Last Updated: November 22, 2023
Pentraze Cybersecurity (hereafter “Pentraze”) is dedicated to responsibly identifying and reporting security vulnerabilities in products and services not owned or managed by Pentraze. This document outlines our procedure for reporting such vulnerabilities.
This policy provides a standardized procedure for reporting vulnerabilities to non-Pentraze vendors, ensuring transparency and fairness in all our communications.
When Pentraze identifies a security issue in a third-party vendor’s product or service, the following steps are taken:
Pentraze is committed to working with vendors to adjust the timeline if they are actively developing a patch or mitigation solution. The 90-day period may be extended under special circumstances to accommodate the development of effective solutions.
Proactive assessment using tactics, techniques, and procedures of actual attackers to identify security flaws, incorrect configurations, and vulnerabilities.
Comprehensive application protection, ensuring robust security throughout the entire software development lifecycle.
Simulate and emulate advanced cyber attacks to pinpoint vulnerabilities and test your organization's defense mechanisms, ensuring robust resilience against real-world threats.
Proactive process to identify, prioritize, and address security vulnerabilities in systems and software, enhancing an organization's defense against evolving cyber threats.