In today's IT environment, one of the biggest risks to a corporation's valuation is a security breach. Security Vendors make wide claims about the effectiveness of their products - making it almost impossible to identify the right vendor for your security needs.
From scanners and traditional pen tests to bug bounty programs, and platform-based security tests--- there's a lot of jargon and variation out there. What value does it all have? What requirements are the most important?
Use this comprehensive checklist to help you evaluate vendors.