Introducing G2.ai, the future of software buying.Try now

Compare HostedScan.com and Intruder

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
HostedScan.com
HostedScan.com
Star Rating
(13)4.3 out of 5
Market Segments
Small-Business (84.6% of reviews)
Information
Entry-Level Pricing
Free Per Month
Browse all 4 pricing plans
Intruder
Intruder
Star Rating
(197)4.8 out of 5
Market Segments
Small-Business (60.1% of reviews)
Information
Entry-Level Pricing
Starting at $149.00 Per Month
Free Trial is available
Browse all 4 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that Intruder excels in its Alerting feature, scoring a remarkable 9.8, which reviewers mention provides timely notifications that help in quick response to vulnerabilities. In contrast, HostedScan.com does not have a comparable alerting feature highlighted in user reviews.
  • Reviewers mention that Intruder's Vulnerability Assessment capabilities are top-notch, with a score of 9.7, allowing users to effectively identify and prioritize security risks. HostedScan.com, while offering vulnerability scanning, does not receive the same level of praise, scoring lower in this area.
  • G2 users highlight Intruder's Ease of Setup with a score of 9.6, indicating a smooth onboarding process. Users on G2 report that HostedScan.com, while easy to use, has a slightly lower score of 9.7, suggesting it may not be as seamless for new users.
  • Users say that Intruder's Quality of Support is exceptional, scoring 9.7, with many reviewers praising the responsiveness and helpfulness of the support team. In contrast, HostedScan.com lacks specific user feedback on support quality, which may be a concern for potential buyers.
  • Reviewers mention that Intruder's Continuous Monitoring feature is highly effective, scoring 9.8, which users say helps maintain ongoing security vigilance. HostedScan.com does not have a comparable feature that stands out in user reviews.
  • Users report that Intruder's Risk Analysis capabilities, particularly in Risk Scoring and Risk-Prioritization, are robust, with scores of 9.4 and 9.4 respectively, allowing for effective risk management. HostedScan.com does not receive similar acclaim in these areas, indicating a potential gap in functionality.
Pricing
Entry-Level Pricing
HostedScan.com
Free
Free
Per Month
Browse all 4 pricing plans
Intruder
Essential
Starting at $149.00
Per Month
Browse all 4 pricing plans
Free Trial
HostedScan.com
Free Trial is available
Intruder
Free Trial is available
Ratings
Meets Requirements
8.3
6
9.4
153
Ease of Use
9.2
6
9.5
158
Ease of Setup
9.7
5
9.5
137
Ease of Admin
Not enough data
9.6
126
Quality of Support
Not enough data
9.7
148
Has the product been a good partner in doing business?
Not enough data
9.7
119
Product Direction (% positive)
8.1
6
9.8
142
Features by Category
Not enough data
8.8
33
Administration
Not enough data
Feature Not Available
Not enough data
9.2
32
Not enough data
9.7
31
Risk Analysis
Not enough data
Feature Not Available
Not enough data
9.6
31
Not enough data
Feature Not Available
Threat Protection
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Generative AI
Not enough data
6.8
10
Not enough data
9.0
51
Administration
Not enough data
8.5
27
Not enough data
8.5
25
Not enough data
9.1
48
Analysis
Not enough data
9.4
41
Not enough data
9.2
38
Not enough data
9.6
50
Testing
Not enough data
Feature Not Available
Not enough data
8.6
20
Not enough data
8.7
29
Not enough data
9.3
38
Dynamic Application Security Testing (DAST)Hide 13 FeaturesShow 13 Features
Not enough data
8.8
8
Administration
Not enough data
8.9
6
Not enough data
8.6
6
Analysis
Not enough data
9.5
7
Not enough data
9.6
8
Not enough data
Feature Not Available
Not enough data
9.8
8
Not enough data
Feature Not Available
Testing
Not enough data
7.9
7
Not enough data
8.8
7
Not enough data
7.8
6
Not enough data
9.0
7
Not enough data
9.5
7
Not enough data
7.9
7
Not enough data
8.7
98
Performance
Not enough data
9.1
79
|
Verified
Not enough data
9.3
88
|
Verified
Not enough data
7.8
85
|
Verified
Not enough data
9.5
94
|
Verified
Network
Not enough data
9.0
38
Not enough data
9.0
78
|
Verified
Not enough data
Feature Not Available
Application
Not enough data
8.1
51
|
Verified
Not enough data
Feature Not Available
Not enough data
8.4
49
|
Verified
Agentic AI - Vulnerability Scanner
Not enough data
8.3
7
Not enough data
8.3
7
Risk-Based Vulnerability ManagementHide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Risk Analysis
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Assesment
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Automation
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.9
11
API Management
Not enough data
8.8
8
Not enough data
Feature Not Available
Not enough data
9.2
10
Not enough data
Feature Not Available
Security Testing
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.7
10
Security Management
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Cloud Security Posture Management (CSPM)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Configuration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Attack Surface ManagementHide 12 FeaturesShow 12 Features
Not enough data
8.8
24
Asset Management
Not enough data
9.3
19
Not enough data
8.1
18
Not enough data
Feature Not Available
Monitoring
Not enough data
Feature Not Available
Not enough data
9.5
21
Not enough data
9.3
21
Not enough data
9.6
21
Risk Management
Not enough data
9.2
22
Not enough data
8.9
22
Not enough data
Feature Not Available
Not enough data
9.3
19
Generative AI
Not enough data
6.3
13
Exposure Management PlatformsHide 6 FeaturesShow 6 Features
Not enough data
Not enough data
Generative AI - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Risk Identification and Assessment - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring and Integration - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
HostedScan.com
HostedScan.com
Intruder
Intruder
Reviews
Reviewers' Company Size
HostedScan.com
HostedScan.com
Small-Business(50 or fewer emp.)
84.6%
Mid-Market(51-1000 emp.)
15.4%
Enterprise(> 1000 emp.)
0%
Intruder
Intruder
Small-Business(50 or fewer emp.)
60.1%
Mid-Market(51-1000 emp.)
35.2%
Enterprise(> 1000 emp.)
4.7%
Reviewers' Industry
HostedScan.com
HostedScan.com
Information Technology and Services
15.4%
Computer Software
15.4%
Computer & Network Security
15.4%
Civic & Social Organization
15.4%
Marketing and Advertising
7.7%
Other
30.8%
Intruder
Intruder
Computer Software
20.7%
Information Technology and Services
15.0%
Financial Services
7.8%
Computer & Network Security
6.2%
Insurance
2.6%
Other
47.7%
Alternatives
HostedScan.com
HostedScan.com Alternatives
Wiz
Wiz
Add Wiz
CloudBees
CloudBees
Add CloudBees
Scrut Automation
Scrut Automation
Add Scrut Automation
GitLab
GitLab
Add GitLab
Intruder
Intruder Alternatives
Detectify
Detectify
Add Detectify
Tenable Nessus
Tenable Nessus
Add Tenable Nessus
Invicti (formerly Netsparker)
Invicti (formerly Netsparker)
Add Invicti (formerly Netsparker)
Acunetix by Invicti
Acunetix by Invicti
Add Acunetix by Invicti
Discussions
HostedScan.com
HostedScan.com Discussions
Monty the Mongoose crying
HostedScan.com has no discussions with answers
Intruder
Intruder Discussions
What does Intruder actually test for you?
2 Comments
Official Response from Intruder
Intruder currently performs ~10,000 checks varying from configuration weaknesses, security patches, and application bugs. An up-to-date list can always be...Read more
Will Intruder's scans damage my systems?
2 Comments
Official Response from Intruder
It's very unlikely that Intruder's scans will damage your systems. If this is a concern of yours, users have the ability to throttle scans.Read more
What are Intruder's key principals?
1 Comment
Official Response from Intruder
We pride ourselves on being a simple, intuitive product that still packs a punch. Vulnerability management can be a complicated task, but it doesn't have to...Read more