Intruder vs. Rapid7 InsightVM

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Intruder
Score 8.8 out of 10
N/A
Intruder, from Intruder Systems in London, is a cloud-based vulnerability scanner that finds cyber security weaknesses in digital infrastructure, to avoid costly data breaches.
$127
per month 1 infrastructure target
Rapid7 InsightVM
Score 8.2 out of 10
N/A
InsightVM is presented as the next evolution of Nexpose, by Rapid7. This Insight cloud-based solution features everything included in Nexpose, such as Adaptive Security and the proprietary Real Risk score, and extends visibility into cloud and containerized infrastructure. InsightVM also offers advanced remediation, tracking, and reporting capabilities not included in Nexpose.
$19
per GB
Pricing
IntruderRapid7 InsightVM
Editions & Modules
No answers on this topic
Log Management
$19
per GB
Vulnerability Management
$22
per asset
insightIDR
$52
per asset
Application Security
$2,000
per app
insignConnect
Contact sales team
Offerings
Pricing Offerings
IntruderRapid7 InsightVM
Free Trial
YesNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
YesNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Features
IntruderRapid7 InsightVM
Threat Intelligence
Comparison of Threat Intelligence features of Product A and Product B
Intruder
-
Ratings
Rapid7 InsightVM
8.4
3 Ratings
6% above category average
Network Analytics00 Ratings8.33 Ratings
Threat Recognition00 Ratings8.03 Ratings
Vulnerability Classification00 Ratings8.33 Ratings
Automated Alerts and Reporting00 Ratings8.73 Ratings
Threat Analysis00 Ratings8.33 Ratings
Threat Intelligence Reporting00 Ratings8.52 Ratings
Automated Threat Identification00 Ratings8.33 Ratings
Vulnerability Management Tools
Comparison of Vulnerability Management Tools features of Product A and Product B
Intruder
-
Ratings
Rapid7 InsightVM
8.3
3 Ratings
3% above category average
IT Asset Realization00 Ratings8.03 Ratings
Authentication00 Ratings8.33 Ratings
Configuration Monitoring00 Ratings8.73 Ratings
Web Scanning00 Ratings8.33 Ratings
Vulnerability Intelligence00 Ratings8.33 Ratings
Best Alternatives
IntruderRapid7 InsightVM
Small Businesses
ThreatDown, powered by Malwarebytes
ThreatDown, powered by Malwarebytes
Score 7.8 out of 10
ThreatDown, powered by Malwarebytes
ThreatDown, powered by Malwarebytes
Score 7.8 out of 10
Medium-sized Companies
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.2 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.2 out of 10
Enterprises
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.2 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.2 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
IntruderRapid7 InsightVM
Likelihood to Recommend
9.0
(1 ratings)
8.7
(11 ratings)
Support Rating
-
(0 ratings)
7.2
(2 ratings)
User Testimonials
IntruderRapid7 InsightVM
Likelihood to Recommend
Intruder Systems
When the infrastructure landscape and risk profile is not well known and is legacy, Intruder can scan and automate reporting on open security risks, as well as coordinate responses.
Read full review
Rapid7
Rapid7 InsightVM is perfect for a scenario where IT admin or CISO wants to scan its infrastructure to be sure that there is no vulnerability that could be exploited from outside or inside the company. It also could be used to automate patching and dealing with vulnerabilities. It's also adapted for users that need cloud security management
Read full review
Pros
Intruder Systems
  • Auto scanning.
  • New vulnerability detection.
  • Alert levels.
Read full review
Rapid7
  • Being a vulnerability scanner tool, its purpose is to scan the systems to find the vulnerabilities. We can define the assets like IP address for the scans and it also allows to either schedule the scan at a preferred time or start the scan immediately. Upon completion of the scan, this tool can result provide the details like host type, OS information, hardware address, along with the vulnerabilities.
  • Rapid7 Nexpose has a list of templates to perform the scan. Once the templates are defined then the scans are performed accordingly.
  • It also contains an option to add credentials/authentication using passwords, usernames, private keys to perform the credential-based scans which I think is a great feature.
Read full review
Cons
Intruder Systems
  • Reports could contain more detail.
Read full review
Rapid7
  • In comparison to Tenable SecurityCenter we saw it didn't exactly find the same vulnerabilities which we would assume it should have
  • We rely on a ticketing system and not our VM tool to assign tasks so wasn't too useful having that in there
  • Filtering capabilities aren't as good as its competitors
Read full review
Support Rating
Intruder Systems
No answers on this topic
Rapid7
I gave it a seven due to the functionality and general ease of use after the initial setup headaches, but compared to Qualys, Rapid7 Nexpose falls short on features and ease of use. Their support drags this rating down a point as well. I have gone weeks with no update on semi-critical issues and typically have to make call after call to get a semi-coherent response.
Read full review
Alternatives Considered
Intruder Systems
Intruder focuses on scanning network blocks for your servers even if you don't know which services or hostnames are running on them, unlike Detectify which requires a domain or hostname to scan. The network port scanning of Intruder is also broader than many competitors.
Read full review
Rapid7
Nessus Pro does scans, but does not maintain an inventory from scan to scan. There is no history for a specific device, you have to look inside the results of each scan. Search across inventory is non-existent. There are no dashboards for data analysis. This is no tracking for remediation
Read full review
Return on Investment
Intruder Systems
  • Improved security profile.
  • Better reporting to stakeholders and clients of the current security risks.
Read full review
Rapid7
  • Can reduce time to patch most critical vulnerabilities
  • Can help to identify who is spending time patching things of lower risk thus keeping the organization in a more vulnerable position
  • Easily provides the patch team with a work plan to enhance security more quickly
Read full review
ScreenShots

Intruder Screenshots

Screenshot of The Intruder dashboardScreenshot of Cloud connectorsScreenshot of Network viewScreenshot of Issues pageScreenshot of Targets page