Tumar
Tumar is a program for rewarding the discovery of vulnerabilities in information systems and resources.
Learn moreWhat is Tumar?
Tumar is a program used by a company to engage independent researchers (called “white hats”, “bug hunters” or “researchers” in the industry) to identify vulnerabilities in information systems and resources for a monetary reward.
The company publicly announces the reward scope and level, after which the volunteers can register on the platform and take part in the program.
Approach to resolving vulnerability in government and business information systems
Use cash flow underwriting to accurately predict credit default risk, evaluate missing and low-income consumers.
Researchers can discover what your specialists may have overlooked or missed in ensuring the information security of your systems and resources
You can create a private project and invite researchers to solve your problem
By participating in the program, you will be able to receive a vulnerability report with elimination recommendations confirmed by TSARKA analysts
Start your research now
To participate in the program, you should act ethically and strictly adhere to the established rules. Be sure to read all the rules before you start discovering vulnerabilities.
Learn moreReliable and safe
Our infrastructure is built to ensure privacy, security and protection of our clients, partners and researchers.
Compliance
Compliance is a top priority and we guarantee that our solutions, systems and processes comply with applicable laws and regulations.
All is confidential
For consumer safety and compliance with customer requirements, we use AWS-managed disk-level encryption and do not collect, sell or store platform member data.
Independent audit
Our processes and systems are regularly audited for compliance with industry standards by independent third parties.
Feedback
Why us?
Our company tries to create a bridge between large companies and IT community. Collectively, we will get a more profitable and effective mechanism for ensuring a high-level security of information systems and resources.