Great scanner for networks of any size!
February 08, 2022

Great scanner for networks of any size!

Jarrod Meyer | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Intruder

We use Intruder to scan for external vulnerabilities across the various fleets of servers.
  • Auto scanning.
  • New vulnerability detection.
  • Alert levels.
  • Reports could contain more detail.
  • Vulnerability scanning.
  • Risk level warnings.
  • Improved security profile.
  • Better reporting to stakeholders and clients of the current security risks.
Intruder focuses on scanning network blocks for your servers even if you don't know which services or hostnames are running on them, unlike Detectify which requires a domain or hostname to scan. The network port scanning of Intruder is also broader than many competitors.

Do you think Intruder delivers good value for the price?

Yes

Are you happy with Intruder's feature set?

Yes

Did Intruder live up to sales and marketing promises?

Yes

Did implementation of Intruder go as expected?

Yes

Would you buy Intruder again?

Yes

When the infrastructure landscape and risk profile is not well known and is legacy, Intruder can scan and automate reporting on open security risks, as well as coordinate responses.