top of page

FAQs & Resources

Who can participate in your evaluations?

We operate as partners with our clients, with the shared goal of enhancing products for the end user. At the outset, we define the scope of work but keep specific test cases confidential, similar to providing a curriculum before an exam without revealing the exact questions. Once the evaluation is complete, we share all data necessary for replication and validation, and collaborate closely with our clients to refine and improve their products.

Can I request an evaluation for my product?

Artifact Security offers comprehensive  bespoke security testing services tailored for the enterprise sector and security vendors.

 

Our team of experts  will assess your solution and provide detailed insights to enhance your security posture. Get in touch using the form below if you wish to be evaluated.

Methodologies

  • AI SOC Evaluation 1.0

  • Identity & Cloud Security Testing 1.0

  • Advanced Persistent Testing 1.1

  • Malware Scanning Certification 1.0

How much data is shared with tested vendors?

We operate as partners with our clients, with the shared goal of enhancing products for the end user. At the outset, we define the scope of work but keep specific test cases confidential, similar to providing a curriculum before an exam without revealing the exact questions. Once the evaluation is complete, we share all data necessary for replication and validation, and collaborate closely with our clients to refine and improve their products.

I have feedback on methodologies or reports!

We pride ourselves in our transparency. If something is unclear please don't hesitate to contact us below. Help us improve!

What threats were tested in X evaluation?

In all our reports you will find a link to download the full technique scope alongside detailed results of the evaluation.

Contact us

  • LinkedIn
bottom of page