Frequently Asked Questions

Find answers to common questions about Hackurity's solutions, implementation, pricing, and technology.

General Questions

What is Hackurity?

Hackurity is a next-generation cybersecurity platform designed specifically for small IT teams. We offer automated penetration testing, dark web monitoring, and threat intelligence solutions with enterprise-grade security but push-button simplicity.

Who is Hackurity designed for?

Hackurity is designed for small to medium-sized businesses with limited IT resources who need enterprise-level security without the complexity or expense of traditional solutions. Our platform is particularly valuable for organizations without dedicated security specialists on staff.

How is Hackurity different from traditional security tools?

Unlike traditional security tools that require significant technical expertise, complex configuration, and ongoing management, Hackurity delivers automated, continuous security with minimal setup. We combine the benefits of automated vulnerability scanning with advanced penetration testing techniques in a simple, user-friendly interface.

Is Hackurity compliant with industry regulations?

Yes, Hackurity helps organizations meet compliance requirements across various frameworks. Our solution provides detailed reporting that can be used as evidence during compliance audits.

Does Hackurity work with my existing security tools?

Absolutely! Hackurity is designed to complement your existing security infrastructure. We integrate seamlessly with most common security tools and ticketing systems to enhance your overall security posture without disruption.

How does Hackurity stay current with evolving threats?

Our threat intelligence team constantly monitors emerging vulnerabilities and attack techniques. The Hackurity platform receives regular updates to detect the latest threats, ensuring your protection against both common vulnerabilities and sophisticated, novel attack vectors.

Can Hackurity help with regulatory compliance?

Yes, Hackurity helps organizations meet security requirements for GDPR, HIPAA, PCI DSS, ISO 27001, and other frameworks. Our detailed reports provide documentation of your security testing efforts to demonstrate due diligence during compliance audits.

Pricing Questions

Why doesn't Hackurity have fixed pricing packages on the website?

We believe in tailored security solutions rather than one-size-fits-all packages. Every organization has unique infrastructure, risk profiles, and security needs. Our customized approach ensures you only pay for what you need while receiving the most effective protection for your specific environment.

How is Hackurity's pricing determined?

Our pricing is based on several factors including the size and complexity of your infrastructure, the number of assets requiring protection, the frequency of security assessments, and which specific Hackurity products (Atrax, Obsidian, or Huntsman) you implement. This ensures fair and appropriate pricing for businesses of all sizes.

Is there a minimum contract period?

We offer flexible engagement options. While longer than annual subscriptions provide the best value, we understand that businesses need flexibility, and we don't believe in locking clients into lengthy contracts if it doesn't suit their needs.

Do you offer discounts for startups or non-profits?

Yes, we offer special pricing for qualified startups, educational institutions, and non-profit organizations. We believe everyone deserves strong security, regardless of budget constraints. Contact our team to learn about our special programs.

Does Hackurity offer a free trial?

Rather than a free trial, we provide a Proof of Concept (POC) demonstration. This involves running our complete solution against carefully selected targets - such as specific URLs, IP addresses, darkweb locations, or OSINT sources - and then presenting the actual findings during a consultation call to confirm their accuracy.

Are there additional costs for support or implementation?

No, our pricing includes implementation assistance, technical support, and regular platform updates. We don't believe in hidden fees or surprise charges. The quote you receive covers everything you need for comprehensive protection.

Can I upgrade or downgrade my plan later?

Absolutely! As your business grows or your security needs change, you can easily adjust your Hackurity coverage. Our customer success team will work with you to scale your security solution appropriately.

Do you offer custom security solutions for unique requirements?

Yes, for organizations with specialized security needs beyond our standard offerings, we provide custom security solutions. Our security experts will work directly with your team to develop tailored assessment methodologies, custom integrations, or specialized reporting to meet your specific requirements.

Technical Questions

How does Hackurity's pentesting technology work?

Hackurity's Atrax platform combines automated vulnerability scanning with advanced penetration testing techniques. Unlike traditional scanners that only identify potential vulnerabilities, Atrax attempts to exploit these vulnerabilities in a safe, controlled manner to eliminate false positives and provide actionable intelligence.

Is Hackurity's testing approach safe for my production systems?

Yes, Hackurity employs a safe testing methodology designed to identify vulnerabilities without disrupting your operations. Our unique payload-less approach allows for effective testing without the risks associated with traditional penetration testing tools. All testing is conducted within carefully controlled parameters to ensure system stability.

What types of vulnerabilities can Hackurity detect?

Hackurity detects a comprehensive range of vulnerabilities including OWASP Top 10 web application vulnerabilities, network security weaknesses, misconfigurations, outdated software, weak credentials, insecure API endpoints, supply chain vulnerabilities, and social engineering susceptibility.

Do I need to install any software to use Hackurity?

For most external testing - like websites or public-facing assets - no installation is needed. However, if you want to test internal systems like your servers or private networks, we'll provide a simple agent to install within your environment that creates a secure connection back to our platform.

How does Hackurity handle false positives?

Unlike traditional vulnerability scanners, Hackurity's exploitation-based approach significantly reduces false positives. By actually attempting to exploit discovered vulnerabilities in a safe manner, we verify their existence before reporting them. This means you spend less time investigating non-issues and more time addressing real security concerns.

Can Hackurity test internal systems that aren't exposed to the internet?

Yes, Hackurity can test internal systems through secure methods by deploying Hackurity's agent within your internal network.

What level of access does Hackurity need to perform testing?

For external testing, we only need the domain names or IP ranges you want to assess. For internal testing, the access requirements depend on the scope but typically involve limited, carefully controlled access to the target systems. We follow the principle of least privilege in all our testing activities.

How does Hackurity protect my data during security assessments?

All data processed by Hackurity is encrypted both in transit and at rest. We maintain strict data handling procedures, and our platform is designed to minimize data exposure. Testing results are available only to authorized users within your organization through our secure portal.

Can Hackurity integrate with my existing security tools?

Yes, Hackurity offers integrations with popular security tools, SIEM solutions, ticketing systems, CI/CD pipelines, and communication platforms. This allows for seamless incorporation of Hackurity's findings into your existing security workflows and processes.

How often does Hackurity update its vulnerability database?

Our vulnerability database is updated at least daily, but the exact frequency depends on the specific sources we pull from. Our security research team continuously monitors new vulnerabilities, attack techniques, and threat patterns to ensure our detection capabilities stay current against evolving cybersecurity threats.

Implementation Questions

How long does it take to implement Hackurity?

Most clients are up and running with Hackurity within 24-48 hours. Our streamlined onboarding process focuses on quickly identifying your key assets and setting up initial security assessments. The platform's intuitive design means your team can start using it effectively with minimal training.

What's involved in the implementation process?

Implementation typically involves four simple steps: 1) A brief onboarding call to understand your environment and objectives, 2) Configuration of your dashboard and security policies, 3) Authorization for testing specific domains or IP ranges, and 4) Your first security assessment launch. Our team guides you through each step to ensure a smooth experience.

Do I need specialized knowledge to use Hackurity?

No, Hackurity is designed for use by IT generalists without specialized security expertise. Our platform presents findings in clear, actionable language with specific remediation steps. Technical complexity is abstracted away, allowing your team to focus on resolving issues rather than deciphering complex security jargon.

Can Hackurity be customized to our specific environment?

Yes, Hackurity is highly configurable to meet your specific needs. During implementation, we help you customize scanning schedules, notification preferences, security policies, and reporting formats to align with your organization's requirements and workflows.

How does Hackurity prioritize vulnerabilities?

Hackurity uses a context-aware prioritization system that considers multiple factors: the severity of the vulnerability, its exploitability in your specific environment, the potential business impact, and the existence of known threat actor activity. This provides a more meaningful prioritization than standard CVSS scores alone.

What kind of support does Hackurity provide during implementation?

We provide hands-on support throughout the implementation process, including dedicated onboarding assistance, configuration guidance, and ongoing technical support. Our security experts are available to answer questions and help you make the most of the platform from day one.

How quickly can I see results after implementing Hackurity?

Your first comprehensive security assessment results are typically available within hours of implementation. These initial findings provide immediate visibility into your security posture and actionable steps to address any discovered vulnerabilities.

Will implementing Hackurity disrupt our normal operations?

No, Hackurity is designed to operate without disrupting your business. Our testing methodologies are carefully controlled to identify vulnerabilities without affecting system performance or stability. Implementation and ongoing use have minimal impact on your team's workload or system resources.

Product Questions

What is Atrax and how does it work?

Atrax is our flagship automated penetration testing platform. It combines vulnerability scanning with exploitation techniques to identify, verify, and prioritize security weaknesses. Unlike traditional scanners, Atrax attempts to safely exploit vulnerabilities to eliminate false positives and provide contextual insights about your security risks.

What is Obsidian and how does it benefit my organization?

Obsidian is our dark web monitoring solution that continuously scans hidden corners of the internet for mentions of your organization, leaked credentials, exposed data, and other security threats. It provides early warning of potential breaches, compromised accounts, or brand impersonation attempts before they can be widely exploited.

What is Huntsman and when would I need it?

Huntsman is our OSINT (Open Source Intelligence) scanning solution that monitors public internet sources for potential security exposures related to your organization. It identifies leaked information, reputation threats, and exposed assets across websites, forums, code repositories, and social media, helping you manage your external attack surface.

Can I use just one Hackurity product or do I need all three?

Each Hackurity product (Atrax, Obsidian, and Huntsman) can be used independently or in combination, depending on your security needs, however they work most effectively together for comprehensive protection.

How frequently are Hackurity products updated?

All Hackurity products receive continuous updates to their detection capabilities, exploitation techniques, and remediation guidance. Major platform updates with new features are typically released quarterly, while security detection updates occur much more frequently to stay current with emerging threats.

Do Hackurity products integrate with each other?

Yes, all Hackurity products are designed to work seamlessly together. Findings from Obsidian and Huntsman inform Atrax's testing priorities, while Atrax results help guide what to monitor for in external sources. This integrated approach provides more comprehensive security coverage and contextually relevant insights.

Can Hackurity products be customized for specific industries?

Yes, Hackurity's products can be tailored for industry-specific requirements. We offer specialized configurations for healthcare, financial services, retail, manufacturing, and other sectors to address their unique regulatory compliance needs and industry-specific threat landscapes.

How detailed are the reports from Hackurity products?

Hackurity provides multiple reporting levels to suit different audiences. Executive summaries offer high-level risk overviews, while detailed technical reports provide comprehensive findings with step-by-step remediation instructions. Custom reporting is also available to meet specific organizational requirements.

Support Questions

What kind of support does Hackurity provide?

Hackurity offers comprehensive support including technical assistance, security guidance, and platform help. Our support team includes experienced security professionals who can help interpret findings, prioritize remediation efforts, and answer questions about implementing security best practices.

What are Hackurity's support hours?

Our standard support is available Monday through Friday, 9am to 5pm GMT+1. Premium support plans with extended hours and weekend coverage are available for clients with 24/7 operations or those in different time zones.

How do I contact Hackurity support?

Support is available through multiple channels: our ticketing system on the portal, email support at support@hackurity.io, or phone support for urgent matters. Premium support clients also receive access to a dedicated security advisor and priority response queuing.

Does Hackurity provide remediation guidance?

Yes, every vulnerability identified by Hackurity comes with detailed remediation instructions tailored to your specific environment. These step-by-step guides help your team efficiently address security issues without requiring specialized security expertise.

Can Hackurity help interpret security findings?

Absolutely. Our security experts are available to help explain findings, prioritize remediation efforts, and provide context about the potential impact of discovered vulnerabilities. We ensure you understand not just what was found, but why it matters and how to fix it.

What resources does Hackurity provide for self-service support?

Hackurity offers a comprehensive knowledge base, video tutorials, best practice guides, and regular webinars on security topics. Our client portal also includes a community forum where you can connect with other security professionals and share experiences.

Can Hackurity assist with emergency security incidents?

While Hackurity's primary focus is on proactive security, premium support clients have access to emergency assistance for critical vulnerabilities discovered by our platform.

Still have questions?

Our security experts are ready to help you find the right solution for your organization.