Introducing G2.ai, the future of software buying.Try now

Compare Cobalt and Intruder

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Cobalt
Cobalt
Star Rating
(147)4.5 out of 5
Market Segments
Mid-Market (51.4% of reviews)
Information
Entry-Level Pricing
Contact Us
Browse all 3 pricing plans
Intruder
Intruder
Star Rating
(197)4.8 out of 5
Market Segments
Small-Business (60.1% of reviews)
Information
Entry-Level Pricing
Starting at $149.00 Per Month
Free Trial is available
Browse all 4 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that Intruder excels in ease of use with a score of 9.5, while Cobalt trails slightly behind at 9.2. Reviewers mention that Intruder's intuitive interface allows for quick navigation and efficient task completion, making it particularly appealing for small businesses.
  • Reviewers mention that Intruder's quality of support is outstanding, scoring 9.7 compared to Cobalt's 9.2. Users on G2 highlight the responsiveness and helpfulness of Intruder's support team, which is crucial for businesses needing immediate assistance.
  • Users say that Intruder's vulnerability scan feature is highly effective, scoring 9.6, while Cobalt's is rated at 8.7. Reviewers mention that Intruder provides comprehensive scanning capabilities that help identify potential security threats more efficiently.
  • G2 users report that Intruder's product direction is highly positive, scoring 9.8, compared to Cobalt's 8.6. Users appreciate Intruder's commitment to continuous improvement and innovation, which aligns well with the evolving needs of small businesses.
  • Reviewers mention that both products offer robust reporting and analytics features, scoring equally at 9.1. However, users on G2 note that Intruder's reports are more user-friendly and visually appealing, making it easier to interpret data.
  • Users report that Intruder's API and integrations score 8.5, while Cobalt's is slightly lower at 8.0. Reviewers mention that Intruder's seamless integration with other tools enhances workflow efficiency, which is a significant advantage for small businesses looking to streamline operations.
Pricing
Entry-Level Pricing
Cobalt
Standard
Contact Us
Browse all 3 pricing plans
Intruder
Essential
Starting at $149.00
Per Month
Browse all 4 pricing plans
Free Trial
Cobalt
No trial information available
Intruder
Free Trial is available
Ratings
Meets Requirements
9.3
113
9.4
153
Ease of Use
9.2
115
9.5
158
Ease of Setup
9.1
104
9.5
137
Ease of Admin
9.2
80
9.6
126
Quality of Support
9.2
113
9.7
148
Has the product been a good partner in doing business?
9.3
81
9.7
119
Product Direction (% positive)
8.6
105
9.8
142
Features by Category
Not enough data
8.8
33
Administration
Not enough data
Feature Not Available
Not enough data
9.2
32
Not enough data
9.7
31
Risk Analysis
Not enough data
Feature Not Available
Not enough data
9.6
31
Not enough data
Feature Not Available
Threat Protection
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Generative AI
Not enough data
6.8
10
8.7
89
9.0
51
Administration
8.0
75
8.5
27
Feature Not Available
8.5
25
9.1
85
9.1
48
Analysis
9.0
83
9.4
41
8.8
84
9.2
38
8.7
72
9.6
50
Testing
Feature Not Available
Feature Not Available
8.3
81
8.6
20
Feature Not Available
8.7
29
9.1
85
9.3
38
Dynamic Application Security Testing (DAST)Hide 13 FeaturesShow 13 Features
8.7
7
8.8
8
Administration
8.6
7
8.9
6
8.6
7
8.6
6
Analysis
9.0
7
9.5
7
9.0
7
9.6
8
8.8
7
Feature Not Available
9.0
7
9.8
8
8.6
7
Feature Not Available
Testing
8.6
7
7.9
7
8.9
6
8.8
7
8.8
7
7.8
6
8.3
7
9.0
7
8.6
7
9.5
7
8.6
7
7.9
7
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Admin
Not enough data
Not enough data
Not enough data
8.7
98
Performance
Not enough data
9.1
79
|
Verified
Not enough data
9.3
88
|
Verified
Not enough data
7.8
85
|
Verified
Not enough data
9.5
94
|
Verified
Network
Not enough data
9.0
38
Not enough data
9.0
78
|
Verified
Not enough data
Feature Not Available
Application
Not enough data
8.1
51
|
Verified
Not enough data
Feature Not Available
Not enough data
8.4
49
|
Verified
Agentic AI - Vulnerability Scanner
Not enough data
8.3
7
Not enough data
8.3
7
Not enough data
8.9
11
API Management
Not enough data
8.8
8
Not enough data
Feature Not Available
Not enough data
9.2
10
Not enough data
Feature Not Available
Security Testing
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.7
10
Security Management
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Cloud Security Posture Management (CSPM)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Configuration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Attack Surface ManagementHide 12 FeaturesShow 12 Features
Not enough data
8.8
24
Asset Management
Not enough data
9.3
19
Not enough data
8.1
18
Not enough data
Feature Not Available
Monitoring
Not enough data
Feature Not Available
Not enough data
9.5
21
Not enough data
9.3
21
Not enough data
9.6
21
Risk Management
Not enough data
9.2
22
Not enough data
8.9
22
Not enough data
Feature Not Available
Not enough data
9.3
19
Generative AI
Not enough data
6.3
13
Exposure Management PlatformsHide 6 FeaturesShow 6 Features
Not enough data
Not enough data
Generative AI - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Risk Identification and Assessment - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring and Integration - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Cobalt
Cobalt
Intruder
Intruder
Cobalt and Intruder are categorized as Dynamic Application Security Testing (DAST) and Penetration Testing
Reviews
Reviewers' Company Size
Cobalt
Cobalt
Small-Business(50 or fewer emp.)
26.1%
Mid-Market(51-1000 emp.)
51.4%
Enterprise(> 1000 emp.)
22.5%
Intruder
Intruder
Small-Business(50 or fewer emp.)
60.1%
Mid-Market(51-1000 emp.)
35.2%
Enterprise(> 1000 emp.)
4.7%
Reviewers' Industry
Cobalt
Cobalt
Computer Software
26.8%
Information Technology and Services
21.1%
Financial Services
6.3%
Hospital & Health Care
4.9%
Telecommunications
2.8%
Other
38.0%
Intruder
Intruder
Computer Software
20.7%
Information Technology and Services
15.0%
Financial Services
7.8%
Computer & Network Security
6.2%
Insurance
2.6%
Other
47.7%
Alternatives
Cobalt
Cobalt Alternatives
GitLab
GitLab
Add GitLab
Oneleet
Oneleet
Add Oneleet
Tenable Nessus
Tenable Nessus
Add Tenable Nessus
vPenTest
vPenTest
Add vPenTest
Intruder
Intruder Alternatives
Detectify
Detectify
Add Detectify
Tenable Nessus
Tenable Nessus
Add Tenable Nessus
Invicti (formerly Netsparker)
Invicti (formerly Netsparker)
Add Invicti (formerly Netsparker)
Acunetix by Invicti
Acunetix by Invicti
Add Acunetix by Invicti
Discussions
Cobalt
Cobalt Discussions
Monty the Mongoose crying
Cobalt has no discussions with answers
Intruder
Intruder Discussions
What does Intruder actually test for you?
2 Comments
Official Response from Intruder
Intruder currently performs ~10,000 checks varying from configuration weaknesses, security patches, and application bugs. An up-to-date list can always be...Read more
Will Intruder's scans damage my systems?
2 Comments
Official Response from Intruder
It's very unlikely that Intruder's scans will damage your systems. If this is a concern of yours, users have the ability to throttle scans.Read more
What are Intruder's key principals?
1 Comment
Official Response from Intruder
We pride ourselves on being a simple, intuitive product that still packs a punch. Vulnerability management can be a complicated task, but it doesn't have to...Read more