Do you want to be part of the community?
Do you want the best professionals?
The opportunity to optimize your cybersecurity with epic bounties.
It will only consume budget by adding new identified vulnerabilities identified.
Allows to adjust
By regulating the number of participating researchers, the search can be accelerated to the maximum.
Select vulnerabilities in a fully customisable way and real vulnerabilities.
Real time results
Select vulnerabilities in a fully customized way.
How it Works?
1. The companies publish their programs
The assets that companies need to protect will be published from their private platform. from its private platform. The company will have a streamlined process optimised process, which will make it possible to facilitate and delimit the programme according to their needs in a comprehensive manner.
2. The hunters experts will look for vulnerabilities
The programme will be accessible to the expert community best suited to the needs of the programme. best suited to the needs of the programme. The best hunters in each will provide their expertise in the search for vulnerabilities in the asset. asset.
3. It generates an appropriate report for the company
Each time a vulnerability is found, it is reported through the platform in professional the platform as a professional report for verification. The platform itself facilitates this process in order to guarantee the highest quality of the results delivered.
4. The hunter is rewarded for every vulnerability found
If the vulnerability exists and has been validated with the requirements of the the hunter receives the corresponding reward for his work. work. In this way the company only pays for the vulnerabilities found, and the hunter is rewarded according to the success of his appropriate to the success of his participation in the programme.
José Ramón Palanco
Serial Cybersecurity entrepreneur and Researcher. One of its start ups, Dinoflux, was acquired by Telefónica.
Estrategic, Innovation and Community advisor. Founder of DragonJAR and reference among the hunter community.
Entrepreneur and passionate about technology and cybersecurity. He is also co-founder of the Nice1 Blockchain project.
Responsible for monitoring the company's Business Plan and budgets, as well as coordinating legal aspects of the company.
Responsible for the online and offline marketing area of the project. Leads a multidisciplinary team.
Professional specialised in multinational account management, with experience and passion for working in international and technological environments.
20 years at Visa, 2 years as a startup CEO and 17 years at Telefonica is his baggage. Most of those years in Risk Management and IT Security related positions.
Articles about Bug Bounty
Top 5 Cloud Security Risks
With the new normality brought about by COVID-19, the services provided by the cloud are on the rise, but we must not forget to be cautious and take into account the variety of security risks we face.Read more
CVSS (Common Vulnerability Scoring System) - Concepts and Metrics
The Common Vulnerability Scoring System (CVSS) is increasingly indispensable in the security of o...Read more
Bug Bounty, what is it for companies?
The bug bounty programmes have given a lot to talk about in the different companies that we find ...Read more
Partnership agreement with A3SEC
Today we are celebrating because… A3SEC has joined Epic Bounties as a partner. A3SEC is a busine...Read more
I'm a customer
I'm a hunter