Users report that Detectify excels in its Automated Scans feature, scoring 8.9, while Intruder outshines with a score of 9.5, indicating a more robust scanning capability that users find essential for ongoing security assessments.
Reviewers mention that Intruder's Vulnerability Assessment feature is particularly strong, achieving a score of 9.7, compared to Detectify's 8.0. This suggests that Intruder provides more comprehensive insights into potential vulnerabilities, which is crucial for proactive security management.
G2 users highlight the superior Alerting system in Intruder, which scored 9.8, compared to Detectify's 9.2. This indicates that users appreciate Intruder's timely and effective notifications about security issues, enhancing their response capabilities.
Users on G2 report that Detectify's Dashboard & Reporting feature, with a score of 8.8, is user-friendly, but Intruder's score of 9.0 suggests a more intuitive interface and better reporting capabilities that help users make informed decisions quickly.
Reviewers mention that both products have strong Quality of Support, with Intruder scoring 9.7 and Detectify at 9.4. However, users report that Intruder's support is more responsive and helpful, which can be a deciding factor for businesses needing reliable assistance.
Users say that while both products have effective False Positives management, Intruder's score of 7.8 is significantly better than Detectify's 6.3, indicating that users find Intruder's results to be more accurate and less prone to unnecessary alerts.
Pricing
Entry-Level Pricing
Detectify
Full EASM solution
Contact Us
Designed for large organizations, this scalable package offers broader coverage of your external attack surface, is made for easy and flexible roll-out, and provides additional Enterprise support.
Advanced API functionality and easy domain verification
Extended authentication control with SSO access and 2FA
Multi team set-up for flexible organizing of assets, access levels and results
Do we have a solution to exclude or tag the findings that have been already reviewed?
1 Comment
Official Response from Detectify
Hi Francesco,
Thanks for your question. In the deep scan results you can tag findings as "fixed". There you can also filter by the "new" tag. To be able...Read more
Intruder currently performs ~10,000 checks varying from configuration weaknesses, security patches, and application bugs. An up-to-date list can always be...Read more
Will Intruder's scans damage my systems?
2 Comments
Official Response from Intruder
It's very unlikely that Intruder's scans will damage your systems. If this is a concern of yours, users have the ability to throttle scans.Read more
What are Intruder's key principals?
1 Comment
Official Response from Intruder
We pride ourselves on being a simple, intuitive product that still packs a punch. Vulnerability management can be a complicated task, but it doesn't have to...Read more
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.