Latka logo

Top 37 Penetration Testing Software SaaS Companies in May 2026

As of May 2026, there are 37 SaaS companies in Penetration Testing Software. They have combined revenues of $840.3M and employ 6.6K people. They have raised $837.8M and serve 2.8K customers combined.

Penetration Testing Software is designed to assess the security of computing systems and networks through simulated cyber attacks. These tools enable organizations to identify and remediate vulnerabilities before they can be exploited by malicious actors. Conducting penetration testing helps organizations verify the effectiveness of their security measures and compliance with regulatory requirements. The primary use cases for penetration testing software include testing web applications, APIs, networked systems, and mobile applications. Typical features often include vulnerability scanning, reporting dashboards, and automated testing capabilities to streamline the assessment process. Users of these solutions typically belong to IT security teams, compliance officers, and risk management professionals, each aiming to enhance their organization's overall security posture and protect sensitive data from threats.

Companies
37
Revenue
$840.3M
Funding
$837.8M
Employees
6.6K

Filters

Sorting: Highest -> Lowest

Filters

Top Penetration Testing Software Companies

Showing 10 of 37 companies ranked by annual revenue.

1
Bugcrowd

San Francisco, California, United States

Operator of a crowd-sourced security platform intended to help organizations with a customized security testing program to bolster their security posture. The company's platform offers cost-effective and security testing programs to manage bug bounty, vulnerability disclosure and next-gen pen test programs, enabling clients to commission a customized security testing program that fits their specific requirements.

Revenue
$328.2M
Customers
-
Year founded
2012
Funding
$78.7M
Team size
2.8K
Growth
72.9%
2
Pentera

Burlington, Massachusetts, United States

Pentera is an American cybersecurity software company, specializing in automated security validation solutions. The company empowers organizations to easily test the integrity of all cybersecurity layers, providing solutions to detect and warn of system vulnerabilities.

Revenue
$117.4M
Customers
-
Year founded
2015
Funding
$249.5M
Team size
461
Growth
-
3
Intigriti

United States

Intigriti is the trusted leader in crowdsourced security. Since 2016, we’ve empowered the world’s largest organizations to proactively identify and address vulnerabilities before they're exploited by cybercriminals. Harnessing the expertise of our 100,000+ researchers, businesses can detect vulnerabilities as soon as they surface, avoiding the costly damage of security breaches. Through our meticulous triaging process, commitment to legal compliance, and unparalleled customer service, we deliver the utmost reliability for our customers. Intigriti is proud to help industry leaders safeguard their digital assets and thrive in an ever-evolving threat landscape.

Revenue
$53.9M
Customers
-
Year founded
2016
Funding
-
Team size
490
Growth
-
4
Cobalt

Boston, Massachusetts, United States

Pen Testing as a Service (PTaaS) platform

Revenue
$51M
Customers
600
Year founded
2013
Funding
$506.5M
Team size
497
Growth
81.96%
5
Horizon3.ai

San Francisco, California, United States

Horizon3.ai is a cybersecurity company specializing in autonomous penetration testing and vulnerability management. Its flagship platform, NodeZero™, helps enterprises prioritize defensive efforts against actual threats.

Revenue
$50.7M
Customers
-
Year founded
2019
Funding
-
Team size
258
Growth
-
6
YesWeHack

United States

YesWeHack is a leading Bug Bounty and Vulnerability Management Platform. Founded by ethical hackers in 2015, YesWeHack connects organisations worldwide to tens of thousands of ethical hackers, who uncover vulnerabilities in websites, mobile apps, connected devices and digital infrastructure. Bug Bounty programs benefit from in-house triage, personalised support, a customisable model and results-based pricing. Clients include Tencent, Swiss Post, Orange France and the French Ministry of Armed Forces. The YesWeHack platform offers a range of integrated, API-based solutions: Bug Bounty (crowdsourcing vulnerability discovery); Vulnerability Disclosure Policy (creating and managing a secure channel for external vulnerability reporting); Pentest Management (managing pentest reports from all sources); Attack Surface Management (continuously mapping online exposure and detecting attack vectors); and ‘Dojo’ (ethical hacking training). YesWeHack complies with strict security, financial traceability and privacy requirements. YesWeHack’s services are ISO 27001- and ISO 2701-certified and accredited by CREST. YesWeHack’s infrastructure uses EU-based, GDPR-compliant private hosting that meets the most stringent standards: ISO 27001, ISO 27017, ISO 27018, ISO 27701 and SOC II Type 2. The YesWeHack platform is also permanently subject to a public Bug Bounty Program. Find out more at www.yeswehack.com

Revenue
$38.2M
Customers
-
Year founded
2015
Funding
-
Team size
347
Growth
-
7
PortSwigger

Knutsford, Cheshire, United Kingdom

PortSwigger is a global leader in cybersecurity, specializing in web application security testing. They created Burp Suite, the leading toolkit for web application security testing.

Revenue
$35.7M
Customers
-
Year founded
2008
Funding
-
Team size
254
Growth
-
8
Yogosha

Paris, France

Yogosha is a french bug bounty platform.

Revenue
$27M
Customers
100
Year founded
2015
Funding
$2.2M
Team size
210
Growth
115.19%
9
CyberSmart

London, United Kingdom

cybersecurity company

Revenue
$16.2M
Customers
-
Year founded
2016
Funding
-
Team size
67
Growth
24.73%
10
Ioactive, Inc

Seattle, Washington, United States

IOActive is a security consultancy with a global presence and deep expertise spanning hardware, software, and wetware.

Revenue
$15.1M
Customers
-
Year founded
1998
Funding
-
Team size
154
Growth
-

Inclusion Criteria

- The software must provide functionality for simulating real-world cyber attack scenarios. - It should identify vulnerabilities across various platforms, including web applications and networks. - The solution must include comprehensive reporting tools to document findings and recommendations. - It should facilitate remediation tracking to ensure vulnerabilities are addressed. - Not just a scanning tool; it must also support active exploitation techniques to assess security measures.

Penetration Testing Software SaaS Companies | GetLatka