Overview
What is Intruder?
Intruder is a cloud-based vulnerability management platform designed for small and medium-sized businesses. It aims to help companies find weaknesses in their internet-facing systems through proactive security monitoring. With its unique threat prioritization feature, Intruder saves time by scanning...
Pricing
Entry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Starting price (does not include set up fee)
- $127 per month 1 infrastructure target
Product Demos
Authenticated Web Application Scanning | Intruder
Product update - Spotlight on analytics
Product updates - July 2023 - New integrations in-portal advisories and more
Product Details
- About
- Integrations
- Competitors
- Tech Details
- FAQs
What is Intruder?
Intruder is a cloud-based vulnerability management platform designed for small and medium-sized businesses. It aims to help companies find weaknesses in their internet-facing systems through proactive security monitoring. With its unique threat prioritization feature, Intruder saves time by scanning for new threats automatically.
This software comes with an enterprise-grade scanning tool that can conduct comprehensive checks following the process used by corporations and governments, making it an effortless vulnerability management solution for organizations with limited internal resources. The continuous monitoring functionality of Intruder conducts automated assessments and helps teams fix issues before they become a problem.
Moreover, Intruder comes packed with additional features like risk assessment, configuration mapping, bug identification, and perimeter scanning tools that allow users to filter information and generate context-based results to quickly identify unnecessary exposure areas. Additionally, firms can generate regular reports using this software and share them with customers as proof of data protection measures being taken. Overall Intruder provides complete vulnerability management capabilities for any business looking to improve their cybersecurity posture.
Intruder Features
Vulnerability Management Tools Features
- Supported: IT Asset Realization
- Supported: Authentication
- Supported: Configuration Monitoring
- Supported: Web Scanning
- Supported: Vulnerability Intelligence
Threat Intelligence Features
- Supported: Vulnerability Classification
- Supported: Automated Alerts and Reporting
Intruder Screenshots
Intruder Video
Intruder Integrations
Intruder Competitors
Intruder Technical Details
Deployment Types | Software as a Service (SaaS), Cloud, or Web-Based |
---|---|
Operating Systems | Unspecified |
Mobile Application | No |