Introducing G2.ai, the future of software buying.Try now

Compare Detectify and Intruder

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Detectify
Detectify
Star Rating
(51)4.5 out of 5
Market Segments
Small-Business (47.9% of reviews)
Information
Entry-Level Pricing
Contact Us
Browse all 2 pricing plans
Intruder
Intruder
Star Rating
(197)4.8 out of 5
Market Segments
Small-Business (60.1% of reviews)
Information
Entry-Level Pricing
Starting at $149.00 Per Month
Free Trial is available
Browse all 4 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that Detectify excels in its Automated Scans feature, scoring 8.9, while Intruder outshines with a score of 9.5, indicating a more robust scanning capability that users find essential for ongoing security assessments.
  • Reviewers mention that Intruder's Vulnerability Assessment feature is particularly strong, achieving a score of 9.7, compared to Detectify's 8.0. This suggests that Intruder provides more comprehensive insights into potential vulnerabilities, which is crucial for proactive security management.
  • G2 users highlight the superior Alerting system in Intruder, which scored 9.8, compared to Detectify's 9.2. This indicates that users appreciate Intruder's timely and effective notifications about security issues, enhancing their response capabilities.
  • Users on G2 report that Detectify's Dashboard & Reporting feature, with a score of 8.8, is user-friendly, but Intruder's score of 9.0 suggests a more intuitive interface and better reporting capabilities that help users make informed decisions quickly.
  • Reviewers mention that both products have strong Quality of Support, with Intruder scoring 9.7 and Detectify at 9.4. However, users report that Intruder's support is more responsive and helpful, which can be a deciding factor for businesses needing reliable assistance.
  • Users say that while both products have effective False Positives management, Intruder's score of 7.8 is significantly better than Detectify's 6.3, indicating that users find Intruder's results to be more accurate and less prone to unnecessary alerts.
Pricing
Entry-Level Pricing
Detectify
Full EASM solution
Contact Us
Browse all 2 pricing plans
Intruder
Essential
Starting at $149.00
Per Month
Browse all 4 pricing plans
Free Trial
Detectify
Free Trial is available
Intruder
Free Trial is available
Ratings
Meets Requirements
8.7
34
9.4
153
Ease of Use
9.0
35
9.5
158
Ease of Setup
9.2
25
9.5
137
Ease of Admin
8.7
26
9.6
126
Quality of Support
9.4
31
9.7
148
Has the product been a good partner in doing business?
9.7
24
9.7
119
Product Direction (% positive)
7.7
31
9.8
142
Features by Category
8.3
19
8.8
33
Administration
7.5
10
Feature Not Available
8.8
17
9.2
32
9.2
14
9.7
31
Risk Analysis
8.1
7
Feature Not Available
8.0
14
9.6
31
8.2
11
Feature Not Available
Threat Protection
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Generative AI
Not enough data
6.8
10
8.9
10
9.0
51
Administration
8.0
5
8.5
27
Not enough data
8.5
25
8.8
7
9.1
48
Analysis
7.8
6
9.4
41
9.2
8
9.2
38
9.3
9
9.6
50
Testing
Feature Not Available
Feature Not Available
Feature Not Available
8.6
20
9.7
6
8.7
29
9.5
7
9.3
38
Dynamic Application Security Testing (DAST)Hide 13 FeaturesShow 13 Features
7.7
11
8.8
8
Administration
7.6
7
8.9
6
6.7
5
8.6
6
Analysis
7.3
10
9.5
7
6.5
8
9.6
8
Feature Not Available
Feature Not Available
9.2
10
9.8
8
Not enough data
Feature Not Available
Testing
Feature Not Available
7.9
7
9.0
5
8.8
7
Feature Not Available
7.8
6
9.0
10
9.0
7
7.9
11
9.5
7
5.8
11
7.9
7
7.9
22
8.7
98
Performance
8.5
16
9.1
79
|
Verified
8.5
19
9.3
88
|
Verified
6.3
19
7.8
85
|
Verified
8.9
20
9.5
94
|
Verified
Network
8.0
11
9.0
38
8.3
12
9.0
78
|
Verified
8.3
10
Feature Not Available
Application
Feature Not Available
8.1
51
|
Verified
6.5
9
Feature Not Available
8.2
14
8.4
49
|
Verified
Agentic AI - Vulnerability Scanner
Not enough data
8.3
7
Not enough data
8.3
7
Not enough data
8.9
11
API Management
Not enough data
8.8
8
Not enough data
Feature Not Available
Not enough data
9.2
10
Not enough data
Feature Not Available
Security Testing
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.7
10
Security Management
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Cloud Security Posture Management (CSPM)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Configuration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Attack Surface ManagementHide 12 FeaturesShow 12 Features
9.5
6
8.8
24
Asset Management
10.0
5
9.3
19
Not enough data
8.1
18
Not enough data
Feature Not Available
Monitoring
Feature Not Available
Feature Not Available
9.0
5
9.5
21
Not enough data
9.3
21
10.0
6
9.6
21
Risk Management
9.3
5
9.2
22
9.3
5
8.9
22
Feature Not Available
Feature Not Available
Not enough data
9.3
19
Generative AI
Not enough data
6.3
13
Exposure Management PlatformsHide 6 FeaturesShow 6 Features
Not enough data
Not enough data
Generative AI - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Risk Identification and Assessment - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring and Integration - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Unique Categories
Detectify
Detectify has no unique categories
Reviews
Reviewers' Company Size
Detectify
Detectify
Small-Business(50 or fewer emp.)
47.9%
Mid-Market(51-1000 emp.)
35.4%
Enterprise(> 1000 emp.)
16.7%
Intruder
Intruder
Small-Business(50 or fewer emp.)
60.1%
Mid-Market(51-1000 emp.)
35.2%
Enterprise(> 1000 emp.)
4.7%
Reviewers' Industry
Detectify
Detectify
Information Technology and Services
20.8%
Computer Software
14.6%
Computer & Network Security
6.3%
Retail
4.2%
Higher Education
4.2%
Other
50.0%
Intruder
Intruder
Computer Software
20.7%
Information Technology and Services
15.0%
Financial Services
7.8%
Computer & Network Security
6.2%
Insurance
2.6%
Other
47.7%
Alternatives
Detectify
Detectify Alternatives
Acunetix by Invicti
Acunetix by Invicti
Add Acunetix by Invicti
Tenable Nessus
Tenable Nessus
Add Tenable Nessus
Pentest-Tools.com
Pentest-Tools.com
Add Pentest-Tools.com
Invicti (formerly Netsparker)
Invicti (formerly Netsparker)
Add Invicti (formerly Netsparker)
Intruder
Intruder Alternatives
Tenable Nessus
Tenable Nessus
Add Tenable Nessus
Invicti (formerly Netsparker)
Invicti (formerly Netsparker)
Add Invicti (formerly Netsparker)
Acunetix by Invicti
Acunetix by Invicti
Add Acunetix by Invicti
Pentest-Tools.com
Pentest-Tools.com
Add Pentest-Tools.com
Discussions
Detectify
Detectify Discussions
Do we have a solution to exclude or tag the findings that have been already reviewed?
1 Comment
Official Response from Detectify
Hi Francesco, Thanks for your question. In the deep scan results you can tag findings as "fixed". There you can also filter by the "new" tag. To be able...Read more
Monty the Mongoose crying
Detectify has no more discussions with answers
Intruder
Intruder Discussions
What does Intruder actually test for you?
2 Comments
Official Response from Intruder
Intruder currently performs ~10,000 checks varying from configuration weaknesses, security patches, and application bugs. An up-to-date list can always be...Read more
Will Intruder's scans damage my systems?
2 Comments
Official Response from Intruder
It's very unlikely that Intruder's scans will damage your systems. If this is a concern of yours, users have the ability to throttle scans.Read more
What are Intruder's key principals?
1 Comment
Official Response from Intruder
We pride ourselves on being a simple, intuitive product that still packs a punch. Vulnerability management can be a complicated task, but it doesn't have to...Read more