United Kingdom verdict (TL;DR)
Verified 2026-05-19The UK has the most regulated and certification-driven PTaaS market in Europe. Nettitude (Cheltenham-headquartered, Lloyds Register-owned) is the UK-built champion: CREST, CHECK, and STAR-FS certified, with the deepest UK regulated-industry credentials. HackerOne and Bugcrowd are both active in UK fintech and enterprise bug bounty. Intigriti (Belgian, EU-headquartered) has significant UK fintech adoption as a GDPR-compliant alternative. Detectify has growing UK adoption for continuous web-app testing. UK-specific compliance: NCSC Cyber Essentials and Cyber Essentials Plus are mandatory for UK government suppliers and recommended baseline across UK enterprise; FCA Operational Resilience (PS21/3) requires UK financial firms to map and stress-test operational dependencies including IT systems; CBEST (Bank of England intelligence-led pen testing) is required for UK financial market infrastructure (FMIs) and tier-1 banks and is a distinct CREST-certified engagement framework unavailable from most US-headquartered PTaaS vendors.
Picks for United Kingdom
- UK enterprise bug bounty (fintech, FTSE): hackerone Active UK go-to-market, GBP billing available. Used by UK fintech (Monzo-tier) and FTSE enterprise. Deepest researcher pool for UK-facing web and mobile applications.
- UK CREST, CHECK, and STAR-FS certified PTaaS: nettitude UK-headquartered (Cheltenham), Lloyds Register-owned. CREST, CHECK, and STAR-FS certified. The definitive UK-built choice for UK regulated industry, financial services, and government pen testing.
- UK fintech and EU-compliant bug bounty: intigriti Belgian, EU-headquartered, UK GDPR-friendly. $22M Series B October 2024. Strong UK fintech adoption as GDPR-native HackerOne alternative. GBP billing available.
- UK continuous web-app and EASM testing: detectify Swedish-built; growing UK adoption at London-tier SaaS and fintech. Best for continuous web-app surface monitoring between point-in-time CREST engagements.
- UK mid-market SOC 2 and ISO 27001 PTaaS: cobalt-ptaas Fast time-to-engagement for UK SaaS exporters needing SOC 2 and ISO 27001 pen test reports. GBP equivalent pricing via UK billing.
How the penetration testing as a service (ptaas) market looks in United Kingdom
The UK PTaaS market is distinctive for its depth of certification-backed regulation. CREST (Council for Registered Ethical Security Testers) is the UK-origin body that accredits pen testing firms; CREST-accredited engagements are required or strongly preferred by UK financial services regulators (FCA, Bank of England), UK government departments (Cabinet Office, NCSC), UK defence suppliers (DSTL), and UK regulated utilities. CHECK (Communications-Electronics Security Group Assured Service for HMG systems) is required for UK government classified system pen testing. STAR-FS (Simulated Target Attack and Response - Financial Services) is the CREST-accredited framework for intelligence-led pen testing of UK financial sector firms. CBEST (Bank of England) is a restricted CREST-certified intelligence-led pen testing framework for UK tier-1 banks, building societies, and financial market infrastructure.
Most US-headquartered PTaaS vendors (HackerOne, Bugcrowd, Cobalt, Synack) do not hold CREST, CHECK, or STAR-FS accreditation directly; they may partner with CREST-accredited UK firms for UK regulated-sector work. Nettitude (Cheltenham) is the most credible full-service PTaaS vendor with all three certifications plus CBEST delivery capability. NCC Group (Manchester) and Pen Test Partners (Buckinghamshire) are other CREST-CHECK-STAR-FS UK firms outside our top 10 scope.
FCA Operational Resilience (PS21/3, full compliance required March 2025) requires UK FCA-regulated firms to identify important business services, map technology dependencies, set impact tolerances, and conduct scenario testing. Penetration testing of systems supporting important business services is a natural component of FCA operational resilience testing; CREST-certified PTaaS providers (Nettitude) are the right fit for FCA-regulated firms running formal operational resilience programs.
CREST accreditation: UK financial services, government, and regulated-sector buyers should require CREST-accredited pen testers for all formal engagements; Nettitude is CREST-accredited; US vendors (HackerOne, Cobalt, Synack) are not CREST-accredited directly and typically partner with UK CREST firms for regulated-sector work. CHECK: UK government classified systems pen testing requires CHECK-certified testers; only NCSC-listed CHECK service providers may conduct CHECK engagements; verify CHECK status on the NCSC assured service provider list before engaging for UK government work. CBEST: Bank of England intelligence-led pen testing framework for UK tier-1 financial firms; requires CREST CBEST-certified providers; contact CREST or Bank of England CBEST programme office for approved provider list. UK GDPR (ICO): pen testing generates vulnerability data that constitutes personal data in some contexts (user account vulnerabilities, personally identifiable system data); pen testing firms processing UK personal data must have UK GDPR-compliant DPAs; verify UK data residency for report storage. Cyber Essentials Plus: UK government suppliers must hold Cyber Essentials certification; Cyber Essentials Plus (independently assessed) requires a vulnerability scan and involves technical controls verification; it is not a full pen test, but Nettitude and other CREST firms can conduct both CE+ and follow-on pen testing.
Quick comparison, ranked for United Kingdom
| Product | Best for | Starts at | 10-emp/mo* | Pricing | G2 | Geo |
|---|---|---|---|---|---|---|
| 1 HackerOne | Mid-market to Fortune 500 enterprises | Quote | - | 4.4 | Global; strongest in US, UK, EU, AU | |
| 2 Cobalt | SaaS, fintech, and mid-market compliance-driven security programs | $0 | $0 | 4.6 | Global; strongest in US, EU, UK | |
| 3 Synack | US federal, defense industrial base, and regulated enterprises | Quote | - | 4.5 | Global; strongest in US federal and DoD; expanding into EU and AU | |
| 4 Bugcrowd | Mid-market to Fortune 500 enterprises | Quote | - | 4.4 | Global; strongest in US, AU, UK, EU | |
| 5 Intigriti | EU-headquartered and EU-operating organizations | Quote | - | 4.7 | EU primary; UK and US growing | |
| 6 YesWeHack | French and EU-regulated organizations, EU public-sector | Quote | - | 4.6 | France primary; EU and Francophone Africa strong; UK growing | |
| 7 Trustwave PTaaS | Large regulated enterprises and PCI-heavy industries | Quote | - | 4.0 | Global; strongest in US, UK, EU, AU | |
| 8 Rapid7 PTaaS | Rapid7 Insight-anchored mid-market and enterprise | Quote | - | 4.3 | Global; strongest in US, UK, EU, AU | |
| 9 Nettitude | UK and EU financial services, regulated industries, US enterprises with UK operations | Quote | - | 4.5 | UK primary; US delivery; EU regulated industries | |
| 10 Detectify | Cloud-native SaaS and security-conscious mid-market | $89 | $89 | 4.5 | EU primary; US and UK growing |
*10-employee monthly cost = base fee + (per-employee × 10) using the lowest published tier. For opaque-pricing vendors, no value is shown.
What buyers in United Kingdom actually pay
Median annual deal size by employee band, in GBP. Crowdsourced from anonymized buyer disclosures.
| Product | Employee band | Median annual (GBP) | Sample | Notes |
|---|---|---|---|---|
| HackerOne | UK enterprise bug bounty | £95,000 | 38 | HackerOne UK; GBP equivalent; bounty payouts separate |
| Nettitude | UK regulated industry PTaaS | £48,000 | 24 | Nettitude annual engagement; GBP-billed |
| Intigriti | UK fintech bug bounty | £52,000 | 31 | Intigriti UK; GBP billing available |
| Cobalt | UK SOC 2 / ISO 27001 mid-market | £21,000 | 44 | Cobalt PTaaS UK; GBP equivalent |
| Detectify | UK web-app continuous monitoring | £18,000 | 28 | Detectify UK annual; GBP equivalent |
United Kingdom-built or United Kingdom-strong vendors worth knowing
Not yet ranked in our global top 10, but credible options for United Kingdom buyers and worth a shortlist.
Nettitude
Visit ↗Cheltenham-headquartered UK PTaaS firm, Lloyds Register-owned. CREST, CHECK, and STAR-FS certified. CBEST delivery capability for UK tier-1 financial firms. The definitive UK-built PTaaS choice for regulated industry, financial services, and government.
NCC Group
Visit ↗Manchester-headquartered global cybersecurity firm. CREST and CHECK accredited. Strong UK government and FTSE enterprise pen testing heritage. Listed on London Stock Exchange. Broad service catalog beyond PTaaS.
Pen Test Partners
Visit ↗Buckinghamshire-founded UK pen testing firm. Strong IoT, OT, and maritime security pen testing depth alongside traditional web and network. CREST accredited. Respected in UK security community for research-led methodology.
All 10, ranked for United Kingdom
Same intelligence as the global ranking, vendor trust, review patterns, verified pricing, compliance, reordered for the United Kingdom market.
HackerOne
Bug-bounty market leader with largest researcher pool and Fortune 500 logo coverage.
HackerOne is the bug-bounty market leader, founded 2012 by Jobert Abma, Michiel Prins, Alex Rice, and Merijn Terheggen, with roughly 2M+ registered researchers and the deepest Fortune 500 logo coverage in the category (US DoD, Goldman Sachs, GitHub, Uber, GitLab, and hundreds more). Reported revenue reached approximately $140M in 2023, and IPO speculation has persisted through 2024 and 2025 as the company crossed the typical S-1 threshold. Strengths: the largest researcher community in the world, mature triage and disclosure workflows (HackerOne Response, HackerOne Bounty, HackerOne Pentest), and a strong product platform that runs everything from vulnerability disclosure programs (VDP) to fully-managed bug bounty to scheduled PTaaS engagements. Best fit for Fortune 500 and large public-sector buyers who need the deepest researcher pool and the most credible bug-bounty brand on the procurement page. Trade-offs: the 2022 insider data-leak case (in which a HackerOne security analyst exfiltrated customer vulnerability reports and used them to extort companies for bounty payouts) remains the most-cited trust event in vendor selection conversations, internal access controls were tightened post-incident but the brand impact persists; pricing meaningful at scale (program-management fees on top of bounty payouts); and disclosure-policy controversies (vendor delays, gag clauses, researcher payment disputes) periodically surface on r/bugbounty and security Twitter.
Fortune 500 enterprises, US federal and large public-sector buyers, and mature security programs (5,000+ employees) wanting the deepest researcher pool, the strongest brand for board and auditor presentations, and a unified platform spanning VDP, bug bounty, and PTaaS.
EU-regulated buyers requiring strict data residency (Intigriti and YesWeHack better), SMBs without a triage capability (lower-volume disclosure platforms cheaper), or buyers explicitly wanting to avoid the HackerOne brand after the 2022 insider case.
Strengths
- Largest researcher community in the world (~2M+ registered)
- Deepest Fortune 500 and US public-sector logo coverage
- Mature workflows across VDP, Bounty, Pentest, and Response
- Strong brand on procurement page (auditor and board recognition)
- Reported revenue ~$140M in 2023; IPO speculation 2024-2025
- Mature API and integrations (Jira, ServiceNow, Slack, GitHub)
- Mature triage team for high-volume bug-bounty programs
Weaknesses
- 2022 insider data-leak case (analyst exfiltrating customer reports) remains most-cited trust event
- Program management fees meaningful on top of bounty payouts
- Disclosure-policy controversies (vendor delays, gag clauses, payment disputes) surface periodically
- Pricing escalation reported by long-standing customers at renewal
- Researcher payment disputes occasionally public on r/bugbounty and Twitter
Pricing tiers
opaque- HackerOne Response (VDP)Lowest tier; vulnerability disclosure program management. ~$10K-$40K/year typical.Quote
- HackerOne BountyManaged bug-bounty program. ~$50K-$200K platform fee plus bounty payouts.Quote
- HackerOne PentestScheduled PTaaS engagements. ~$20K-$80K per engagement typical.Quote
- HackerOne Assets (ASM)Attack surface management add-on.Quote
- HackerOne Code (AI/LLM testing)AI red-team services; newer.Quote
- · Platform fees separate from bounty payouts
- · Annual price increases of 8-15% reported by renewing customers
- · Triage service fees on top of platform fees
- · Per-asset pricing on Assets module can escalate
Key features
- +HackerOne Response (VDP management)
- +HackerOne Bounty (managed bug-bounty programs)
- +HackerOne Pentest (PTaaS, scheduled engagements)
- +HackerOne Assets (attack surface management)
- +HackerOne Code (AI / LLM testing services)
- +Mature triage team
- +Integrations (Jira, ServiceNow, Slack, GitHub)
- +Researcher reputation and ranking system
Cobalt
PTaaS pure-play for SOC 2 and PCI mid-market compliance work.
Cobalt is the PTaaS pure-play category leader, founded 2013 by Jacob Hansen and Christian Hansen and pivoted in 2016 from a bug-bounty platform (then "Crowdcurity") to scheduled, vetted-researcher PTaaS. The company raised $29M Series B in 2022 (Highland Europe lead), and over 2023-2025 pivoted aggressively from a developer-tooling brand to a compliance-driven sales motion targeting SOC 2 Type 2, PCI DSS, and ISO 27001 attestations. Strengths: PTaaS-focused since 2016 (the category Cobalt arguably defined commercially), strong fit for mid-market compliance work (typical engagement: 1-2 week SOC 2-quality web app test with auditor-ready report), the "Cobalt Core" vetted-researcher pool (1,000+ background-checked testers), and mature retest workflow with included free retests within 6 months. Best fit for mid-market organizations (200-2,500 employees) running compliance-driven testing cycles (SOC 2 Type 2, PCI, ISO 27001) where speed-to-engagement and auditor-acceptable reports matter more than the largest researcher pool. Trade-offs: pivot to compliance-driven sales 2023+ has dropped some of the developer-experience polish that drove early adoption; researcher pool is meaningfully smaller than HackerOne and Bugcrowd; pricing escalated meaningfully at renewal 2024-2025; and Fortune 500 logo coverage is thinner than the bug-bounty leaders.
Mid-market organizations (200-2,500 employees) running compliance-driven testing cycles (SOC 2 Type 2, PCI DSS, ISO 27001), particularly SaaS companies and fintechs needing fast, auditor-acceptable web app and API pen tests with retests included.
Fortune 500 enterprises wanting the largest researcher pool (HackerOne / Bugcrowd better), federal buyers requiring cleared researchers (Synack better), EU buyers requiring strict data residency (Intigriti / YesWeHack better), or buyers wanting fully-managed continuous bug bounty.
Strengths
- PTaaS pure-play since 2016 (category-defining commercial PTaaS)
- Strong fit for SOC 2 / PCI / ISO 27001 mid-market compliance work
- Cobalt Core vetted-researcher pool (1,000+ background-checked testers)
- Mature retest workflow (free retests within 6 months)
- Fast time-to-engagement (typically <2 weeks scheduling)
- Mature integrations (Jira, ServiceNow, Slack, GitHub)
- $29M Series B 2022 (Highland Europe)
Weaknesses
- Pivot to compliance-driven sales 2023+ has reduced developer-experience focus
- Researcher pool meaningfully smaller than HackerOne / Bugcrowd
- Fortune 500 logo coverage thinner than bug-bounty leaders
- Pricing escalation reported at renewal 2024-2025
- Limited bug-bounty product (PTaaS-focused, not bounty-first)
Pricing tiers
partial- Pentest Credit (per engagement)~$15K-$25K per web/API engagement typical$0 /mo
- Cobalt Plus (annual platform)Annual platform + multi-engagement; ~$50K-$200KQuote
- Cobalt Enterprise~$200K-$500K+ annual; unlimited schedulingQuote
- · Annual platform fees in addition to engagement credits
- · Pricing escalation reported at renewal 2024-2025
- · Scope-creep charges if testing exceeds initial agreement
- · Specialty engagements (mobile, IoT, hardware) priced separately
Key features
- +Cobalt Core vetted-researcher pool (1,000+ testers)
- +Web app, API, mobile, cloud, and network pen testing
- +Free retests within 6 months
- +Auditor-ready PDF reports (SOC 2, PCI, ISO 27001 mapped)
- +Real-time finding stream during engagement
- +Mature Jira, ServiceNow, Slack, GitHub integrations
- +Dedicated security advisor
- +Compliance-mapped reporting templates
Synack
Federal-cleared researcher PTaaS with strongest US public-sector pedigree.
Synack is the federal-cleared-researcher PTaaS, founded 2013 by Jay Kaplan and Mark Kuhr (both ex-NSA / US DoD), with a researcher pool ("Synack Red Team", or SRT) that is the most heavily vetted in the category, including US-cleared researchers eligible for DoD and federal civilian engagements. The company raised $52M Series E in 2020 led by B Capital. Strengths: the strongest US federal pedigree in the PTaaS category (deep DoD, DHS, GSA, and federal civilian engagement coverage), researcher vetting that exceeds peers (background checks, NDAs, vulnerability research test gates), and the SmartScan continuous-monitoring layer that combines automated scanning with researcher-led testing. Best fit for US federal agencies, defense industrial base contractors, and large regulated enterprises (banking, healthcare) wanting the highest researcher-trust posture. Trade-offs: Synack pivoted aggressively to compliance-driven sales in 2023 (SOC 2 / PCI / ISO 27001 positioning) as federal procurement cycles slowed, which has been received mixed by customers expecting researcher-led DoD-grade testing; SRT pool is meaningfully smaller than HackerOne or Bugcrowd researcher communities; researcher payouts are notoriously private (no public leaderboard, no reputation system), which deters some elite researchers; and pricing is opaque and meaningful at federal scale.
US federal agencies, defense industrial base contractors, large regulated enterprises (banking, healthcare, energy) wanting the highest researcher-trust posture with cleared-researcher PTaaS and continuous-monitoring SmartScan capability.
Mid-market SaaS companies (Cobalt better fit, faster time-to-engagement), Fortune 500 wanting the largest researcher pool (HackerOne better), EU buyers requiring data residency (Intigriti / YesWeHack better), or buyers prioritizing transparent researcher payouts and reputation systems.
Strengths
- Strongest US federal pedigree in PTaaS (DoD, DHS, GSA cleared work)
- Most heavily vetted researcher pool (Synack Red Team)
- Background checks, NDAs, and research test gates on all researchers
- SmartScan continuous monitoring (automated + researcher-led)
- Mature for banking, healthcare, and defense industrial base
- FedRAMP Moderate authorized
- Mature compliance reporting templates
Weaknesses
- Pivot to compliance-driven sales 2023 received mixed by federal-focused customers
- SRT researcher pool meaningfully smaller than HackerOne / Bugcrowd
- No public researcher leaderboard / reputation system deters elite researchers
- Pricing opaque and meaningful at federal scale
- Brand recognition outside federal / regulated industries thinner
Pricing tiers
opaque- Synack PTaaS (enterprise)~$100K-$500K annual platform + scope-based engagementsQuote
- Synack FederalFederal contracts; FedRAMP Moderate authorizedQuote
- SmartScan (continuous)Continuous-monitoring add-onQuote
- · Federal contracting overhead and SLA premiums
- · Scope-creep charges for unbounded testing windows
- · Annual price increases reported at renewal
- · Specialty engagements (mobile, IoT, hardware) priced separately
Key features
- +Synack Red Team (SRT) cleared-researcher pool
- +SmartScan (continuous automated + researcher monitoring)
- +Web app, API, mobile, cloud, network testing
- +Federal-cleared researcher engagements (US DoD, DHS, GSA)
- +Real-time finding stream
- +Auditor-ready and federal-acceptable reports
- +Mature retest workflow
- +Compliance frameworks (FedRAMP, FISMA, PCI, SOC 2)
Bugcrowd
Bug-bounty alternative at $1B+ valuation with HackerOne pricing-arbitrage positioning.
Bugcrowd is the longest-running HackerOne competitor in the bug-bounty market, founded 2012 by Casey Ellis in Sydney, Australia, headquartered now in San Francisco, with the platform supporting over 700,000 researchers and a Fortune 500 customer base spanning Atlassian, Mastercard, Western Union, and many others. The company raised $102M Series E in April 2024 led by General Catalyst at a reported $1B+ valuation, the largest funding round in bug-bounty history. Strengths: aggressive HackerOne pricing-arbitrage positioning (Bugcrowd has consistently undercut HackerOne on platform fees), mature triage automation via the "CrowdMatch" model that pairs researchers to specific programs based on skill match, broad product breadth (Bug Bounty, VDP, Pentest, Attack Surface Management), and a researcher community that some elite researchers prefer to HackerOne for payment transparency and program responsiveness. Best fit for Fortune 500 and large mid-market buyers wanting bug bounty at scale without locking into the HackerOne brand and pricing. Trade-offs: Fortune 500 logo coverage thinner than HackerOne (especially in US federal); researcher community smaller than HackerOne; triage quality variable per program reported on r/bugbounty; and pricing escalation reported at renewal 2024-2025 as the company pursues post-Series E margin expansion.
Fortune 500 and large mid-market enterprises (500-50,000 employees) wanting bug bounty at scale at lower platform fees than HackerOne, particularly buyers comfortable with secondary-leader brand positioning in exchange for pricing-arbitrage savings.
US federal buyers (HackerOne / Synack better federal pedigree), EU buyers requiring strict data residency (Intigriti / YesWeHack better), or SMBs without triage capacity (managed-bounty overhead meaningful).
Strengths
- $102M Series E April 2024 at $1B+ valuation (largest in bug-bounty history)
- Aggressive HackerOne pricing-arbitrage positioning
- Mature CrowdMatch researcher-to-program pairing
- Broad product breadth (Bug Bounty + VDP + Pentest + ASM)
- 700,000+ researchers in community
- Strong on Atlassian, Mastercard, Western Union, and similar Fortune 500 logos
- Mature integrations (Jira, ServiceNow, Slack)
Weaknesses
- Fortune 500 logo coverage thinner than HackerOne (especially US federal)
- Researcher community smaller than HackerOne (~700K vs ~2M)
- Triage quality variable per program (reported on r/bugbounty)
- Pricing escalation reported at renewal 2024-2025
- Less brand recognition than HackerOne on board / procurement page
Pricing tiers
opaque- Bugcrowd Disclosure (VDP)Lowest tier; vulnerability disclosure program. ~$10K-$30K/yearQuote
- Bugcrowd Bug BountyManaged bug-bounty program. ~$40K-$180K platform fee plus bounty payoutsQuote
- Bugcrowd PentestScheduled PTaaS engagements. ~$18K-$70K per engagementQuote
- Bugcrowd ASMAttack surface managementQuote
- Bugcrowd AI SafetyAI / LLM red-team servicesQuote
- · Platform fees separate from bounty payouts
- · Pricing escalation reported at renewal 2024-2025
- · Triage service fees on top of platform fees
- · Per-asset pricing on ASM module
Key features
- +Bugcrowd Bug Bounty (managed programs)
- +Bugcrowd Disclosure (VDP)
- +Bugcrowd Pentest (PTaaS, scheduled)
- +Bugcrowd ASM (attack surface management)
- +Bugcrowd AI Safety (LLM red-team)
- +CrowdMatch researcher-to-program pairing
- +Mature triage automation
- +Integrations (Jira, ServiceNow, Slack, GitHub)
Intigriti
EU-headquartered bug bounty with GDPR, NIS2, and DORA compliance anchoring.
Intigriti is the EU-headquartered bug-bounty and PTaaS platform, founded 2016 in Antwerp, Belgium by Stijn Jans and Inti De Ceukelaire, with a researcher community of approximately 100,000+ and a customer base that is heavily European and UK with growing US presence. The company raised $22M Series B in October 2024 led by Octopus Ventures, positioning the round explicitly around EU compliance momentum (GDPR enforcement maturity, NIS2 transposition through 2024-2025, and DORA financial-services compliance in January 2025). Strengths: the strongest EU-compliance-anchored positioning in PTaaS (GDPR data-handling, NIS2 incident-reporting requirements, DORA ICT risk requirements built into platform reporting), EU data residency on platform infrastructure (Frankfurt and Paris regions), a researcher community that skews European with deep penetration into EU public-sector and regulated-industry engagements, and mature integrations for European compliance frameworks. Best fit for EU-headquartered organizations and US organizations with significant EU operations needing data-residency-anchored testing under GDPR, NIS2, and DORA. Trade-offs: researcher community meaningfully smaller than HackerOne / Bugcrowd (~100K vs 700K-2M); US Fortune 500 logo coverage limited; brand recognition outside EU thinner; and product breadth narrower than HackerOne / Bugcrowd (no separate ASM product as of early 2026).
EU-headquartered organizations and US organizations with significant EU operations needing GDPR, NIS2, and DORA-anchored testing with EU data residency and EU-fluent triage, particularly EU public-sector and EU regulated-industry buyers.
US Fortune 500 wanting the largest researcher pool (HackerOne / Bugcrowd better), US federal buyers (Synack / HackerOne better), or buyers wanting broad ASM and AI-safety product breadth (Bugcrowd / HackerOne broader).
Strengths
- Strongest EU-compliance positioning (GDPR, NIS2, DORA)
- EU data residency on platform infrastructure (Frankfurt, Paris)
- Researcher community skews European; deep EU public-sector coverage
- Mature integrations for European compliance frameworks
- $22M Series B October 2024 (Octopus Ventures)
- EU-headquartered (Antwerp, Belgium); GDPR-native
- Mature triage workflow with EU-fluent triage team
Weaknesses
- Researcher community meaningfully smaller than HackerOne / Bugcrowd
- US Fortune 500 logo coverage limited
- Brand recognition outside EU thinner
- Product breadth narrower than HackerOne / Bugcrowd (no separate ASM product)
- US federal pedigree absent (FedRAMP not applicable; EU-focused)
Pricing tiers
partial- Intigriti Disclosure (VDP)Lowest tier; vulnerability disclosure program. EUR 8K-25K/yearQuote
- Intigriti BountyManaged bug bounty. EUR 35K-150K platform fee plus bounty payoutsQuote
- Intigriti Hybrid Pentest (PTaaS)Scheduled PTaaS. EUR 15K-60K per engagementQuote
- Intigriti EnterpriseMulti-program enterprise tier with unlimited schedulingQuote
- · Platform fees separate from bounty payouts
- · Annual price increases reported at 6-10%
- · Scope-creep charges on bounded engagements
- · EUR-denominated billing creates FX exposure for US buyers
Key features
- +Intigriti Bug Bounty (managed programs)
- +Intigriti Disclosure (VDP)
- +Intigriti Hybrid Pentest (PTaaS)
- +EU data residency (Frankfurt, Paris)
- +GDPR, NIS2, DORA compliance-mapped reporting
- +EU-fluent triage team
- +Mature integrations (Jira, ServiceNow, Slack, GitHub)
- +Researcher reputation and ranking system
YesWeHack
French bug-bounty platform with EU data residency as primary differentiator.
YesWeHack is the French bug-bounty and PTaaS platform, founded 2013 in Paris by Guillaume Vassault-Houliere, Manuel Dorne, and Romain Lecoeuvre, with a researcher community of approximately 60,000+ and a customer base heavily concentrated in France, EU public-sector, EU financial services, and EU regulated industries. Strengths: EU data residency on platform infrastructure (France-based), strong French public-sector pedigree (ANSSI-recognized; widely used across French ministries and OIVs/OSEs under LPM and NIS), GDPR-native handling by default, and a mature researcher community with strong French and Francophone Africa penetration. Best fit for French organizations, EU regulated industries (particularly financial services under DORA and OIVs/OSEs under NIS2), and EU public-sector buyers needing France-anchored data residency and ANSSI-aligned testing. Trade-offs: researcher community smaller than Intigriti (~60K vs ~100K) and meaningfully smaller than HackerOne / Bugcrowd; US logo coverage essentially nil; product breadth narrower than HackerOne / Bugcrowd (no ASM product); platform UX has been reported as dated relative to newer competitors; and pricing is denominated in EUR with limited US-buyer-friendly contracting.
French organizations, EU public-sector buyers (ministries, OIVs, OSEs under LPM and NIS2), EU regulated industries (particularly financial services under DORA), and Francophone Africa enterprises needing France-anchored data residency and ANSSI-aligned testing.
US enterprises (HackerOne / Bugcrowd / Cobalt better), US federal buyers (Synack / HackerOne better), buyers wanting broad ASM / AI-safety product breadth, or buyers prioritizing modern platform UX (Intigriti / Cobalt newer).
Strengths
- EU data residency (France-based platform infrastructure)
- Strong French public-sector pedigree (ANSSI-recognized)
- Widely used across French ministries and OIVs/OSEs under LPM, NIS, NIS2
- GDPR-native handling by default
- Researcher community with French and Francophone Africa penetration
- Mature for EU financial services under DORA
- Mature triage team fluent in French and English
Weaknesses
- Researcher community smaller than Intigriti / HackerOne / Bugcrowd
- US logo coverage essentially nil
- Product breadth narrower (no ASM product)
- Platform UX reported as dated relative to newer competitors
- EUR-denominated billing with limited US-buyer-friendly contracting
Pricing tiers
partial- YesWeHack Disclosure (VDP)Lowest tier; EUR 5K-20K/yearQuote
- YesWeHack Bug BountyManaged bug bounty. EUR 30K-120K platform fee plus bounty payoutsQuote
- YesWeHack Pentest (PTaaS)Scheduled PTaaS. EUR 12K-50K per engagementQuote
- YesWeHack EnterpriseMulti-program tierQuote
- · Platform fees separate from bounty payouts
- · EUR-denominated billing creates FX exposure for US buyers
- · Scope-creep charges on bounded engagements
- · Specialty engagements (mobile, IoT, hardware) priced separately
Key features
- +YesWeHack Bug Bounty (managed programs)
- +YesWeHack Disclosure (VDP)
- +YesWeHack Pentest (PTaaS)
- +EU data residency (France-based)
- +GDPR, NIS2, DORA, LPM compliance-mapped reporting
- +ANSSI-recognized program management
- +French and English triage team
- +Researcher reputation and ranking system
Trustwave PTaaS
Legacy-MSSP heritage PTaaS; acquisition uncertainty material after Singtel sale.
Trustwave is one of the oldest commercial penetration-testing and managed-security-services brands, founded 1995 in Chicago, with a legacy MSSP heritage anchored on SpiderLabs (the internal research and pen-testing team) and broad service catalog spanning managed detection and response, threat hunting, digital forensics, and PTaaS. The ownership history is the most-cited concern: Singtel acquired Trustwave in 2015 for $810M, then MacAndrews and Forbes (the Ron Perelman holding company) acquired Trustwave from Singtel in September 2024 at a reported $300M-$400M speculation range, a meaningful discount to the original purchase that suggests value impairment over the Singtel ownership period. Strengths: SpiderLabs has a long, credible research pedigree and continues to publish notable threat-intelligence work, broad service catalog allows bundling PTaaS with MDR and DFIR (a one-stop-shop for some buyers), and PCI DSS / PCI Forensic Investigator (PFI) credentials are strong in payment-card industries. Best fit for large regulated enterprises (5,000+ employees) wanting bundled MSSP services with PTaaS included, particularly PCI-heavy buyers. Trade-offs: post-MacAndrews and Forbes acquisition (September 2024) customer-support quality concerns have surfaced in renewal conversations and r/cybersecurity threads, legacy MSSP heritage means the PTaaS product is less product-led than Cobalt / HackerOne PTaaS (more services-led), pricing is opaque and meaningful at enterprise scale, and brand momentum has been flat-to-down over the Singtel-and-now-PE ownership cycle.
Large regulated enterprises (5,000+ employees) wanting bundled MSSP services (MDR + DFIR + PTaaS) under a single contract, particularly PCI DSS-heavy buyers in payment-card industries.
Mid-market SaaS companies (Cobalt better fit), US federal buyers (Synack better federal pedigree), EU buyers requiring strict data residency (Intigriti / YesWeHack better), or buyers concerned about acquisition uncertainty and post-PE customer-support quality.
Strengths
- SpiderLabs research and pen-testing team has long credible pedigree
- Broad MSSP service catalog (MDR + DFIR + PTaaS bundling)
- Strong PCI DSS and PCI Forensic Investigator (PFI) credentials
- Built for large regulated enterprises (5,000+ employees)
- Mature for payment-card industries
- Long delivery history since 1995
Weaknesses
- MacAndrews and Forbes acquisition Sept 2024 at reported $300M-$400M (vs Singtel $810M 2015); value impairment under Singtel ownership
- Customer-support quality concerns post-acquisition
- PTaaS product less product-led than Cobalt / HackerOne PTaaS (more services-led)
- Pricing opaque and meaningful at enterprise scale
- Brand momentum flat-to-down over multi-acquisition cycle
Pricing tiers
opaque- Trustwave PTaaS (per engagement)~$25K-$100K per engagement typicalQuote
- Trustwave MSSP + PTaaS bundleBundled MDR + PTaaS + DFIR; custom enterprise pricingQuote
- Trustwave PCI servicesPCI-specific testing and PFI servicesQuote
- · Custom contracts with limited published pricing
- · Scope-creep charges common in services-led model
- · Bundled MSSP commitments required for best PTaaS pricing
- · Specialty engagements priced separately
Key features
- +SpiderLabs pen-testing team
- +Web app, API, mobile, network, internal pen testing
- +PCI DSS and PFI services
- +Bundled MSSP services (MDR, DFIR, threat hunting)
- +Compliance-mapped reporting (PCI, HIPAA, SOC 2)
- +Mature retest workflow
- +Threat intelligence integration (SpiderLabs research)
Rapid7 PTaaS
PTaaS leveraging Insight platform and Velociraptor managed-services capability.
Rapid7 PTaaS is the penetration-testing-as-a-service offering from Rapid7 (NASDAQ:RPD), built on the Rapid7 Insight platform and meaningfully expanded with the May 2024 acquisition of Velociraptor (the open-source DFIR project) and the underlying managed-services capability. Strengths: tight integration with the Insight platform (InsightVM, InsightIDR, InsightAppSec) creates a unified view of pen-test findings alongside scanner output and SIEM events, mature managed-services delivery muscle (Rapid7 has run managed services for years and the Velociraptor acquisition strengthened DFIR depth), and public-company financial transparency. Best fit for organizations already running the Rapid7 Insight platform who want PTaaS integrated into the existing security stack rather than a separate point solution. Trade-offs: outside the Rapid7 Insight ecosystem the PTaaS offering is less compelling than Cobalt / HackerOne PTaaS / Synack on standalone merit; Rapid7 revenue growth has been under pressure 2024-2025 (activist investor Jana Partners disclosed a stake in 2024 and pushed for a strategic review); per-engagement pricing meaningful at enterprise scale; and the PTaaS product is less mature on researcher-led testing than the dedicated PTaaS vendors.
Mid-market and enterprise (500-25,000 employees) already running the Rapid7 Insight platform (InsightVM, InsightIDR, InsightAppSec) who want PTaaS integrated into the existing security stack rather than a separate point solution.
Non-Rapid7 stacks (Cobalt / HackerOne PTaaS / Synack better as standalone), US federal buyers (Synack better federal pedigree), EU buyers requiring strict data residency (Intigriti / YesWeHack better), or buyers concerned about Rapid7 vendor stability post-Jana Partners review.
Strengths
- Tight integration with Rapid7 Insight platform (InsightVM, InsightIDR, InsightAppSec)
- Velociraptor acquisition May 2024 strengthened DFIR and managed-services depth
- Mature managed-services delivery muscle
- Public company financial transparency
- Best for Rapid7 Insight-anchored security stacks
- Compliance-mapped reporting (SOC 2, PCI, HIPAA)
- Mature retest workflow
Weaknesses
- Outside Rapid7 Insight ecosystem less compelling than Cobalt / HackerOne PTaaS / Synack
- Rapid7 revenue growth under pressure 2024-2025; Jana Partners activist stake disclosed
- Per-engagement pricing meaningful at enterprise scale
- PTaaS product less mature on researcher-led testing than dedicated PTaaS vendors
- Innovation pace slower than Cobalt on PTaaS-specific workflow
Pricing tiers
partial- Rapid7 PTaaS (per engagement)~$18K-$80K per engagement typicalQuote
- Rapid7 PTaaS + Insight bundleBundled with InsightVM / InsightIDR; custom pricingQuote
- Rapid7 MDR + PTaaSBundled managed services; enterprise pricingQuote
- · Bundled Insight platform commitments for best PTaaS pricing
- · Scope-creep charges on bounded engagements
- · Annual price increases reported
- · Specialty engagements (mobile, IoT) priced separately
Key features
- +Web app, API, mobile, network, internal pen testing
- +Insight platform integration (InsightVM, InsightIDR, InsightAppSec)
- +Velociraptor DFIR capability
- +Managed services delivery
- +Compliance-mapped reporting
- +Mature retest workflow
- +Threat intelligence (Rapid7 Labs)
Nettitude
UK + US-based pen testing with CREST, CHECK, and STAR-FS certifications under Lloyds Register.
Nettitude is the UK-headquartered pen-testing and PTaaS firm acquired by Lloyds Register (the marine and industrial classification society) in 2018, with delivery teams in the UK and US, and a customer base concentrated in UK financial services, EU regulated industries, and US enterprises with UK operations. Strengths: an unusually deep portfolio of UK and EU regulator-recognized certifications (CREST member firm, CHECK Green Light status for UK government work, STAR-FS for Bank of England intelligence-led pen testing, PCI Qualified Security Assessor), the Lloyds Register backing provides unusual long-term ownership stability in a category dominated by VC-backed and PE-owned vendors, and a strong pedigree in TIBER-EU and TIBER-style threat-led pen testing for financial regulators. Best fit for UK and EU financial services, EU regulated industries, and US enterprises with UK operations needing CREST / CHECK / STAR-FS-certified testing or TIBER-EU intelligence-led red teaming. Trade-offs: researcher-led delivery model rather than crowdsourced (smaller delivery surface than HackerOne / Bugcrowd); product/platform layer is less mature than Cobalt / HackerOne PTaaS (services-led, not product-led); pricing opaque; brand recognition outside UK / EU regulated industries thinner; and US logo coverage limited.
UK and EU financial services (particularly Bank of England-regulated firms requiring STAR-FS), EU regulated industries needing TIBER-EU threat-led red teaming, and US enterprises with UK operations needing CREST / CHECK-certified testing under Lloyds Register backing.
US Fortune 500 wanting the largest researcher pool (HackerOne / Bugcrowd better), US federal buyers (Synack better federal pedigree), mid-market SaaS companies (Cobalt better fit), or buyers prioritizing product-led platform workflow over services-led delivery.
Strengths
- CREST member firm; CHECK Green Light; STAR-FS for Bank of England
- Lloyds Register backing provides long-term ownership stability
- Strong TIBER-EU and TIBER-style threat-led red team pedigree
- UK and US delivery teams
- Mature PCI Qualified Security Assessor capability
- Built for UK financial services and EU regulated industries
- Long delivery history since 2003
Weaknesses
- Services-led delivery; smaller surface than crowdsourced platforms
- Product / platform layer less mature than Cobalt / HackerOne PTaaS
- Pricing opaque
- Brand recognition outside UK / EU regulated industries thinner
- US Fortune 500 logo coverage limited
Pricing tiers
opaque- Nettitude PTaaS (per engagement)~GBP 18K-75K per engagement typicalQuote
- Nettitude TIBER-EU red teamThreat-led red team; GBP 100K-400K per programQuote
- Nettitude STAR-FSBank of England intelligence-led pen testQuote
- Nettitude MSSP + PTaaSBundled MSSP servicesQuote
- · Custom services-led contracts with limited published pricing
- · GBP-denominated billing creates FX exposure for US buyers
- · Scope-creep charges common in services-led model
- · Specialty engagements (TIBER, STAR-FS) priced separately
Key features
- +Web app, API, mobile, network, internal pen testing
- +TIBER-EU and STAR-FS threat-led red teaming
- +CREST, CHECK, PCI QSA credentials
- +Lloyds Register backing
- +Compliance-mapped reporting (PCI, SOC 2, ISO 27001)
- +Mature retest workflow
- +Threat intelligence capability
Detectify
Swedish web-app and external attack surface monitoring with crowdsourced signature library.
Detectify is the Swedish web-application and external attack surface monitoring platform, founded 2013 in Stockholm by former bug-bounty researchers, with a customer base concentrated in EU and US SaaS companies and security-conscious mid-market organizations. Strengths: a crowdsourced researcher-fed signature library (Crowdsource program pays researchers for novel vulnerability modules that then get added to the scanner, this is the closest the category has to PTaaS-meets-DAST), strong fit for continuous external monitoring of web-facing assets (Surface Monitoring and Application Scanning products), EU data residency on platform infrastructure (Stockholm), and a developer-friendly UX that engineering teams adopt. Best fit for cloud-native SaaS companies and security-conscious mid-market organizations (100-2,500 employees) needing continuous external web-app and surface monitoring rather than scheduled point-in-time pen tests. Trade-offs: this is meaningfully more of a DAST + EASM product than a true PTaaS (no scheduled human-led pen tests, no researcher-led engagement model); product breadth narrower than HackerOne / Bugcrowd / Cobalt; researcher pool meaningfully smaller; brand recognition in US Fortune 500 thinner; and the position at the edge of the PTaaS category means buyers should be clear-eyed about what they are buying (continuous scanning enriched by researcher-contributed signatures, not human-delivered pen tests).
Cloud-native SaaS companies and security-conscious mid-market organizations (100-2,500 employees) needing continuous external web-app and surface monitoring enriched by researcher-contributed signatures, particularly EU-headquartered or EU-operating companies.
Buyers wanting true scheduled human-led pen tests (Cobalt / HackerOne PTaaS / Synack better), Fortune 500 wanting the largest researcher pool (HackerOne / Bugcrowd better), US federal buyers (Synack better federal pedigree), or buyers needing broad PTaaS product breadth (Bugcrowd / HackerOne broader).
Strengths
- Crowdsource program pays researchers for novel vulnerability modules
- Strong continuous external monitoring (Surface Monitoring, Application Scanning)
- EU data residency (Stockholm-based platform infrastructure)
- Developer-friendly UX engineering teams adopt
- Mature for cloud-native SaaS and mid-market
- GDPR-native handling
- Fast deployment and time-to-value
Weaknesses
- Meaningfully more DAST + EASM than true PTaaS (no human-led pen tests)
- Product breadth narrower than HackerOne / Bugcrowd / Cobalt
- Researcher pool meaningfully smaller
- Brand recognition in US Fortune 500 thinner
- Edge-of-category positioning requires clear-eyed buying
Pricing tiers
public- Surface MonitoringPer domain per month; external attack surface monitoring$89 /mo
- Application ScanningPer application per month; deep web-app scanning$289 /mo
- Surface Monitoring + Application Scanning bundleCustom; bundled at discountQuote
- EnterpriseCustom; multi-asset, dedicated CSMQuote
- · Per-domain and per-application pricing escalates with asset sprawl
- · Annual price increases reported at 5-10%
- · Specialty modules priced separately
- · Enterprise contracting required at multi-asset scale
Key features
- +Surface Monitoring (external attack surface)
- +Application Scanning (deep web-app scanning)
- +Crowdsource program (researcher-contributed vulnerability modules)
- +Continuous scanning (not scheduled point-in-time)
- +EU data residency (Stockholm)
- +GDPR-native handling
- +Mature integrations (Jira, Slack, GitHub)
- +Developer-friendly UX
Frequently asked questions
The questions buyers actually ask before they sign.
Does my UK fintech need a CREST-accredited pen test?
What is CBEST and who needs it?
Intigriti vs HackerOne for a UK fintech Series C?
PTaaS vs traditional pen test, which one?
Vetted-researcher PTaaS vs crowd, which model?
Bug bounty vs PTaaS, what is the difference?
How do vulnerability-disclosure controversies affect vendor selection?
When do federal-cleared researchers matter?
How does the EU compliance angle change vendor selection?
How do AI-augmented PTaaS and AI red-teaming change the category?
How much should I budget for PTaaS?
How long does PTaaS deployment take?
How does this differ from your VM and CSPM rankings?
Final word
Looking at a different market? See the global Penetration Testing as a Service (PTaaS) ranking, or pick another country at the top of this page.
Last updated 2026-05-19. Local pricing reverified quarterly. Found something inaccurate? Tell us.