G2 reviewers report that Intruder excels in user satisfaction, boasting a higher overall score compared to Detectify. Users appreciate the ease of setup and the effectiveness of the autoscanner, which provides continuous updates on critical vulnerabilities, making it a preferred choice for many.
According to verified reviews, Detectify offers a unique automated approach to vulnerability testing that saves teams significant time. Users highlight the hands-free, passive scanning feature and the convenience of receiving weekly reports directly to their email, which enhances their workflow.
Users say that Intruder's clarity in reporting is a standout feature, as it prioritizes vulnerabilities that genuinely matter, helping teams focus on critical issues without being overwhelmed by low-value noise. This prioritization is a key reason many choose Intruder over Detectify.
Reviewers mention that while Detectify has a user-friendly interface, it sometimes lacks the depth of support that Intruder provides. Users have noted that Intruder's customer support is highly responsive, which is crucial for teams needing quick assistance during implementation.
G2 reviewers highlight that Detectify is particularly beneficial for small businesses, with a significant portion of its user base coming from this segment. However, Intruder's broader market presence and more extensive review count suggest a more established reputation in the industry.
According to recent user feedback, both products have strong features, but Intruder's continuous monitoring and vulnerability assessment capabilities are often seen as more robust. Users appreciate how Intruder helps them gain visibility on their network, making it easier to understand risks and take action.
Pricing
Entry-Level Pricing
Detectify
Full EASM solution
Contact Us
Designed for large organizations, this scalable package offers broader coverage of your external attack surface, is made for easy and flexible roll-out, and provides additional Enterprise support.
Advanced API functionality and easy domain verification
Extended authentication control with SSO access and 2FA
Multi team set-up for flexible organizing of assets, access levels and results
Do we have a solution to exclude or tag the findings that have been already reviewed?
1 Comment
Official Response from Detectify
Hi Francesco,
Thanks for your question. In the deep scan results you can tag findings as "fixed". There you can also filter by the "new" tag. To be able...Read more
Intruder currently performs ~10,000 checks varying from configuration weaknesses, security patches, and application bugs. An up-to-date list can always be...Read more
Will Intruder's scans damage my systems?
2 Comments
Official Response from Intruder
It's very unlikely that Intruder's scans will damage your systems. If this is a concern of yours, users have the ability to throttle scans.Read more
What are Intruder's key principals?
1 Comment
Official Response from Intruder
We pride ourselves on being a simple, intuitive product that still packs a punch. Vulnerability management can be a complicated task, but it doesn't have to...Read more
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.