Introducing G2.ai, the future of software buying.Try now

Compare Evolve Security and Intruder

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Evolve Security
Evolve Security
Star Rating
(51)4.8 out of 5
Market Segments
Mid-Market (72.0% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Evolve Security
Intruder
Intruder
Star Rating
(200)4.8 out of 5
Market Segments
Small-Business (60.0% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Starting at $149.00 Per Month
Free Trial is available
Browse all 4 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that Intruder excels in Alerting with a score of 9.8, indicating that its real-time notifications are highly effective, while Darwin Attack, with a score of 9.2, is noted for being slightly less responsive in alerting users about potential threats.
  • Reviewers mention that Intruder's Asset Management features, particularly its Asset Discovery capabilities, received a perfect score of 10.0, showcasing its ability to identify and manage assets efficiently, whereas Darwin Attack scored 8.8 in this area, suggesting room for improvement.
  • G2 users highlight that Intruder's Quality of Support is exceptional, scoring 9.7, with many reviewers praising the responsiveness and helpfulness of the support team, while Darwin Attack, with a score of 9.5, is also well-regarded but slightly less so in comparison.
  • Users on G2 report that Intruder's Vulnerability Assessment capabilities are robust, scoring 9.7, which reviewers say provides comprehensive insights into security weaknesses, while Darwin Attack, scoring 9.6, is effective but may not offer the same depth of analysis.
  • Reviewers mention that Intruder's Continuous Monitoring feature stands out with a score of 9.8, indicating a strong ability to keep track of security status over time, while Darwin Attack's score of 8.0 suggests it may not be as effective in maintaining ongoing vigilance.
  • Users say that both products perform well in Ease of Setup, with both scoring 9.6, but Intruder is often highlighted for its user-friendly onboarding process, making it easier for new users to get started compared to Darwin Attack.
Pricing
Entry-Level Pricing
Evolve Security
No pricing available
Intruder
Essential
Starting at $149.00
Per Month
Browse all 4 pricing plans
Free Trial
Evolve Security
No trial information available
Intruder
Free Trial is available
Ratings
Meets Requirements
9.4
33
9.4
154
Ease of Use
9.4
34
9.5
159
Ease of Setup
9.6
20
9.6
138
Ease of Admin
9.3
16
9.6
127
Quality of Support
9.5
33
9.7
149
Has the product been a good partner in doing business?
9.8
30
9.7
120
Product Direction (% positive)
9.6
32
9.8
144
Features by Category
Not enough data
8.8
33
Administration
Not enough data
Feature Not Available
Not enough data
9.2
32
Not enough data
9.7
31
Risk Analysis
Not enough data
Feature Not Available
Not enough data
9.6
31
Not enough data
Feature Not Available
Threat Protection
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Generative AI
Not enough data
6.8
10
8.9
26
9.0
52
Administration
8.6
16
8.6
28
8.8
20
8.5
25
9.5
24
9.1
49
Analysis
9.3
24
9.4
41
9.1
18
9.2
38
9.4
22
9.6
51
Testing
8.3
15
Feature Not Available
8.2
16
8.6
20
8.3
16
8.7
29
9.1
22
9.3
38
Dynamic Application Security Testing (DAST)Hide 13 FeaturesShow 13 Features
Not enough data
8.8
8
Administration
Not enough data
8.9
6
Not enough data
8.6
6
Analysis
Not enough data
9.5
7
Not enough data
9.6
8
Not enough data
Feature Not Available
Not enough data
9.8
8
Not enough data
Feature Not Available
Testing
Not enough data
7.9
7
Not enough data
8.8
7
Not enough data
7.8
6
Not enough data
9.0
7
Not enough data
9.5
7
Not enough data
7.9
7
9.0
11
8.6
99
Performance
9.3
10
9.1
79
|
Verified
9.2
11
9.3
89
|
Verified
9.2
10
7.8
87
|
Verified
9.2
10
9.5
96
|
Verified
Network
9.4
9
9.0
39
9.5
10
8.9
80
|
Verified
8.6
7
Feature Not Available
Application
8.5
8
8.1
52
|
Verified
8.3
7
Feature Not Available
8.5
9
8.4
50
|
Verified
Agentic AI - Vulnerability Scanner
Not enough data
8.1
8
Not enough data
8.1
8
Not enough data
8.9
11
API Management
Not enough data
8.8
8
Not enough data
Feature Not Available
Not enough data
9.2
10
Not enough data
Feature Not Available
Security Testing
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.7
10
Security Management
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Cloud Security Posture Management (CSPM)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Configuration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Attack Surface ManagementHide 12 FeaturesShow 12 Features
9.3
9
8.8
24
Asset Management
8.8
7
9.3
19
9.4
6
8.1
18
9.4
6
Feature Not Available
Monitoring
9.3
7
Feature Not Available
9.6
8
9.5
21
9.0
7
9.3
21
8.0
5
9.6
21
Risk Management
9.3
9
9.2
22
9.8
8
8.9
22
9.8
8
Feature Not Available
9.4
8
9.3
19
Generative AI
Not enough data
6.3
13
Exposure Management PlatformsHide 6 FeaturesShow 6 Features
Not enough data
Not enough data
Generative AI - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Risk Identification and Assessment - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring and Integration - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Evolve Security
Evolve Security
Intruder
Intruder
Unique Categories
Evolve Security
Evolve Security has no unique categories
Reviews
Reviewers' Company Size
Evolve Security
Evolve Security
Small-Business(50 or fewer emp.)
20.0%
Mid-Market(51-1000 emp.)
72.0%
Enterprise(> 1000 emp.)
8.0%
Intruder
Intruder
Small-Business(50 or fewer emp.)
60.0%
Mid-Market(51-1000 emp.)
35.4%
Enterprise(> 1000 emp.)
4.6%
Reviewers' Industry
Evolve Security
Evolve Security
Financial Services
12.0%
Manufacturing
6.0%
Non-Profit Organization Management
6.0%
Information Technology and Services
6.0%
Hospital & Health Care
6.0%
Other
64.0%
Intruder
Intruder
Computer Software
21.0%
Information Technology and Services
14.9%
Financial Services
7.7%
Computer & Network Security
6.2%
Insurance
2.6%
Other
47.7%
Alternatives
Evolve Security
Evolve Security Alternatives
Wiz
Wiz
Add Wiz
Scrut Automation
Scrut Automation
Add Scrut Automation
Oneleet
Oneleet
Add Oneleet
Red Hat Ansible Automation Platform
Red Hat Ansible Automation Platform
Add Red Hat Ansible Automation Platform
Intruder
Intruder Alternatives
Detectify
Detectify
Add Detectify
Tenable Nessus
Tenable Nessus
Add Tenable Nessus
Invicti (formerly Netsparker)
Invicti (formerly Netsparker)
Add Invicti (formerly Netsparker)
Acunetix by Invicti
Acunetix by Invicti
Add Acunetix by Invicti
Discussions
Evolve Security
Evolve Security Discussions
Monty the Mongoose crying
Evolve Security has no discussions with answers
Intruder
Intruder Discussions
What does Intruder actually test for you?
2 Comments
Official Response from Intruder
Intruder currently performs ~10,000 checks varying from configuration weaknesses, security patches, and application bugs. An up-to-date list can always be...Read more
Will Intruder's scans damage my systems?
2 Comments
Official Response from Intruder
It's very unlikely that Intruder's scans will damage your systems. If this is a concern of yours, users have the ability to throttle scans.Read more
What are Intruder's key principals?
1 Comment
Official Response from Intruder
We pride ourselves on being a simple, intuitive product that still packs a punch. Vulnerability management can be a complicated task, but it doesn't have to...Read more