Try our new research platform with insights from 80,000+ expert users

HackerOne vs IBM Guardium Vulnerability Assessment comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jul 14, 2024
 

Categories and Ranking

HackerOne
Ranking in Vulnerability Management
42nd
Average Rating
8.6
Number of Reviews
4
Ranking in other categories
Application Security Tools (34th), Bug Bounty Platforms (1st), Penetration Testing Services (2nd), Attack Surface Management (ASM) (12th)
IBM Guardium Vulnerability ...
Ranking in Vulnerability Management
46th
Average Rating
6.6
Number of Reviews
3
Ranking in other categories
No ranking in other categories
 

Featured Reviews

VS
Sep 16, 2024
They have streamlined the complete process, which gives a sense of security to the users
I mainly use it for downtime activities, earning extra cash alongside a full-time job, and to get new sales and profits It helps me to get new sales, profits, and other benefits. The main thing I like about HackerOne is that it provides a direct way to contact the program directly without the…
KB
Aug 24, 2022
Worthwhile from the regulatory requirements and analytics perspective, but is expensive and not easy to use
We are a full security base integration and application business. We help with implementation and deployments. I used Guardium to help with a cloud migration to check and do some validation for a client's data landscape and services so that they made sure that they were all secure in overall…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature of HackerOne is its variety of programs. These programs provide depth into various areas, such as mobile, API, and websites."
"Apart from getting all the bug bounty opportunities, we also get the chance to practice in a safe environment, like a demo setup. These features are great for beginners who want to explore bug bounties in the future."
"It helps me to get new sales, profits, and other benefits."
"The most valuable feature is that it provides a simple English recommendation on actions that you need to take once a vulnerability is discovered."
"The reporting features are good and there are many built-in reports that can be quickly configured."
"It helped with some of the regulatory requirements. It also helped with some of the security analytics and analysis. It was worthwhile from that perspective."
 

Cons

"The ability to view the conversation between the triagers and the programs will be really good."
"One issue I've experienced is traffic. Many people try to participate when an opportunity with a bounty of around 1,000-15,000 dollars comes up. In this case, the first person to report the vulnerability gets the bounty. If a second person reports the same vulnerability, they are marked as duplicated instead of receiving some recognition. The second person also invested time finding the issue, so I think this can be improved."
"Response time can be improved. The HackerOne Trust team can be slow to respond sometimes. They're not using AI, which could help reduce the number of duplicate reports."
"Building policies is not that easy. There are some things that are turned off by default, for example, displaying values."
"It was not as easy to use. The user-friendliness of it was somewhat lower than what I was expecting. It was also lacking in terms of the ease of the setup. There should be an automatic agent for deployment."
"The interface could be improved by having sub-groups of tests, ultimately making the process of collecting tests faster."
 

Pricing and Cost Advice

"The solution is free."
"The tool is open-source and free for bug bounty hunters."
"One thing not advantageous for it was that it was a little bit more expensive. I would rate it one out of five in terms of pricing."
report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
805,335 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Manufacturing Company
12%
Financial Services Firm
11%
Comms Service Provider
7%
Financial Services Firm
34%
Computer Software Company
13%
Insurance Company
10%
Manufacturing Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

What needs improvement with HackerOne?
Response time can be improved. The HackerOne Trust team can be slow to respond sometimes. They're not using AI, which could help reduce the number of duplicate reports.
What is your primary use case for HackerOne?
I use the tool for vulnerability assessment and testing.
What do you like most about IBM Guardium Vulnerability Assessment?
It helped with some of the regulatory requirements. It also helped with some of the security analytics and analysis. It was worthwhile from that perspective.
What is your experience regarding pricing and costs for IBM Guardium Vulnerability Assessment?
One thing not advantageous for it was that it was a little bit more expensive. I would rate it one out of five in terms of pricing.
What needs improvement with IBM Guardium Vulnerability Assessment?
It was not as easy to use. The user-friendliness of it was somewhat lower than what I was expecting. It was also lacking in terms of the ease of the setup. There should be an automatic agent for de...
 

Also Known As

HackerOne Assets, HackerOne Pentesting Services, HackerOne Security Assessments, HackerOne Vulnerability Management
No data available
 

Learn More

 

Overview

 

Sample Customers

Zenefits, Adobe, Yelp
Information Not Available
Find out what your peers are saying about HackerOne vs. IBM Guardium Vulnerability Assessment and other solutions. Updated: September 2024.
805,335 professionals have used our research since 2012.