Pied Piper Inc.

https://silicon-valley.fandom.com/wiki/Pied_Piper_(company)
Member since
verified by turingsecure

Pied Piper Inc. (PP) was an American tech company based in Silicon Valley, California. The company was formed in 2014 by Richard Hendricks as a company to develop Richard's algorithm that he'd created. The company is best known to for achieving the highest Weissman score in history during their presentation at TechCrunch Disrupt.

Security Score

The Security Score is determined by evaluating the effectiveness of the security controls, the risk associated with the system or organization, and the overall security level of the environment in which the system or organization operates. Security scores can be used to compare the security posture of a system or organization with others and to determine whether security controls are effective and up-to-date.

1/10

High - Realistic Risk

The assets audited by turingsecure are exposed to a high level of risk. A high number of findings or serious vulnerabilities were identified during the audits performed. There is a realistic risk that attackers will compromise your assets and potentially cause major damage. You should address the identified issues immediately according to their criticality and fix them promptly.

General

The security page is used to inform and report vulnerabilities and incidents that threaten the company's security or compliance policies.

Our top priority is your information security

We care about our operational security, so we have established a process and rewards to create a way to report security issues. If you have discovered a security issue that you think we should know about, we would be happy to get in touch with you.

Highest security and compliance at every stage for everyone

On this page we present information and processes for our Cyber Security and Compliance. Customers, employees and white-hat hackers as well as other stakeholders have the opportunity to communicate with the responsible contact persons.

Bug Bounty Programm

Bug bounties motivate hackers to find vulnerabilities in software. Fair treatment and appropriate compensation encourage them to report the gaps to the company.

Policy

We also ask for an exploit or proof of concept for reports. If you can't produce an attack, even a hypothetical one, we are unlikely to award a bounty.

Vulnerabilities

We usually use the CVSS calculator to determine the severity level. We reward bounties based on the severity level. We usually use the CVSS calculator to determine the severity level. We reward bounties based on the severity level.

Rewards

When a vulnerability is successfully validated, the finder is linked on our site in a Hall of Fame.

Scope

We also consider the following areas to be out of scope, though there may be some exceptions:

  • Social engineering (phishing) of Airtable staff or users
  • Username or email enumeration

Scope

TypeValueDescription

Infrastructure

192.168.0.0/24

Cloud

aws:774567185497

MobileApp

https://play.google.com/store/apps/details?id=com.piedpiper.spacesaver

WebApp

https://platform.piedpiper.com

Certificates Standards & Compliance Guidelines

Leverage our comprehensive security certification to demonstrate IT security standards and compliance policies to customers and users.

ISO 27001

ISO 27001 is an information security certificate, crucial for protecting essential client information and other private materials. It focuses on a process-based approach to operating and maintaining a strict ISMS.

General Data Protection Regulation (GDPR)

The General Data Protection Regulation (GDPR) is the toughest privacy and security law in the world. Though it was drafted and passed by the European Union (EU), it imposes obligations onto organizations anywhere, so long as they target or collect data related to people in the EU.

Penetration Tests

Take advantage of our comprehensive security certification to bring IT security awareness to customers and users.

Objective

To develop enduringly secure applications, we have integrated application security directly before any software artifact is released. By testing early in the development process, our development teams can close security gaps before they reach the customer. This increases our software and product quality.

Delimitation

The goal of this scan was to identify and evaluate any security flaws in the system environment. Due to the high application complexity, an extensive test period was defined. In order to be able to audit all settings, demo accesses with the required rights were provided.

Schedule

Our scans are integrated into the development cycle and are run whenever a change to the software occurs. If no change takes place, a scan is performed on a daily basis.

Scope

TypeValueDescription

Infrastructure

192.168.0.0/24

MobileApp

https://play.google.com/store/apps/details?id=com.piedpiper.spacesaver

Cloud

aws:774567185497

WebApp

https://platform.piedpiper.com

Automated Security Scans

Automated vulnerability scanning is a way of scanning systems or applications using only automated tools.

Objective

To develop enduringly secure applications, we have integrated application security directly before any software artifact is released. By testing early in the development process, our development teams can close security gaps before they reach the customer. This increases our software and product quality.

Delimitation

The goal of this scan was to identify and evaluate any security flaws in the system environment. Due to the high application complexity, an extensive test period was defined. In order to be able to audit all settings, demo accesses with the required rights were provided.

Schedule

Our scans are integrated into the development cycle and are run whenever a change to the software occurs. If no change takes place, a scan is performed on a daily basis.

Scope

TypeValueDescription

Infrastructure

192.168.0.0/24

WebApp

https://platform.piedpiper.com

Contact

Address of the owner of the Security Page.

Address

Pied Piper Inc.
5230 Newell Road
Palo Alto
United States

powered by turingsecure.

turingsecure offers a modern approach to maximize application security with automated security analysis in the development process and on-demand solutions with flexible service level agreements.

logo.min.svg
© 2024 turingpoint GmbH. All rights reserved. Made with by Pulso Media.