Today Microsoft announced the MAPP program Top Vulnerability Contributors, Top Threat Indicator Submitters, and Top Zero-Day Reporting for the period of July 1, 2018 – June 30, 2019.
The Microsoft Active Protections Program provides security and protection to customers through cooperation and collaboration with industry leading partners.
While all MAPP partners have made a significant impact on the security ecosystem and are commended for their customer-first approach to security, these top contributors have gone above and beyond our expectations. Each partner shown here epitomizes the dedication and commitment to the security of our common customers.
Here are the top contributors in each category:
Vulnerability Top Contributors
Total number of vulnerabilities in Microsoft products reported to Microsoft, ranked highest, second highest and third highest.
Threat Indicator Top Contributors
The total number of threat indicators reported to Microsoft via our automated system, ranked highest, second highest and third highest.
Zero-Day Top Contributor
The total number of vulnerabilities reported to Microsoft that are under active attack, ranked highest, second highest and third highest.
Congratulations to these top partners, and thank you to all partners for helping protect the ecosystem!
*For over a decade, one of Microsoft’s partners in vulnerability research and disclosure has been Trend Micro’s Zero Day Initiative. In addition to ZDI’s vulnerability rewards program, Trend Micro is a longstanding member of the Microsoft Active Protections Program (MAPP). This year Trend Micro’s original security research was tracked with the community contributions of the ZDI program, and subsequently only recognized in our individual Most Valuable Researcher program. Moving forward, Trend Micro original research will also be included in our MAPP Top Contributing Partners program, in recognition of the substantial impact Trend Micro has in protecting Microsoft customers as well as the broader ecosystem.
Al Brown, Senior Security Strategist, Microsoft Security Response Center