Know what apps to scan? We do. Launching Asset Classification and Scan Recommendations.

Watch a 5-min product walkthrough Log in
Customer log in

Access Detectify tool

Crowdsource log in

Access Crowdsource platform

Detectify logo
Products & Solutions Resources Crowdsource Alfred AI Pricing About us
Start a trial Book a demo
Detectify AppSec platform
  • Platform overview

    A platform that provides evolving coverage across all your exposed assets

  • Surface Monitoring

    Discovery and vulnerability testing across the entire attack surface

  • Application Scanning

    Automatic scanning of web apps for business-critical vulnerabilities

  • Integrations

    Integrate Detectify with your security workflow

Solutions by use case
  • Attack surface protection

    Determine what actions to take for complete attack surface protection

  • Prevent subdomain takeover

    Find and manage subdomains to prevent hostile takeover

  • Scaling organizations

    EASM that scales alongside rapidly growing attack surfaces

  • Know what apps to scan

    9 out of 10 hackable apps are missed - cover what matters

Solutions by industry
  • Technology

    Solve common challenges faced by technology organizations

  • Consumer packaged goods

    Get more visibility and control over your digital products

  • Media & Gaming

    Manage digital transformation and secure what you're hosting in the cloud

  • Public Sector

    For agencies, higher education, and European governments

Start 2-week free trial Start 2-week free trial
Watch a demo Talk to sales
Detectify Crowdsource
  • What is Crowdsource?

    How Detectify customers benefit from our community of elite ethical hackers

  • Meet the community

    Meet some of our ethical hackers who come from all corners of the globe

  • Leaderboard

    See which ethical hackers are leading for the quarter, year, and all time

FOR ETHICAL HACKERS
  • Ethical hacking with us

    Learn what Crowdsource is and how we're not your average bug bounty platform

  • How Crowdsource works

    How to join, submission types, 0-day rewards, and payment information

  • Detectify Labs

    Technical and security research blog featuring write-ups and how to guides

  • Join Crowdsource

    Ready to join? Solve our Crowdsource Challenge and become part of our community

Start 2-week free trial
Watch a demo Talk to sales
Resource Center
  • All resources

    Explore case studies, webinars, e-books, whitepapers and videos

  • Case studies

    Learn how Detectify is an essential tool in these customer stories

  • Webinars

    Webinars and recordings to level up your AppSec knowledge

  • E-books & Whitepapers

    Browse and download e-books and whitepapers on AppSec and related topics

  • Events

    Register and browse for both online and in person events and webinars

  • Detectify Blog

    Read the latest product updates, news, industry insights and best practices

  • E-books & Whitepapers

    Browse and download e-books and whitepapers on AppSec and related topics

  • Events

    Register and browse for both online and in person events and webinars

  • Detectify Blog

    Read the latest product updates, news, industry insights and best practices

Trending Topics
  • External Attack Surface Management
  • Common attack vectors
Start 2-week free trial
Watch a demo Talk to sales
Products & Solutions Resources Crowdsource Alfred AI Pricing About us
Customer log in Crowdsource log in Book a demo
Products & Solutions
Platform overview Surface Monitoring Application Scanning Integrations
Solutions by use case Attack surface protection Prevent subdomain takeover Scaling organizations Know what apps to scan
Solutions by Industry Technology Consumer packaged goods Media & Gaming Public Sector
Start 2-week free trial
Watch a demo Talk to sales
Crowdsource
Detectify Crowdsource What is Crowdsource? Meet the community Leaderboard
For ethical hackers Ethical hacking with us How Crowdsource works Detectify Labs
Start 2-week free trial
Watch a demo Talk to sales
Resources
Resource Center All resources Case studies Webinars E-books & Whitepapers Events Detectify Blog
Trending Topics External Attack Surface Management Common attack vectors
Start 2-week free trial
Watch a demo Talk to sales

Acceptable Use Policy

Last updated: 23 November 2023

Scope and Purpose of this Acceptable Use Policy

This Acceptable Use Policy (“AUP”) describes prohibited use of the web services provided by Detectify. This AUP governs the use of Detectify’s Services and is incorporated by reference into the Terms of Use. This AUP applies to Detectify’s customers obtaining Services from Detectify (“User”). The purpose of this AUP is to protect Detectify, its Customers and other internet users from illegal, disruptive and other harmful activities. Detectify may modify this AUP at any time, publishing the then current version on detectify.com/acceptable-use-policy. You agree to the latest version of this AUP by using the Services.

Prohibited Use:

You may not use the Services for any illegal, harmful or infringing activity (“Prohibited Activity”), or in connection with content, products or services that are illegal, harmful, infringing or offensive (“Prohibited Content”) as further described below.

Prohibited Activity:

Prohibited Activity is considered any use of the Services for activity that is illegal, harmful or infringing. Prohibited Activities include, but are not limited to:

  • Using the Service to violate the privacy or personal data rights of other individuals;

  • Using the Service to interfere with or harm the confidentiality, integrity or availability of any Detectify system or a third party system without authorization;

  • Abusing the number of license grants of the Service, including the number of Application Scan profiles or Surface Monitoring domains, indicated in your subscription account or applicable Order Form ("Overuse");

  • Using the service in a manner that infringes the patents, copyright, trademark rights or other intellectual property right of a third party;

  • Gaming the payout model used within the Crowdsource platform by creating trial accounts in order to generate vulnerability hits, or similar; and

  • Using the Service for any other illegal activity.

Prohibited Content:

Prohibited Content is considered any use of the Services in connection with products, services, material or other content (“Content”) that is illegal, harmful, infringing, offensive or obscene. Prohibited Content includes, but is not limited to:

  • Using the Service in connection with Content that is illegal, like illegal drugs, illegal weapons, illegal gambling, human trafficking, child pornography or illegal pornography or prostitution;

  • Using the Service in connection with Content that infringes on third party rights, such as privacy or personal data protection rights or intellectual property rights; and

  • Using the Service in connection with Content that in Detectify’s consideration is harmful, offensive or obscene, regardless of the jurisdiction in which You operate, such as hateful, violent, fraudulent, defamatory, discriminatory, racist or threatening Content.

Consequences of Your Prohibited Use:

Detectify disclaims any obligation to pre-approve or continuously monitor any activity or content. The mere fact that You have been granted access to Detecity’s Services does not waive Detectify’s right to claim a breach by You of this AUP. Detectify may choose to act in case it finds out and reasonably considers that Your activity or content is or may be harmful to Detectify, its customers or other internet users and causes or may cause damage. Detectify reserves the right to invoice You separately for Overuse or suspend Your access to the Service in case Your use constitutes Prohibited Activity or Prohibited Use as well as terminate the Agreement and seek compensation for damages, should such arise, in accordance with the Terms of Use.

Get started
  • Start 2-week free trial
  • Book a demo
Product
  • Platform overview
  • Surface Monitoring
  • Application Scanning
  • Asset Classification and Scan Recommendations
  • Alfred AI
  • Custom Policies
  • Integrations
  • Customer login
Pricing
  • Platform pricing
For customers
  • Product changes
  • API documentation
  • Knowledge Base
  • Status page
Solutions by use case
  • Attack surface protection
  • Prevent subdomain takeover
  • Scaling organizations
Solutions by industry
  • Technology
  • Consumer packaged goods
  • Media & Gaming
  • Public Sector
Crowdsource
  • What is Crowdsource
  • Meet the community
  • Hack with us
  • How it works
  • Join Crowdsource
  • Hacker login
Resources
  • All resources
  • Case studies
  • Webinars
  • E-books & whitepapers
  • Videos
  • Events
Blogs
  • Detectify Blog
  • Detectify Labs
Trending topics
  • External Attack Surface Management
  • Common attack vectors
  • Log4j help
Partner program
  • Become a partner
Legal
  • Terms of Use
  • Privacy Policy
  • Cookie Policy
  • Cookie Settings
  • Compliance & Security
  • Responsible Disclosure
Company
  • About us
  • Careers
  • Press & Media
  • Contact
Twitter icon
linkedin icon
G2 Badge High Performer Fall 2024
G2 Badge Easiest To Use Fall 2024
G2 Badge Easiest To Do Business With Fall 2024
G2 Badge Users Love Us
ISO certification badge
AWS partner logo
Detectify logo
© 2025 Detectify