FAQ

1How do the charitable donations work?

We are passionate about security and helping our clients and communities.

We set aside a portion of all revenue to be given to reputable, charitable organizations. We focus heavily on medical and educational charities. We encourage our employees to donate one day a month to volunteer for a reputable cause of their choice.

We are hackers with hearts and want to make this a more secure, beautiful world together.

2How much do testing services cost?
We operate on a Penetration Testing as a Service (PTaaS) model. We sell services in terms of credits that can be used for cybersecurity engagements. We offer discounts for bulk credit purchases and donate a portion to charitable causes. This allows our clients to leverage our team of experts to address the most pressing security concerns.
3How do you attract and retain top cybersecurity talent?
All consultants are vetted in a multi-staged approach, including verifying industry certifications, background checks, referrals, technical interviews, and an intensive live demonstration of their hacking abilities in a custom-built Blue Mana Labs assessment environment.
4Do you guarantee your work?
Absolutely! Each client is unique and essential to our success. We take pride in our work and stand behind each engagement. If you're dissatisfied with our services, we'll be sure to work with you to make it right.
5What is your retest policy?
After each engagement, we offer a complimentary 90-day follow-up to retest vulnerabilities.
6Are you licensed and insured?
Yes! Our team is constantly researching and obtaining industry-recognized certifications. We hold numerous certifications from brand leaders, including Palo Alto Networks, Offensive Security, eLearnSecurity, and CompTIA. We also hold insurance relative to our industry to protect all stakeholders from start to finish.
7How is testing performed?

We perform all of our operations remotely. In most cases, all testing will originate from one IP address for easy network traffic recognition of our penetration testing efforts.

For internal and external penetration testing services, we offer several options:


  1. You provide VPN access to your network for testing.
  2. You provide SSH access to a virtual machine within your environment.
  3. We provide you with a deployable virtual machine (OVA format)
  4. We mail a physical device to be attached to your network.

For wireless assessments, we must provide a physical network device with specialized wireless equipment. We've configured the devices to be plug-and-play but will be on standby to answer any questions.

8I'm ready to get started, what's next?

Wonderful! Let's do this! Start by filling out the contact form first.

We will reach out for our initial, no-cost consultation and scoping call. We'll talk about questions and concerns at this stage, then send a proposal for the engagement.

The exciting part comes upon acceptance of the proposal. We will begin our testing! We will contact you immediately and walk through remediation on the call if any critical issues are found during the engagement.

After our testing, we will set up a video conference call to review the findings report and answer any questions about our observations. We offer a 90-day follow-up as part of every engagement where we can verify if the identified vulnerabilities have been remediated.

Finally, we set aside a portion of the project cost for charity. Not only have you enhanced the security posture of your business, but you've directly contributed to the betterment of the community without leaving your comfy office chair! Nicely done!

CONTACT US