ASSESSMENT
Using a variety of factors, including previously reported vulnerabilities to SaaS vendors, exploit databases, bug bounty report's knowledge base, and communication with researchers to get the full picture, our team carefully evaluates the risk, severity level to your data, and business. Researchers must sign an NDA promising not to disclose the specifics of the vulnerability without first receiving your and your business's explicit consent.