Introducing G2.ai, the future of software buying.Try now

Compare Detectify and Intruder

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Detectify
Detectify
Star Rating
(51)4.5 out of 5
Market Segments
Small-Business (47.9% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Contact Us
Browse all 2 pricing plans
Intruder
Intruder
Star Rating
(202)4.8 out of 5
Market Segments
Small-Business (59.9% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Starting at $149.00 Per Month
Free Trial is available
Browse all 4 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Intruder excels in user satisfaction, boasting a higher overall score compared to Detectify. Users appreciate the ease of setup and the effectiveness of the autoscanner, which provides continuous updates on critical vulnerabilities, making it a preferred choice for many.
  • According to verified reviews, Detectify offers a unique automated approach to vulnerability testing that saves teams significant time. Users highlight the hands-free, passive scanning feature and the convenience of receiving weekly reports directly to their email, which enhances their workflow.
  • Users say that Intruder's clarity in reporting is a standout feature, as it prioritizes vulnerabilities that genuinely matter, helping teams focus on critical issues without being overwhelmed by low-value noise. This prioritization is a key reason many choose Intruder over Detectify.
  • Reviewers mention that while Detectify has a user-friendly interface, it sometimes lacks the depth of support that Intruder provides. Users have noted that Intruder's customer support is highly responsive, which is crucial for teams needing quick assistance during implementation.
  • G2 reviewers highlight that Detectify is particularly beneficial for small businesses, with a significant portion of its user base coming from this segment. However, Intruder's broader market presence and more extensive review count suggest a more established reputation in the industry.
  • According to recent user feedback, both products have strong features, but Intruder's continuous monitoring and vulnerability assessment capabilities are often seen as more robust. Users appreciate how Intruder helps them gain visibility on their network, making it easier to understand risks and take action.
Pricing
Entry-Level Pricing
Detectify
Full EASM solution
Contact Us
Browse all 2 pricing plans
Intruder
Essential
Starting at $149.00
Per Month
Browse all 4 pricing plans
Free Trial
Detectify
Free Trial is available
Intruder
Free Trial is available
Ratings
Meets Requirements
8.7
34
9.4
156
Ease of Use
9.0
35
9.5
161
Ease of Setup
9.2
25
9.5
140
Ease of Admin
8.7
26
9.5
129
Quality of Support
9.4
31
9.7
151
Has the product been a good partner in doing business?
9.7
24
9.7
122
Product Direction (% positive)
7.7
31
9.8
146
Features by Category
8.3
19
8.8
33
Administration
7.5
10
Feature Not Available
8.8
17
9.2
32
9.2
14
9.7
31
Risk Analysis
8.1
7
Feature Not Available
8.0
14
9.6
31
8.2
11
Feature Not Available
Threat Protection
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Generative AI
Not enough data
6.8
10
8.9
10
9.0
52
Administration
8.0
5
8.6
28
Not enough data
8.5
25
8.8
7
9.1
50
Analysis
7.8
6
9.4
41
9.2
8
9.2
38
9.3
9
9.6
51
Testing
Feature Not Available
Feature Not Available
Feature Not Available
8.6
20
9.7
6
8.7
29
9.5
7
9.4
39
Dynamic Application Security Testing (DAST)Hide 13 FeaturesShow 13 Features
7.7
11
8.8
8
Administration
7.6
7
8.9
6
6.7
5
8.6
6
Analysis
7.3
10
9.5
7
6.5
8
9.6
8
Feature Not Available
Feature Not Available
9.2
10
9.8
8
Not enough data
Feature Not Available
Testing
Feature Not Available
7.9
7
9.0
5
8.8
7
Feature Not Available
7.8
6
9.0
10
9.0
7
7.9
11
9.5
7
5.8
11
7.9
7
7.9
22
8.6
100
Performance
8.5
16
9.1
79
|
Verified
8.5
19
9.3
90
|
Verified
6.3
19
7.8
88
|
Verified
8.9
20
9.5
97
|
Verified
Network
8.0
11
9.0
39
8.3
12
8.9
80
|
Verified
8.3
10
Feature Not Available
Application
Feature Not Available
8.1
52
|
Verified
6.5
9
Feature Not Available
8.2
14
8.4
50
|
Verified
Agentic AI - Vulnerability Scanner
Not enough data
8.1
8
Not enough data
8.1
8
Not enough data
8.9
11
API Management
Not enough data
8.8
8
Not enough data
Feature Not Available
Not enough data
9.2
10
Not enough data
Feature Not Available
Security Testing
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.7
10
Security Management
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Cloud Security Posture Management (CSPM)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Configuration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Attack Surface ManagementHide 12 FeaturesShow 12 Features
9.5
6
8.8
25
Asset Management
10.0
5
9.3
19
Not enough data
8.1
18
Not enough data
Feature Not Available
Monitoring
Feature Not Available
Feature Not Available
9.0
5
9.5
22
Not enough data
9.3
21
10.0
6
9.6
22
Risk Management
9.3
5
9.2
22
9.3
5
8.9
22
Feature Not Available
Feature Not Available
Not enough data
9.3
20
Generative AI
Not enough data
6.3
13
Exposure Management PlatformsHide 6 FeaturesShow 6 Features
Not enough data
Not enough data
Generative AI - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Risk Identification and Assessment - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring and Integration - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Unique Categories
Detectify
Detectify has no unique categories
Reviews
Reviewers' Company Size
Detectify
Detectify
Small-Business(50 or fewer emp.)
47.9%
Mid-Market(51-1000 emp.)
35.4%
Enterprise(> 1000 emp.)
16.7%
Intruder
Intruder
Small-Business(50 or fewer emp.)
59.9%
Mid-Market(51-1000 emp.)
35.5%
Enterprise(> 1000 emp.)
4.6%
Reviewers' Industry
Detectify
Detectify
Information Technology and Services
20.8%
Computer Software
14.6%
Computer & Network Security
6.3%
Retail
4.2%
Higher Education
4.2%
Other
50.0%
Intruder
Intruder
Computer Software
20.8%
Information Technology and Services
15.2%
Financial Services
7.6%
Computer & Network Security
6.1%
Insurance
2.5%
Other
47.7%
Alternatives
Detectify
Detectify Alternatives
Acunetix by Invicti
Acunetix by Invicti
Add Acunetix by Invicti
Tenable Nessus
Tenable Nessus
Add Tenable Nessus
Pentest-Tools.com
Pentest-Tools.com
Add Pentest-Tools.com
Invicti (formerly Netsparker)
Invicti (formerly Netsparker)
Add Invicti (formerly Netsparker)
Intruder
Intruder Alternatives
Tenable Nessus
Tenable Nessus
Add Tenable Nessus
Invicti (formerly Netsparker)
Invicti (formerly Netsparker)
Add Invicti (formerly Netsparker)
Acunetix by Invicti
Acunetix by Invicti
Add Acunetix by Invicti
Pentest-Tools.com
Pentest-Tools.com
Add Pentest-Tools.com
Discussions
Detectify
Detectify Discussions
Do we have a solution to exclude or tag the findings that have been already reviewed?
1 Comment
Official Response from Detectify
Hi Francesco, Thanks for your question. In the deep scan results you can tag findings as "fixed". There you can also filter by the "new" tag. To be able...Read more
Monty the Mongoose crying
Detectify has no more discussions with answers
Intruder
Intruder Discussions
What does Intruder actually test for you?
2 Comments
Official Response from Intruder
Intruder currently performs ~10,000 checks varying from configuration weaknesses, security patches, and application bugs. An up-to-date list can always be...Read more
Will Intruder's scans damage my systems?
2 Comments
Official Response from Intruder
It's very unlikely that Intruder's scans will damage your systems. If this is a concern of yours, users have the ability to throttle scans.Read more
What are Intruder's key principals?
1 Comment
Official Response from Intruder
We pride ourselves on being a simple, intuitive product that still packs a punch. Vulnerability management can be a complicated task, but it doesn't have to...Read more