Bishop Fox named “Leader” in 2024 GigaOm Radar for Attack Surface Management. Read the Report ›

We are Battle Tested

Trusted by Leading Brands

We are honored to work with the brands you know and love to solve their biggest offensive security challenges and to help protect the most important data and systems on the planet.

Our team is committed to delivering the highest quality work and the best customer experience in the industry...and we think that's reflected in our results. We take feedback very seriously and are proud that our customers consistently rank us as "world-class" in our NPS surveys.

Customers Hero Montage C

Icon Projects Dark BG B

16K+ Projects in Last 3 Years

Icon Globe Dark BG

1K+ Customers Protected

NPS Icon

86 Our "World-Class" Net Promoter Score

Icon Fortune 100 Co Dark BG

26% of Fortune 100 Organizations

Icon Top Tech Dark BG

80% of the Top 10 Global Tech Companies

Icon Media Dark BG D

100% of the Top 5 Global Media Companies

We've Got a Proven Track Record

Here are some of the amazing companies we've had the pleasure to work with.

White Google logo for code assisted penetration testing case study.
White John Deere logo for network security case study.
Equifax logo for offensive security case study. Equifax Employs Bishop Fox’s Cosmos (formerly CAST) for Continuous Security Testing.
White Zoom logo for application security services case study.
White Sonos logo on ioXt certification page. Sonos Makes Secure Moves with Bishop Fox.
Logo change healthcare
August Home white logo for Bishop Fox customer story on  mobile application penetration testing. August: Built-in Security in IoT Devices. Application Security: Mobile Application Assessment Service.
White Workplace logo on network security page.
Amazon logo for application security services case study.
Parrot logo for application penetration testing security case study.
White Coinbase logo on network application security services page.
White Wickr logo for security architecture review customer story.
White Reltio logo for Bishop Fox application security services customer story. Reltio Trusts Bishop Fox for Cloud Security Testing and Validation.
Illumio logo for Bishop Fox Customer Story on micro-segmentation efficiency as a security control.
White Aspire logo for security program review case study. Z_Archived_VSA: Google Partner Security Recertification.
White Salesflare logo for penetration testing and security RFI evaluations case study.
Canyon logo for internal penetration testing customer story.
Republic services logo white

Real Customers. Real Stories. 

See how we've helped industry leaders secure their teams, products, and attack surfaces.

John Deere Customer Story: Bishop Fox consultants on site to secure John Deere products against cyberattacks.
Customer Story

John Deere Digital Security Journey: Securing Products Against Cyberattacks

To help ensure John Deere products are ready to withstand security threats, John Deere chooses Bishop Fox's Cosmos platform and product security reviews.

Learn More
Equifax Employs Bishop Fox’s Cosmos (formerly CAST) for Continuous Security Testing. Equifax is working with Bishop Fox for continuous security testing of their external perimeter.
Customer Story

Equifax Employs Bishop Fox’s Cosmos (formerly CAST) for Continuous Security Testing

As a global data, analytics, and technology company, Equifax plays an essential role in the global economy by helping employers, employees, financial institutions, and government agencies make critical decisions with greater confidence. The company has worked with Bishop Fox for continuous security testing for their external perimeter since 2020.
Learn More
Zoom chose Bishop Fox for continuous security testing to add to their robust security program.
Customer Story

Zoom Secures their Rapidly Expanding Attack Surface with Cosmos (formerly CAST)

As businesses and users have shifted to remote work environments, Zoom has experienced unprecedented growth in their user base – from 10M daily meeting participants in December 2019 to 300M in April 2020. To protect these new users, Zoom sought out continuous security testing to add to their robust security program.
Learn More
Sonos engaged Bishop Fox to secure their new voice-enabled speaker. Sonos Makes Secure Moves with Bishop Fox.
Customer Story

Sonos Makes Secure Moves with Bishop Fox

When Sonos was bringing a new voice-enabled speaker to the market, they turned to Bishop Fox to ensure that new features didn’t put customers at risk.
Learn More
Republic Services Customer Story on attack surface management with continuous pen testing. Republic Services Chooses Cosmos (formerly CAST) for Continuous Testing that Scales.
Customer Story

Republic Services Chooses Cosmos (formerly CAST) for Continuous Testing that Scales

Republic Services chose Bishop Fox’s Cosmos service to gain visibility into their attack surface and to discover, analyze, and investigate security risks as they emerge in order to prevent attacks and data breaches.

Learn More
Reltio chose Bishop Fox for Cloud Security Testing and Validation. Reltio Trusts Bishop Fox for Cloud Security Testing and Validation.
Customer Story

Reltio Trusts Bishop Fox for Cloud Security Testing and Validation

Reltio, an award-winning provider of the first cloud-native master data management (MDM) SaaS platform, engaged with Bishop Fox to act as outside experts to assess their security practices with a specific focus on cloud security for their Kubernetes environments.
Learn More
August Home customer story on IoT devices security. August: Built-in Security in IoT Devices.
Customer Story

August: Built-in Security in IoT Devices

Home Security Meets Cybersecurity to Secure Homes Without Introducing Backdoors to the Back Door.
Learn More
Illumio and Bishop Fox measure the impact of Micro-Segmentation on network security.
Customer Story

Developing a New Methodology for Illumio to Measure the Power of Micro-Segmentation

When Illumio wanted to objectively prove the value of micro-segmentation as a security control, they turned to Bishop Fox to develop an unbiased testing methodology that showed how increased segmentation meant increased time and effort for attackers.
Learn More
Customer story on how Bishop Fox helps Wickr build a healthy security program.
Customer Story

Zephyr Health: Building a Healthy Security Program

When Zephyr Health needed help keeping sensitive Patient Health Information secure, they turned to Bishop Fox.
Learn More
Customer Story on how Wickr augment and prove the security of their products and services.
Customer Story

Wickr: How Bishop Fox Enables Wickr's Security Assurance

When Wickr needed to prove that their products and services were secure, they turned to the experts at Bishop Fox to validate their security and provide the transparency pledged in their Customer Security Promises.
Learn More
Parrot chose Bishop Fox to conduct a security assessment of FreeFlight mobile app and its web API.
Customer Story

Parrot Chooses Bishop Fox for Privacy Audit and Application Penetration Testing

Bishop Fox conducted a privacy audit and security assessment of Parrot’s FreeFlight 6 mobile application for iOS and Android as well as their corresponding web API.
Learn More
Canyon Chooses Bishop Fox to Ensure the Security of Sensitive Legal Data
Customer Story

Canyon Partners with Bishop Fox to Ensure the Security of Sensitive Legal Data

When Canyon needed a thorough third-party assessment to fulfill their Google Partner security requirements, they turned to Bishop Fox to meet an aggressive deadline without sacrificing quality.
Learn More

DISCOVER AN AWARD-WINNING DIFFERENCE

We're proud to be recognized as the leader in offensive security.

Gigaom Radar Award badge 2024 for the Attack Surface Managment leader.
GigaOm radar report 2024 badge for fast mover.
Global Infosec Awards Winner 2023
Bishop Fox winner of the 2021 SC award for best emerging technology.
Bishop Fox winner of the Stevie Silver Awards 2022.
FastCompany Logo on yellow background with Best Workplaces for Innovators 2022 award

Ready to Get Started? Let's Connect.

We'd love to chat about your offensive security needs. We can help you determine the best solutions for your organization and accelerate your journey to forward defense.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.