AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Customer Stories

Customer Stories

Designing for Resilience: LastPass Prioritizes Security in Move to Cloud

Designing for Resilience: LastPass Prioritizes Security in Move to Cloud

Rebuilding in AWS gave LastPass a clean slate, but it also meant getting the architecture right. To be sure their security boundaries would hold, they partnered with Bishop Fox to test their cloud environment under realistic conditions and strengthen it where it mattered most.

Read Story
Customer Stories

Securing Airline Commerce: Penetration Testing for AWS Cloud Infrastructure

Securing Airline Commerce: Penetration Testing for AWS Cloud Infrastructure

A major airline technology platform turned to Bishop Fox after routine assessments kept missing the mark. What followed revealed unauthorized PCI database access, misconfigured IAM roles spanning hundreds of instances, and lateral movement across Active Directory domains — driving immediate remediation and stronger customer trust.

Read Story
Customer Stories

Fueling Security: How a Fortune 500 Utility Stays Ahead of Emerging Threats

Fueling Security: How a Fortune 500 Utility Stays Ahead of Emerging Threats

A Fortune 500 energy provider faces constant threats from nation-state actors targeting critical infrastructure. Partnering with Bishop Fox for Attack Surface Management and red team assessments, the company gained continuous visibility into their external perimeter...

Read Story
Customer Stories

Red Team Activated: Testing a Global Risk Intelligence Platform

Red Team Activated: Testing a Global Risk Intelligence Platform

To ensure its real-time AI platform could withstand sophisticated threats, a global SaaS company partnered with Bishop Fox for its first full red team assessment.

Read Story
Customer Stories

Enhancing AI Security: How Ventrilo.ai Revolutionizes Writing Assistance

Enhancing AI Security: How Ventrilo.ai Revolutionizes Writing Assistance

Ventrilo.ai partnered with Bishop Fox for application penetration testing and AI security assessments to ensure its writing assistant protects sensitive user data and withstands real-world threats.

Read Story
Customer Stories

John Deere Digital Security Journey: Securing Products Against Cyberattacks

John Deere Digital Security Journey: Securing Products Against Cyberattacks

Faced with securing complex, connected products, John Deere relied on in-depth product security reviews and ongoing protection through a managed offensive security platform.

Read Story
Customer Stories

Gravity-Defying Security: An Apollo.io Story

Gravity-Defying Security: An Apollo.io Story

Apollo selected Bishop Fox to perform a Google Security Assessment to evaluate the security of its application, external perimeter, and Google Cloud Platform (GCP) environment, as well as conduct a review of its responses to Google’s required self-assessment questionnaire (SAQ).

Read Story
Customer Stories

Equifax Employs Bishop Fox’s Cosmos for Continuous Security Testing

Equifax Employs Bishop Fox’s Cosmos for Continuous Security Testing

Global data leader Equifax runs year-round perimeter testing to safeguard high-value data and stay ahead of emerging threats.

Read Story
Customer Stories

Zoom Secures their Rapidly Expanding Attack Surface with Cosmos

Zoom Secures their Rapidly Expanding Attack Surface with Cosmos

During unprecedented growth—jumping from 10M to 300M+ daily participants—Zoom used continuous attack surface monitoring to protect its expanding platform.

Read Story
Customer Stories

Canyon Partners with Bishop Fox to Ensure the Security of Sensitive Legal Data

Canyon Partners with Bishop Fox to Ensure the Security of Sensitive Legal Data

Met aggressive Google Partner security requirements under tight deadlines without sacrificing quality.

Read Story
Customer Stories

Reltio Trusts Bishop Fox for Cloud Security Testing and Validation

Reltio Trusts Bishop Fox for Cloud Security Testing and Validation

Validated the security of its Kubernetes environments with independent cloud assessments, ensuring trust across its SaaS platform.

Read Story
Customer Stories

Aspire Chooses Bishop Fox for their Google Partner Security Assessment

Aspire Chooses Bishop Fox for their Google Partner Security Assessment

When they needed a security assessment to meet the requirements of the Google Partner Security Program, Aspire came to Bishop Fox. Bishop Fox evaluated their application, Azure environment, and external perimeter. As a result, the Aspire team satisfied Google's requirements.

Read Story
Customer Stories

Republic Services Chooses Bishop Fox for Continuous Testing that Scales

Republic Services Chooses Bishop Fox for Continuous Testing that Scales

Gained complete attack surface visibility through always-on testing at scale, detecting and neutralizing risks as they appear.

Read Story
Customer Stories

Parrot Chooses Bishop Fox for Privacy Audit and Application Penetration Testing

Parrot Chooses Bishop Fox for Privacy Audit and Application Penetration Testing

Underwent rigorous privacy audits and penetration testing for the FreeFlight 6 mobile app and API to ensure a secure user experience.

Read Story
Customer Stories

Developing a New Methodology for Illumio to Measure the Power of Micro-Segmentation

Developing a New Methodology for Illumio to Measure the Power of Micro-Segmentation

Proved the impact of micro-segmentation in slowing attackers with a custom testing methodology.

Read Story
Customer Stories

Salesflare Focuses on Application Security for the G Suite Marketplace

Salesflare Focuses on Application Security for the G Suite Marketplace

When Salesflare knew they needed to complete the new, required security assessment for the G Suite Marketplace, they chose Bishop Fox to secure their CRM product and verify their compliance.

Read Story
Customer Stories

Scaling up Google's Third-Party Security Program

Scaling up Google's Third-Party Security Program

When Google needed to ensure that their user data was being handled securely, they partnered with Bishop Fox to design a security assessment program that could validate the security posture of their 1,000+ G Suite partners. The result: the largest and most successful public third-party ecosystem testing program ever.

Read Story
Customer Stories

Sonos Makes Secure Moves with Bishop Fox

Sonos Makes Secure Moves with Bishop Fox

Secured a new voice-enabled speaker at launch by integrating security testing into every stage of development.

Read Story
Customer Stories

Wickr: How Bishop Fox Enables Wickr's Security Assurance

Wickr: How Bishop Fox Enables Wickr's Security Assurance

Validated products against real-world attack scenarios, delivering the transparency and assurance promised to customers.

Read Story
Customer Stories

Securing Boost.Beast

Securing Boost.Beast

A Non-Traditional Source Code Review Securing the Foundation of Thousands of Web Applications.

Read Story
Customer Stories

Coinbase: Managing Security Through Collaboration

Coinbase: Managing Security Through Collaboration

Combining the HackerOne Platform with Bishop Fox Security Consultants.

Read Story
Customer Stories

Change Healthcare: Securing a Competitive Advantage

Change Healthcare: Securing a Competitive Advantage

As their business expanded, we were there to help Change Healthcare grow and evolve their security posture.

Read Story
Customer Stories

Securing Mobile Security with Bluebox

Securing Mobile Security with Bluebox

Software Security Meets Cybersecurity. Bluebox needed a vendor to conduct a mobile security assessment of their solution. Bishop Fox established that security was the foundation of their software.

Read Story
Customer Stories

Iotium: Securing an Industrial IoT Platform

Iotium: Securing an Industrial IoT Platform

IoTium, a solution designed for the Industrial Internet of Things (IIoT), enlisted Bishop Fox to verify the security of their product offering.

Read Story

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.