SHARE
Facebook X Pinterest WhatsApp

Bugcrowd Adds VPN to Crowdsourced Penetration Testing Service

Many IT organizations now routinely contract IT security researchers to ascertain just how secure the software they deploy really is. To facilitate that process, Bugcrowd developed a crowd-sourcing platform, dubbed Crowdcontrol, through which IT organizations can contract security researchers that have been vetted. BugCrowd today announced it is extending Crowdcontrol by adding a Traffic Control […]

Written By
MV
Mike Vizard
Dec 19, 2017

Many IT organizations now routinely contract IT security researchers to ascertain just how secure the software they deploy really is. To facilitate that process, Bugcrowd developed a crowd-sourcing platform, dubbed Crowdcontrol, through which IT organizations can contract security researchers that have been vetted. BugCrowd today announced it is extending Crowdcontrol by adding a Traffic Control capability that makes it possible for penetration testing to be conduced over a virtual private network (VPN).

Jonathan Cran, vice president of product for Bugcrowd, says Crowdcontrol simplifies vulnerability discovery by providing IT organizations with access to a wide variety of professional penetration experts. The issue that many organizations have when using such as a service is that that they can’t expose their applications using public internet connections because of compliance issues. Traffic Control solves that issue by making sure penetration testing is conducted over a VPN, says Cran.

Cran says Traffic Control also provides IT organizations more visibility into which security researcher is accessing what code. In addition, a set of reporting tools make it simpler to track vulnerabilities, says Cran. Those tools are important because IT organizations are now required to demonstrate penetration testing was conducted to comply with various regulations, adds Cran.

In general, Cran says, penetration testing conducted by third-party researchers usually leads to vulnerabilities being discovered that many software engineering teams overlook or discount.

“It can be quite an eye-opening experience,” says Cran. “A lot of researchers can do things in a few minutes that engineering teams think would be unlikely.”

Cran says the good news is that once a third-party researcher discovers a vulnerability, the engineering teams generally pay a lot more attention to security issues.

Bugcrowd

Penetration testing is often deemed to be a routine exercise by many developers. But as cybercriminals continue to make use of advanced analytics to discover software vulnerabilities, it may turn out that penetration testing is now the first and best line of defense any IT organization can employ.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.