How Intel leverages Intigriti to create a unified security reporting channel
The challenge
Intel, a global leader in semiconductor manufacturing, faced the challenge of managing multiple channels for vulnerability reporting across their vast product portfolio. With various entry points for security researchers to submit findings, the company needed to consolidate these streams into a single, efficient system. The fragmented approach risked inconsistent handling of security reports, potential oversight of critical vulnerabilities, and inefficient resource allocation. Intel needed a unified solution that would streamline vulnerability management while remaining accessible to external researchers.
We've started to shift all of the folks that we engage with externally to try to push them into the bug bounty program so that we have a unified, single front door instead of a bunch of different front doors that all lead to the same place.
Chris Holt
Bug Bounty Program ManagerThe solution
Intel chose Intigriti to expand and enhance their long-running bug bounty program as the centralized platform for all vulnerability reporting. This strategic decision unified their security reporting channels while maintaining flexibility for researchers.
Key benefits of their bug bounty program include:
Streamlined reporting process: Creating an accessible "single front door" for all vulnerability submissions, regardless of how researchers prefer to deliver their findings.
Researcher-friendly approach: Designed with the researcher experience in mind, making the program accessible and easy to work with for the external security community.
Continuous improvement philosophy: Regular evaluation of the program's effectiveness and openness to evolving the platform based on user feedback and emerging needs.
Working with the customer success team at Integrity has been really critical to being able to produce content and answer questions for my leadership team and our executives. It's been incredible to work with our customer success manager
Chris Holt
Bug Bounty Program ManagerThe result
The enhancement of Intel's bug bounty program has transformed their vulnerability management process significantly:
Consolidated security reporting: Over 90% of externally identified vulnerabilities now flow through the unified bug bounty program, creating consistency in processing and response.
Expanded researcher engagement: The program's focus on accessibility has attracted a broader community of security researchers, enhancing Intel's visibility into potential vulnerabilities.
Stronger security ecosystem: By actively working to grow the security researcher community and train new people, Intel's bug bounty program contributes to the development of the broader security ecosystem.
Enhanced executive visibility: The program provides valuable data that helps answer questions for Intel's leadership team and executives, improving security governance and oversight.
Effective partner support: Collaboration with a dedicated customer success team ensures Intel can produce content, generate reports, and address executive questions effectively.
Intel
Intel Corporation is a global technology leader in the semiconductor industry, designing and manufacturing essential technologies that power computers, servers, networking equipment, and other devices worldwide. With a decades-long commitment to security.
Industry
Technology
Employees
131.000+
Global customers
2.000+
Request a demo!
"A pentest is often a mile wide and an inch deep, while a bug bounty initiative is an inch wide and a mile deep—depth over breadth in uncovering hard-to-find vulnerabilities."
David Andersson,
Grafana Security Engineering Manager