly 2M+ registered researchers and the deepest Fortune 500 logo coverage in the category (US DoD, Goldman Sachs, GitHub, Uber, GitLab, and hundreds more). Reported revenue reached approximately $140M in 2023, and IPO speculation has persisted through 2024 and 2025 as the company crossed the typical S-1 threshold. Strengths: the largest researcher community in the world, mature triage and disclosure workflows (HackerOne Response, HackerOne Bounty, HackerOne Pentest), and a strong product platform that runs everything from vulnerability disclosure programs (VDP) to fully-managed bug bounty to scheduled PTaaS engagements. Best fit for Fortune 500 and large public-sector buyers who need the deepest researcher pool and the most credible bug-bounty brand on the procurement page. Trade-offs: the 2022 insider data-leak case (in which a HackerOne security analyst exfiltrated customer vulnerability reports and used them to extort companies for bounty payouts) remains the most-cited trust event in vendor selection conversations, internal access controls were tightened post-incident but the brand impact persists; pricing meaningful at scale (program-management fees on top of bounty payouts); and disclosure-policy controversies (vendor delays, gag clauses, researcher payment disputes) periodically surface on r/bugbounty and security Twitter.
Fortune 500 enterprises, US federal and large public-sector buyers, and mature security programs (5,000+ employees) wanting the deepest researcher pool, the strongest brand for board and auditor presentations, and a unified platform spanning VDP, bug bounty, and PTaaS.
EU-regulated buyers requiring strict data residency (Intigriti and YesWeHack better), SMBs without a triage capability (lower-volume disclosure platforms cheaper), or buyers explicitly wanting to avoid the HackerOne brand after the 2022 insider case.
Strengths
- Largest researcher community in the world (~2M+ registered)
- Deepest Fortune 500 and US public-sector logo coverage
- Mature workflows across VDP, Bounty, Pentest, and Response
- Strong brand on procurement page (auditor and board recognition)
- Reported revenue ~$140M in 2023; IPO speculation 2024-2025
- Mature API and integrations (Jira, ServiceNow, Slack, GitHub)
- Mature triage team for high-volume bug-bounty programs
Weaknesses
- 2022 insider data-leak case (analyst exfiltrating customer reports) remains most-cited trust event
- Program management fees meaningful on top of bounty payouts
- Disclosure-policy controversies (vendor delays, gag clauses, payment disputes) surface periodically
- Pricing escalation reported by long-standing customers at renewal
- Researcher payment disputes occasionally public on r/bugbounty and Twitter
Pricing tiers
opaque- HackerOne Response (VDP)Lowest tier; vulnerability disclosure program management. ~$10K-$40K/year typical.Quote
- HackerOne BountyManaged bug-bounty program. ~$50K-$200K platform fee plus bounty payouts.Quote
- HackerOne PentestScheduled PTaaS engagements. ~$20K-$80K per engagement typical.Quote
- HackerOne Assets (ASM)Attack surface management add-on.Quote
- HackerOne Code (AI/LLM testing)AI red-team services; newer.Quote
- · Platform fees separate from bounty payouts
- · Annual price increases of 8-15% reported by renewing customers
- · Triage service fees on top of platform fees
- · Per-asset pricing on Assets module can escalate
Key features
- +HackerOne Response (VDP management)
- +HackerOne Bounty (managed bug-bounty programs)
- +HackerOne Pentest (PTaaS, scheduled engagements)
- +HackerOne Assets (attack surface management)
- +HackerOne Code (AI / LLM testing services)
- +Mature triage team
- +Integrations (Jira, ServiceNow, Slack, GitHub)
- +Researcher reputation and ranking system
Intigriti
EU-headquartered bug bounty with GDPR, NIS2, and DORA compliance anchoring.
Intigriti is the EU-headquartered bug-bounty and PTaaS platform, founded 2016 in Antwerp, Belgium by Stijn Jans and Inti De Ceukelaire, with a researcher community of approximately 100,000+ and a customer base that is heavily European and UK with growing US presence. The company raised $22M Series B in October 2024 led by Octopus Ventures, positioning the round explicitly around EU compliance momentum (GDPR enforcement maturity, NIS2 transposition through 2024-2025, and DORA financial-services compliance in January 2025). Strengths: the strongest EU-compliance-anchored positioning in PTaaS (GDPR data-handling, NIS2 incident-reporting requirements, DORA ICT risk requirements built into platform reporting), EU data residency on platform infrastructure (Frankfurt and Paris regions), a researcher community that skews European with deep penetration into EU public-sector and regulated-industry engagements, and mature integrations for European compliance frameworks. Best fit for EU-headquartered organizations and US organizations with significant EU operations needing data-residency-anchored testing under GDPR, NIS2, and DORA. Trade-offs: researcher community meaningfully smaller than HackerOne / Bugcrowd (~100K vs 700K-2M); US Fortune 500 logo coverage limited; brand recognition outside EU thinner; and product breadth narrower than HackerOne / Bugcrowd (no separate ASM product as of early 2026).
EU-headquartered organizations and US organizations with significant EU operations needing GDPR, NIS2, and DORA-anchored testing with EU data residency and EU-fluent triage, particularly EU public-sector and EU regulated-industry buyers.
US Fortune 500 wanting the largest researcher pool (HackerOne / Bugcrowd better), US federal buyers (Synack / HackerOne better), or buyers wanting broad ASM and AI-safety product breadth (Bugcrowd / HackerOne broader).
Strengths
- Strongest EU-compliance positioning (GDPR, NIS2, DORA)
- EU data residency on platform infrastructure (Frankfurt, Paris)
- Researcher community skews European; deep EU public-sector coverage
- Mature integrations for European compliance frameworks
- $22M Series B October 2024 (Octopus Ventures)
- EU-headquartered (Antwerp, Belgium); GDPR-native
- Mature triage workflow with EU-fluent triage team
Weaknesses
- Researcher community meaningfully smaller than HackerOne / Bugcrowd
- US Fortune 500 logo coverage limited
- Brand recognition outside EU thinner
- Product breadth narrower than HackerOne / Bugcrowd (no separate ASM product)
- US federal pedigree absent (FedRAMP not applicable; EU-focused)
Pricing tiers
partial- Intigriti Disclosure (VDP)Lowest tier; vulnerability disclosure program. EUR 8K-25K/yearQuote
- Intigriti BountyManaged bug bounty. EUR 35K-150K platform fee plus bounty payoutsQuote
- Intigriti Hybrid Pentest (PTaaS)Scheduled PTaaS. EUR 15K-60K per engagementQuote
- Intigriti EnterpriseMulti-program enterprise tier with unlimited schedulingQuote
- · Platform fees separate from bounty payouts
- · Annual price increases reported at 6-10%
- · Scope-creep charges on bounded engagements
- · EUR-denominated billing creates FX exposure for US buyers
Key features
- +Intigriti Bug Bounty (managed programs)
- +Intigriti Disclosure (VDP)
- +Intigriti Hybrid Pentest (PTaaS)
- +EU data residency (Frankfurt, Paris)
- +GDPR, NIS2, DORA compliance-mapped reporting
- +EU-fluent triage team
- +Mature integrations (Jira, ServiceNow, Slack, GitHub)
- +Researcher reputation and ranking system
Cobalt
PTaaS pure-play for SOC 2 and PCI mid-market compliance work.
Cobalt is the PTaaS pure-play category leader, founded 2013 by Jacob Hansen and Christian Hansen and pivoted in 2016 from a bug-bounty platform (then "Crowdcurity") to scheduled, vetted-researcher PTaaS. The company raised $29M Series B in 2022 (Highland Europe lead), and over 2023-2025 pivoted aggressively from a developer-tooling brand to a compliance-driven sales motion targeting SOC 2 Type 2, PCI DSS, and ISO 27001 attestations. Strengths: PTaaS-focused since 2016 (the category Cobalt arguably defined commercially), strong fit for mid-market compliance work (typical engagement: 1-2 week SOC 2-quality web app test with auditor-ready report), the "Cobalt Core" vetted-researcher pool (1,000+ background-checked testers), and mature retest workflow with included free retests within 6 months. Best fit for mid-market organizations (200-2,500 employees) running compliance-driven testing cycles (SOC 2 Type 2, PCI, ISO 27001) where speed-to-engagement and auditor-acceptable reports matter more than the largest researcher pool. Trade-offs: pivot to compliance-driven sales 2023+ has dropped some of the developer-experience polish that drove early adoption; researcher pool is meaningfully smaller than HackerOne and Bugcrowd; pricing escalated meaningfully at renewal 2024-2025; and Fortune 500 logo coverage is thinner than the bug-bounty leaders.
Mid-market organizations (200-2,500 employees) running compliance-driven testing cycles (SOC 2 Type 2, PCI DSS, ISO 27001), particularly SaaS companies and fintechs needing fast, auditor-acceptable web app and API pen tests with retests included.
Fortune 500 enterprises wanting the largest researcher pool (HackerOne / Bugcrowd better), federal buyers requiring cleared researchers (Synack better), EU buyers requiring strict data residency (Intigriti / YesWeHack better), or buyers wanting fully-managed continuous bug bounty.
Strengths
- PTaaS pure-play since 2016 (category-defining commercial PTaaS)
- Strong fit for SOC 2 / PCI / ISO 27001 mid-market compliance work
- Cobalt Core vetted-researcher pool (1,000+ background-checked testers)
- Mature retest workflow (free retests within 6 months)
- Fast time-to-engagement (typically <2 weeks scheduling)
- Mature integrations (Jira, ServiceNow, Slack, GitHub)
- $29M Series B 2022 (Highland Europe)
Weaknesses
- Pivot to compliance-driven sales 2023+ has reduced developer-experience focus
- Researcher pool meaningfully smaller than HackerOne / Bugcrowd
- Fortune 500 logo coverage thinner than bug-bounty leaders
- Pricing escalation reported at renewal 2024-2025
- Limited bug-bounty product (PTaaS-focused, not bounty-first)
Pricing tiers
partial- Pentest Credit (per engagement)~$15K-$25K per web/API engagement typical$0 /mo
- Cobalt Plus (annual platform)Annual platform + multi-engagement; ~$50K-$200KQuote
- Cobalt Enterprise~$200K-$500K+ annual; unlimited schedulingQuote
- · Annual platform fees in addition to engagement credits
- · Pricing escalation reported at renewal 2024-2025
- · Scope-creep charges if testing exceeds initial agreement
- · Specialty engagements (mobile, IoT, hardware) priced separately
Key features
- +Cobalt Core vetted-researcher pool (1,000+ testers)
- +Web app, API, mobile, cloud, and network pen testing
- +Free retests within 6 months
- +Auditor-ready PDF reports (SOC 2, PCI, ISO 27001 mapped)
- +Real-time finding stream during engagement
- +Mature Jira, ServiceNow, Slack, GitHub integrations
- +Dedicated security advisor
- +Compliance-mapped reporting templates
Synack
Federal-cleared researcher PTaaS with strongest US public-sector pedigree.
Synack is the federal-cleared-researcher PTaaS, founded 2013 by Jay Kaplan and Mark Kuhr (both ex-NSA / US DoD), with a researcher pool ("Synack Red Team", or SRT) that is the most heavily vetted in the category, including US-cleared researchers eligible for DoD and federal civilian engagements. The company raised $52M Series E in 2020 led by B Capital. Strengths: the strongest US federal pedigree in the PTaaS category (deep DoD, DHS, GSA, and federal civilian engagement coverage), researcher vetting that exceeds peers (background checks, NDAs, vulnerability research test gates), and the SmartScan continuous-monitoring layer that combines automated scanning with researcher-led testing. Best fit for US federal agencies, defense industrial base contractors, and large regulated enterprises (banking, healthcare) wanting the highest researcher-trust posture. Trade-offs: Synack pivoted aggressively to compliance-driven sales in 2023 (SOC 2 / PCI / ISO 27001 positioning) as federal procurement cycles slowed, which has been received mixed by customers expecting researcher-led DoD-grade testing; SRT pool is meaningfully smaller than HackerOne or Bugcrowd researcher communities; researcher payouts are notoriously private (no public leaderboard, no reputation system), which deters some elite researchers; and pricing is opaque and meaningful at federal scale.
US federal agencies, defense industrial base contractors, large regulated enterprises (banking, healthcare, energy) wanting the highest researcher-trust posture with cleared-researcher PTaaS and continuous-monitoring SmartScan capability.
Mid-market SaaS companies (Cobalt better fit, faster time-to-engagement), Fortune 500 wanting the largest researcher pool (HackerOne better), EU buyers requiring data residency (Intigriti / YesWeHack better), or buyers prioritizing transparent researcher payouts and reputation systems.
Strengths
- Strongest US federal pedigree in PTaaS (DoD, DHS, GSA cleared work)
- Most heavily vetted researcher pool (Synack Red Team)
- Background checks, NDAs, and research test gates on all researchers
- SmartScan continuous monitoring (automated + researcher-led)
- Mature for banking, healthcare, and defense industrial base
- FedRAMP Moderate authorized
- Mature compliance reporting templates
Weaknesses
- Pivot to compliance-driven sales 2023 received mixed by federal-focused customers
- SRT researcher pool meaningfully smaller than HackerOne / Bugcrowd
- No public researcher leaderboard / reputation system deters elite researchers
- Pricing opaque and meaningful at federal scale
- Brand recognition outside federal / regulated industries thinner
Pricing tiers
opaque- Synack PTaaS (enterprise)~$100K-$500K annual platform + scope-based engagementsQuote
- Synack FederalFederal contracts; FedRAMP Moderate authorizedQuote
- SmartScan (continuous)Continuous-monitoring add-onQuote
- · Federal contracting overhead and SLA premiums
- · Scope-creep charges for unbounded testing windows
- · Annual price increases reported at renewal
- · Specialty engagements (mobile, IoT, hardware) priced separately
Key features
- +Synack Red Team (SRT) cleared-researcher pool
- +SmartScan (continuous automated + researcher monitoring)
- +Web app, API, mobile, cloud, network testing
- +Federal-cleared researcher engagements (US DoD, DHS, GSA)
- +Real-time finding stream
- +Auditor-ready and federal-acceptable reports
- +Mature retest workflow
- +Compliance frameworks (FedRAMP, FISMA, PCI, SOC 2)
Bugcrowd
Bug-bounty alternative at $1B+ valuation with HackerOne pricing-arbitrage positioning.
Bugcrowd is the longest-running HackerOne competitor in the bug-bounty market, founded 2012 by Casey Ellis in Sydney, Australia, headquartered now in San Francisco, with the platform supporting over 700,000 researchers and a Fortune 500 customer base spanning Atlassian, Mastercard, Western Union, and many others. The company raised $102M Series E in April 2024 led by General Catalyst at a reported $1B+ valuation, the largest funding round in bug-bounty history. Strengths: aggressive HackerOne pricing-arbitrage positioning (Bugcrowd has consistently undercut HackerOne on platform fees), mature triage automation via the "CrowdMatch" model that pairs researchers to specific programs based on skill match, broad product breadth (Bug Bounty, VDP, Pentest, Attack Surface Management), and a researcher community that some elite researchers prefer to HackerOne for payment transparency and program responsiveness. Best fit for Fortune 500 and large mid-market buyers wanting bug bounty at scale without locking into the HackerOne brand and pricing. Trade-offs: Fortune 500 logo coverage thinner than HackerOne (especially in US federal); researcher community smaller than HackerOne; triage quality variable per program reported on r/bugbounty; and pricing escalation reported at renewal 2024-2025 as the company pursues post-Series E margin expansion.
Fortune 500 and large mid-market enterprises (500-50,000 employees) wanting bug bounty at scale at lower platform fees than HackerOne, particularly buyers comfortable with secondary-leader brand positioning in exchange for pricing-arbitrage savings.
US federal buyers (HackerOne / Synack better federal pedigree), EU buyers requiring strict data residency (Intigriti / YesWeHack better), or SMBs without triage capacity (managed-bounty overhead meaningful).
Strengths
- $102M Series E April 2024 at $1B+ valuation (largest in bug-bounty history)
- Aggressive HackerOne pricing-arbitrage positioning
- Mature CrowdMatch researcher-to-program pairing
- Broad product breadth (Bug Bounty + VDP + Pentest + ASM)
- 700,000+ researchers in community
- Strong on Atlassian, Mastercard, Western Union, and similar Fortune 500 logos
- Mature integrations (Jira, ServiceNow, Slack)
Weaknesses
- Fortune 500 logo coverage thinner than HackerOne (especially US federal)
- Researcher community smaller than HackerOne (~700K vs ~2M)
- Triage quality variable per program (reported on r/bugbounty)
- Pricing escalation reported at renewal 2024-2025
- Less brand recognition than HackerOne on board / procurement page
Pricing tiers
opaque- Bugcrowd Disclosure (VDP)Lowest tier; vulnerability disclosure program. ~$10K-$30K/yearQuote
- Bugcrowd Bug BountyManaged bug-bounty program. ~$40K-$180K platform fee plus bounty payoutsQuote
- Bugcrowd PentestScheduled PTaaS engagements. ~$18K-$70K per engagementQuote
- Bugcrowd ASMAttack surface managementQuote
- Bugcrowd AI SafetyAI / LLM red-team servicesQuote
- · Platform fees separate from bounty payouts
- · Pricing escalation reported at renewal 2024-2025
- · Triage service fees on top of platform fees
- · Per-asset pricing on ASM module
Key features
- +Bugcrowd Bug Bounty (managed programs)
- +Bugcrowd Disclosure (VDP)
- +Bugcrowd Pentest (PTaaS, scheduled)
- +Bugcrowd ASM (attack surface management)
- +Bugcrowd AI Safety (LLM red-team)
- +CrowdMatch researcher-to-program pairing
- +Mature triage automation
- +Integrations (Jira, ServiceNow, Slack, GitHub)
Trustwave PTaaS
Legacy-MSSP heritage PTaaS; acquisition uncertainty material after Singtel sale.
Trustwave is one of the oldest commercial penetration-testing and managed-security-services brands, founded 1995 in Chicago, with a legacy MSSP heritage anchored on SpiderLabs (the internal research and pen-testing team) and broad service catalog spanning managed detection and response, threat hunting, digital forensics, and PTaaS. The ownership history is the most-cited concern: Singtel acquired Trustwave in 2015 for $810M, then MacAndrews and Forbes (the Ron Perelman holding company) acquired Trustwave from Singtel in September 2024 at a reported $300M-$400M speculation range, a meaningful discount to the original purchase that suggests value impairment over the Singtel ownership period. Strengths: SpiderLabs has a long, credible research pedigree and continues to publish notable threat-intelligence work, broad service catalog allows bundling PTaaS with MDR and DFIR (a one-stop-shop for some buyers), and PCI DSS / PCI Forensic Investigator (PFI) credentials are strong in payment-card industries. Best fit for large regulated enterprises (5,000+ employees) wanting bundled MSSP services with PTaaS included, particularly PCI-heavy buyers. Trade-offs: post-MacAndrews and Forbes acquisition (September 2024) customer-support quality concerns have surfaced in renewal conversations and r/cybersecurity threads, legacy MSSP heritage means the PTaaS product is less product-led than Cobalt / HackerOne PTaaS (more services-led), pricing is opaque and meaningful at enterprise scale, and brand momentum has been flat-to-down over the Singtel-and-now-PE ownership cycle.
Large regulated enterprises (5,000+ employees) wanting bundled MSSP services (MDR + DFIR + PTaaS) under a single contract, particularly PCI DSS-heavy buyers in payment-card industries.
Mid-market SaaS companies (Cobalt better fit), US federal buyers (Synack better federal pedigree), EU buyers requiring strict data residency (Intigriti / YesWeHack better), or buyers concerned about acquisition uncertainty and post-PE customer-support quality.
Strengths
- SpiderLabs research and pen-testing team has long credible pedigree
- Broad MSSP service catalog (MDR + DFIR + PTaaS bundling)
- Strong PCI DSS and PCI Forensic Investigator (PFI) credentials
- Built for large regulated enterprises (5,000+ employees)
- Mature for payment-card industries
- Long delivery history since 1995
Weaknesses
- MacAndrews and Forbes acquisition Sept 2024 at reported $300M-$400M (vs Singtel $810M 2015); value impairment under Singtel ownership
- Customer-support quality concerns post-acquisition
- PTaaS product less product-led than Cobalt / HackerOne PTaaS (more services-led)
- Pricing opaque and meaningful at enterprise scale
- Brand momentum flat-to-down over multi-acquisition cycle
Pricing tiers
opaque- Trustwave PTaaS (per engagement)~$25K-$100K per engagement typicalQuote
- Trustwave MSSP + PTaaS bundleBundled MDR + PTaaS + DFIR; custom enterprise pricingQuote
- Trustwave PCI servicesPCI-specific testing and PFI servicesQuote
- · Custom contracts with limited published pricing
- · Scope-creep charges common in services-led model
- · Bundled MSSP commitments required for best PTaaS pricing
- · Specialty engagements priced separately
Key features
- +SpiderLabs pen-testing team
- +Web app, API, mobile, network, internal pen testing
- +PCI DSS and PFI services
- +Bundled MSSP services (MDR, DFIR, threat hunting)
- +Compliance-mapped reporting (PCI, HIPAA, SOC 2)
- +Mature retest workflow
- +Threat intelligence integration (SpiderLabs research)
Rapid7 PTaaS
PTaaS leveraging Insight platform and Velociraptor managed-services capability.
Rapid7 PTaaS is the penetration-testing-as-a-service offering from Rapid7 (NASDAQ:RPD), built on the Rapid7 Insight platform and meaningfully expanded with the May 2024 acquisition of Velociraptor (the open-source DFIR project) and the underlying managed-services capability. Strengths: tight integration with the Insight platform (InsightVM, InsightIDR, InsightAppSec) creates a unified view of pen-test findings alongside scanner output and SIEM events, mature managed-services delivery muscle (Rapid7 has run managed services for years and the Velociraptor acquisition strengthened DFIR depth), and public-company financial transparency. Best fit for organizations already running the Rapid7 Insight platform who want PTaaS integrated into the existing security stack rather than a separate point solution. Trade-offs: outside the Rapid7 Insight ecosystem the PTaaS offering is less compelling than Cobalt / HackerOne PTaaS / Synack on standalone merit; Rapid7 revenue growth has been under pressure 2024-2025 (activist investor Jana Partners disclosed a stake in 2024 and pushed for a strategic review); per-engagement pricing meaningful at enterprise scale; and the PTaaS product is less mature on researcher-led testing than the dedicated PTaaS vendors.
Mid-market and enterprise (500-25,000 employees) already running the Rapid7 Insight platform (InsightVM, InsightIDR, InsightAppSec) who want PTaaS integrated into the existing security stack rather than a separate point solution.
Non-Rapid7 stacks (Cobalt / HackerOne PTaaS / Synack better as standalone), US federal buyers (Synack better federal pedigree), EU buyers requiring strict data residency (Intigriti / YesWeHack better), or buyers concerned about Rapid7 vendor stability post-Jana Partners review.
Strengths
- Tight integration with Rapid7 Insight platform (InsightVM, InsightIDR, InsightAppSec)
- Velociraptor acquisition May 2024 strengthened DFIR and managed-services depth
- Mature managed-services delivery muscle
- Public company financial transparency
- Best for Rapid7 Insight-anchored security stacks
- Compliance-mapped reporting (SOC 2, PCI, HIPAA)
- Mature retest workflow
Weaknesses
- Outside Rapid7 Insight ecosystem less compelling than Cobalt / HackerOne PTaaS / Synack
- Rapid7 revenue growth under pressure 2024-2025; Jana Partners activist stake disclosed
- Per-engagement pricing meaningful at enterprise scale
- PTaaS product less mature on researcher-led testing than dedicated PTaaS vendors
- Innovation pace slower than Cobalt on PTaaS-specific workflow
Pricing tiers
partial- Rapid7 PTaaS (per engagement)~$18K-$80K per engagement typicalQuote
- Rapid7 PTaaS + Insight bundleBundled with InsightVM / InsightIDR; custom pricingQuote
- Rapid7 MDR + PTaaSBundled managed services; enterprise pricingQuote
- · Bundled Insight platform commitments for best PTaaS pricing
- · Scope-creep charges on bounded engagements
- · Annual price increases reported
- · Specialty engagements (mobile, IoT) priced separately
Key features
- +Web app, API, mobile, network, internal pen testing
- +Insight platform integration (InsightVM, InsightIDR, InsightAppSec)
- +Velociraptor DFIR capability
- +Managed services delivery
- +Compliance-mapped reporting
- +Mature retest workflow
- +Threat intelligence (Rapid7 Labs)
Nettitude
UK + US-based pen testing with CREST, CHECK, and STAR-FS certifications under Lloyds Register.
Nettitude is the UK-headquartered pen-testing and PTaaS firm acquired by Lloyds Register (the marine and industrial classification society) in 2018, with delivery teams in the UK and US, and a customer base concentrated in UK financial services, EU regulated industries, and US enterprises with UK operations. Strengths: an unusually deep portfolio of UK and EU regulator-recognized certifications (CREST member firm, CHECK Green Light status for UK government work, STAR-FS for Bank of England intelligence-led pen testing, PCI Qualified Security Assessor), the Lloyds Register backing provides unusual long-term ownership stability in a category dominated by VC-backed and PE-owned vendors, and a strong pedigree in TIBER-EU and TIBER-style threat-led pen testing for financial regulators. Best fit for UK and EU financial services, EU regulated industries, and US enterprises with UK operations needing CREST / CHECK / STAR-FS-certified testing or TIBER-EU intelligence-led red teaming. Trade-offs: researcher-led delivery model rather than crowdsourced (smaller delivery surface than HackerOne / Bugcrowd); product/platform layer is less mature than Cobalt / HackerOne PTaaS (services-led, not product-led); pricing opaque; brand recognition outside UK / EU regulated industries thinner; and US logo coverage limited.
UK and EU financial services (particularly Bank of England-regulated firms requiring STAR-FS), EU regulated industries needing TIBER-EU threat-led red teaming, and US enterprises with UK operations needing CREST / CHECK-certified testing under Lloyds Register backing.
US Fortune 500 wanting the largest researcher pool (HackerOne / Bugcrowd better), US federal buyers (Synack better federal pedigree), mid-market SaaS companies (Cobalt better fit), or buyers prioritizing product-led platform workflow over services-led delivery.
Strengths
- CREST member firm; CHECK Green Light; STAR-FS for Bank of England
- Lloyds Register backing provides long-term ownership stability
- Strong TIBER-EU and TIBER-style threat-led red team pedigree
- UK and US delivery teams
- Mature PCI Qualified Security Assessor capability
- Built for UK financial services and EU regulated industries
- Long delivery history since 2003
Weaknesses
- Services-led delivery; smaller surface than crowdsourced platforms
- Product / platform layer less mature than Cobalt / HackerOne PTaaS
- Pricing opaque
- Brand recognition outside UK / EU regulated industries thinner
- US Fortune 500 logo coverage limited
Pricing tiers
opaque- Nettitude PTaaS (per engagement)~GBP 18K-75K per engagement typicalQuote
- Nettitude TIBER-EU red teamThreat-led red team; GBP 100K-400K per programQuote
- Nettitude STAR-FSBank of England intelligence-led pen testQuote
- Nettitude MSSP + PTaaSBundled MSSP servicesQuote
- · Custom services-led contracts with limited published pricing
- · GBP-denominated billing creates FX exposure for US buyers
- · Scope-creep charges common in services-led model
- · Specialty engagements (TIBER, STAR-FS) priced separately
Key features
- +Web app, API, mobile, network, internal pen testing
- +TIBER-EU and STAR-FS threat-led red teaming
- +CREST, CHECK, PCI QSA credentials
- +Lloyds Register backing
- +Compliance-mapped reporting (PCI, SOC 2, ISO 27001)
- +Mature retest workflow
- +Threat intelligence capability
Detectify
Swedish web-app and external attack surface monitoring with crowdsourced signature library.
Detectify is the Swedish web-application and external attack surface monitoring platform, founded 2013 in Stockholm by former bug-bounty researchers, with a customer base concentrated in EU and US SaaS companies and security-conscious mid-market organizations. Strengths: a crowdsourced researcher-fed signature library (Crowdsource program pays researchers for novel vulnerability modules that then get added to the scanner, this is the closest the category has to PTaaS-meets-DAST), strong fit for continuous external monitoring of web-facing assets (Surface Monitoring and Application Scanning products), EU data residency on platform infrastructure (Stockholm), and a developer-friendly UX that engineering teams adopt. Best fit for cloud-native SaaS companies and security-conscious mid-market organizations (100-2,500 employees) needing continuous external web-app and surface monitoring rather than scheduled point-in-time pen tests. Trade-offs: this is meaningfully more of a DAST + EASM product than a true PTaaS (no scheduled human-led pen tests, no researcher-led engagement model); product breadth narrower than HackerOne / Bugcrowd / Cobalt; researcher pool meaningfully smaller; brand recognition in US Fortune 500 thinner; and the position at the edge of the PTaaS category means buyers should be clear-eyed about what they are buying (continuous scanning enriched by researcher-contributed signatures, not human-delivered pen tests).
Cloud-native SaaS companies and security-conscious mid-market organizations (100-2,500 employees) needing continuous external web-app and surface monitoring enriched by researcher-contributed signatures, particularly EU-headquartered or EU-operating companies.
Buyers wanting true scheduled human-led pen tests (Cobalt / HackerOne PTaaS / Synack better), Fortune 500 wanting the largest researcher pool (HackerOne / Bugcrowd better), US federal buyers (Synack better federal pedigree), or buyers needing broad PTaaS product breadth (Bugcrowd / HackerOne broader).
Strengths
- Crowdsource program pays researchers for novel vulnerability modules
- Strong continuous external monitoring (Surface Monitoring, Application Scanning)
- EU data residency (Stockholm-based platform infrastructure)
- Developer-friendly UX engineering teams adopt
- Mature for cloud-native SaaS and mid-market
- GDPR-native handling
- Fast deployment and time-to-value
Weaknesses
- Meaningfully more DAST + EASM than true PTaaS (no human-led pen tests)
- Product breadth narrower than HackerOne / Bugcrowd / Cobalt
- Researcher pool meaningfully smaller
- Brand recognition in US Fortune 500 thinner
- Edge-of-category positioning requires clear-eyed buying
Pricing tiers
public- Surface MonitoringPer domain per month; external attack surface monitoring$89 /mo
- Application ScanningPer application per month; deep web-app scanning$289 /mo
- Surface Monitoring + Application Scanning bundleCustom; bundled at discountQuote
- EnterpriseCustom; multi-asset, dedicated CSMQuote
- · Per-domain and per-application pricing escalates with asset sprawl
- · Annual price increases reported at 5-10%
- · Specialty modules priced separately
- · Enterprise contracting required at multi-asset scale
Key features
- +Surface Monitoring (external attack surface)
- +Application Scanning (deep web-app scanning)
- +Crowdsource program (researcher-contributed vulnerability modules)
- +Continuous scanning (not scheduled point-in-time)
- +EU data residency (Stockholm)
- +GDPR-native handling
- +Mature integrations (Jira, Slack, GitHub)
- +Developer-friendly UX
Frequently asked questions
The questions buyers actually ask before they sign.
Why is YesWeHack ranked #1 for France?
What is ANSSI PASSI and when is it required?
YesWeHack vs Intigriti for a French Series B fintech?
PTaaS vs traditional pen test, which one?
Vetted-researcher PTaaS vs crowd, which model?
Bug bounty vs PTaaS, what is the difference?
How do vulnerability-disclosure controversies affect vendor selection?
When do federal-cleared researchers matter?
How does the EU compliance angle change vendor selection?
How do AI-augmented PTaaS and AI red-teaming change the category?
How much should I budget for PTaaS?
How long does PTaaS deployment take?
How does this differ from your VM and CSPM rankings?
Final word
Looking at a different market? See the global Penetration Testing as a Service (PTaaS) ranking, or pick another country at the top of this page.
Last updated 2026-05-19. Local pricing reverified quarterly. Found something inaccurate? Tell us.