About Us

We are passionate about security.

Our History

The security of the hosting industry has always been a concern of RACK911 and in May of 2013 we decided to take a more proactive role by creating a new brand called RACK911 Labs that specializes in finding security vulnerabilities.

Using our many years of internet security experience, we are able to look at software and see security vulnerabilities that the developers were not able to see. More importantly, we are often able to see the security vulnerabilities before anyone else which allows us to work with the developer and get a patch out before someone malicious is able to write a zero day exploit.

While we are widely considered to be the leaders of security in the hosting industry, it is our ultimate plan to expand to other markets and bring our experience, skills and proven vulnerability research to help keep the internet safe. So much is at stake when data is compromised and we are going to do everything we can to help minimize that by securing software one at a time.

Our Customers

Our primary customers are developers of software being used in a multi-user environment such as hosting, cloud, eCommerce and customer relations. We've done software security audits of products used by hundreds of end users all the way up to products widely used in the mass market with millions of end users.

In addition to our software security auditing, we are also very active in claiming public and private "bug bounties" for finding security vulnerabilities in high profile software and websites. Our bug bounty portfolio includes names such as Apple, cPanel, eBay, Parallels and Yahoo! to name just a few. We weren't kidding when we said security is our passion, as you can see we even do this in our free time!

Whether you're a small business with one employee or a Fortune 500 company, we have the experience to help find security vulnerabilities in your software without breaking the bank. The cost of a software security audit is a fraction compared to the damage that could be done by a hacker exploiting a vulnerability, not to mention the risk of lawsuits and other liabilities from any customers who may have been affected.