# Intruder, Microsoft Defender External Attack Surface Management vs Tenable Vulnerability Management Comparison

| | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **Star Rating** | 4.8 out of 5 | 4.3 out of 5 | 4.5 out of 5 | 
| **Total Reviews** | 206 | 16 | 122 | 
| **Largest Market Segment** | Small-Business (58.7% of reviews) | Small-Business (37.5% of reviews) | Enterprise (58.0% of reviews) | 
| **Entry Level Price** | Starting at $149.00 Per Month | No pricing available | No pricing available | 

---
## Top Pros & Cons

### Intruder

Pros:
- Ease of Use (41 reviews)
- Vulnerability Detection (30 reviews)

Cons:
- Expensive (10 reviews)
- Slow Scanning (8 reviews)

### Microsoft Defender External Attack Surface Management

**Not enough data**

### Tenable Vulnerability Management

Pros:
- Ease of Use (12 reviews)
- Scanning Efficiency (10 reviews)

Cons:
- Expensive (6 reviews)
- Pricing Issues (6 reviews)

---
## Ratings Comparison
| Rating | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
  | **Meets Requirements** | 9.4 (159 reviews) | 9.0 (16 reviews) | 8.9 (83 reviews) | 
  | **Ease of Use** | 9.5 (164 reviews) | 8.8 (16 reviews) | 8.9 (85 reviews) | 
  | **Ease of Setup** | 9.6 (143 reviews) | 9.4 (6 reviews) | 8.7 (69 reviews) | 
  | **Ease of Admin** | 9.5 (132 reviews) | 9.7 (5 reviews) | 8.7 (66 reviews) | 
  | **Quality of Support** | 9.7 (153 reviews) | 9.3 (15 reviews) | 8.1 (80 reviews) | 
  | **Has the product been a good partner in doing business?** | 9.7 (125 reviews) | 9.4 (6 reviews) | 8.6 (66 reviews) | 
  | **Product Direction (% positive)** | 9.8 (149 reviews) | 10.0 (16 reviews) | 8.9 (86 reviews) | 

---
## Pricing

### Intruder

#### Entry-Level Pricing

Plan: Essential

Price: Starting at $149.00 Per Month

Description: Best for startups looking to stay compliant

Key Features:
- External scanning
- Application scanning
- 18,000+ open-source checks

[Browse all 4 editions](https://www.g2.com/products/intruder/pricing)

#### Free Trial

Yes

### Microsoft Defender External Attack Surface Management

#### Entry-Level Pricing

No pricing available

#### Free Trial

No information available

### Tenable Vulnerability Management

#### Entry-Level Pricing

No pricing available

#### Free Trial

Yes

---
## Features Comparison By Category

### Website Security

| Product | Score | Reviews |
|---|---|---|
| **Intruder** | 8.8/10 | 33 |
| **Microsoft Defender External Attack Surface Management** | N/A | N/A |
| **Tenable Vulnerability Management** | N/A | N/A |

#### Administration

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **Content Delivery** | Feature Not Available | Not enough data | Not enough data | 
| **Dashboard &amp; Reporting** | 9.2 (32 reviews) | Not enough data | Not enough data | 
| **Alerting** | 9.7 (31 reviews) | Not enough data | Not enough data | 

#### Risk Analysis

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **Blacklist and Whitelist** | Feature Not Available | Not enough data | Not enough data | 
| **Vulnerability Assessment** | 9.6 (31 reviews) | Not enough data | Not enough data | 
| **Security Auditing** | Feature Not Available | Not enough data | Not enough data | 

#### Threat Protection

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **Firewall** | Feature Not Available | Not enough data | Not enough data | 
| **DDoS Protection** | Feature Not Available | Not enough data | Not enough data | 
| **Malware Detection** | Feature Not Available | Not enough data | Not enough data | 
| **Malware Removal** | Feature Not Available | Not enough data | Not enough data | 

#### Generative AI

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **AI Text Summarization** | 6.8 (10 reviews) | Not enough data | Not enough data | 

### Penetration Testing

| Product | Score | Reviews |
|---|---|---|
| **Intruder** | 9.0/10 | 53 |
| **Microsoft Defender External Attack Surface Management** | N/A | N/A |
| **Tenable Vulnerability Management** | N/A | N/A |

#### Administration

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **API / Integrations** | 8.6 (28 reviews) | Not enough data | Not enough data | 
| **Extensibility** | 8.5 (25 reviews) | Not enough data | Not enough data | 
| **Reporting and Analytics** | 9.1 (50 reviews) | Not enough data | Not enough data | 

#### Analysis

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **Issue Tracking** | 9.4 (41 reviews) | Not enough data | Not enough data | 
| **Reconnaissance** | 9.2 (38 reviews) | Not enough data | Not enough data | 
| **Vulnerability Scan** | 9.6 (51 reviews) | Not enough data | Not enough data | 

#### Testing

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **Command-Line Tools** | Feature Not Available | Not enough data | Not enough data | 
| **Manual Testing** | 8.6 (20 reviews) | Not enough data | Not enough data | 
| **Test Automation** | 8.7 (29 reviews) | Not enough data | Not enough data | 
| **Performance and Reliability** | 9.4 (39 reviews) | Not enough data | Not enough data | 

### Dynamic Application Security Testing (DAST)

| Product | Score | Reviews |
|---|---|---|
| **Intruder** | 8.8/10 | 8 |
| **Microsoft Defender External Attack Surface Management** | N/A | N/A |
| **Tenable Vulnerability Management** | N/A | N/A |

#### Administration

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **API / Integrations** | 8.9 (6 reviews) | Not enough data | Not enough data | 
| **Extensibility** | 8.6 (6 reviews) | Not enough data | Not enough data | 

#### Analysis

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **Reporting and Analytics** | 9.5 (7 reviews) | Not enough data | Not enough data | 
| **Issue Tracking** | 9.6 (8 reviews) | Not enough data | Not enough data | 
| **Static Code Analysis** | Feature Not Available | Not enough data | Not enough data | 
| **Vulnerability Scan** | 9.8 (8 reviews) | Not enough data | Not enough data | 
| **Code Analysis** | Feature Not Available | Not enough data | Not enough data | 

#### Testing

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **Manual Testing** | 7.9 (7 reviews) | Not enough data | Not enough data | 
| **Test Automation** | 8.8 (7 reviews) | Not enough data | Not enough data | 
| **Compliance Testing** | 7.8 (6 reviews) | Not enough data | Not enough data | 
| **Black-Box Scanning** | 9.0 (7 reviews) | Not enough data | Not enough data | 
| **Detection Rate** | 9.5 (7 reviews) | Not enough data | Not enough data | 
| **False Positives** | 7.9 (7 reviews) | Not enough data | Not enough data | 

### Vulnerability Scanner

| Product | Score | Reviews |
|---|---|---|
| **Intruder** | 8.7/10 | 103 |
| **Microsoft Defender External Attack Surface Management** | N/A | N/A |
| **Tenable Vulnerability Management** | 8.2/10 | 51 |

#### Performance

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **Issue Tracking** | 9.1 (80 reviews) ✓ Verified | Not enough data | 8.4 (46 reviews) ✓ Verified | 
| **Detection Rate** | 9.3 (90 reviews) ✓ Verified | Not enough data | 9.0 (48 reviews) ✓ Verified | 
| **False Positives** | 7.8 (89 reviews) ✓ Verified | Not enough data | 7.1 (48 reviews) ✓ Verified | 
| **Automated Scans** | 9.5 (98 reviews) ✓ Verified | Not enough data | 9.3 (48 reviews) ✓ Verified | 

#### Network

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **Compliance Testing** | 9.0 (39 reviews) | Not enough data | 8.5 (44 reviews) ✓ Verified | 
| **Perimeter Scanning** | 9.0 (82 reviews) ✓ Verified | Not enough data | 8.7 (43 reviews) | 
| **Configuration Monitoring** | Feature Not Available | Not enough data | 8.7 (40 reviews) ✓ Verified | 

#### Application

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **Manual Application Testing** | 8.2 (54 reviews) ✓ Verified | Not enough data | Feature Not Available | 
| **Static Code Analysis** | Feature Not Available | Not enough data | 7.5 (33 reviews) | 
| **Black Box Testing** | 8.4 (50 reviews) ✓ Verified | Not enough data | Feature Not Available | 

#### Agentic AI - Vulnerability Scanner

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **Autonomous Task Execution** | 8.1 (8 reviews) | Not enough data | 7.3 (5 reviews) | 
| **Proactive Assistance** | 8.3 (9 reviews) | Not enough data | 7.3 (5 reviews) | 

### Risk-Based Vulnerability Management

| Product | Score | Reviews |
|---|---|---|
| **Intruder** | N/A | N/A |
| **Microsoft Defender External Attack Surface Management** | N/A | N/A |
| **Tenable Vulnerability Management** | 8.5/10 | 68 |

#### Risk Analysis

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **Risk Scoring** | Not enough data | Not enough data | 8.9 (58 reviews) | 
| **Reporting** | Not enough data | Not enough data | 8.1 (59 reviews) | 
| **Risk-Prioritization** | Not enough data | Not enough data | 8.8 (58 reviews) | 

#### Vulnerability Assesment

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **Vulnerability Scanning** | Not enough data | Not enough data | 9.4 (60 reviews) | 
| **Vulnerability Intelligence** | Not enough data | Not enough data | 9.2 (57 reviews) | 
| **Contextual Data** | Not enough data | Not enough data | 8.7 (54 reviews) | 
| **Dashboards** | Not enough data | Not enough data | 8.2 (57 reviews) | 

#### Automation

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **Automated Remediation** | Not enough data | Not enough data | 7.7 (49 reviews) | 
| **Workflow Automation** | Not enough data | Not enough data | 7.8 (48 reviews) | 
| **Security Testing** | Not enough data | Not enough data | 8.1 (51 reviews) | 
| **Test Automation** | Not enough data | Not enough data | 8.1 (52 reviews) | 

### API Security

| Product | Score | Reviews |
|---|---|---|
| **Intruder** | 8.9/10 | 11 |
| **Microsoft Defender External Attack Surface Management** | N/A | N/A |
| **Tenable Vulnerability Management** | N/A | N/A |

#### API Management 

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **API Discovery** | 8.8 (8 reviews) | Not enough data | Not enough data | 
| **API Monitoring** | Feature Not Available | Not enough data | Not enough data | 
| **Reporting** | 9.2 (10 reviews) | Not enough data | Not enough data | 
| **Change Management** | Feature Not Available | Not enough data | Not enough data | 

#### Security Testing

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **Compliance Monitoring** | Feature Not Available | Not enough data | Not enough data | 
| **API Verification** | Feature Not Available | Not enough data | Not enough data | 
| **API Testing** | 8.7 (10 reviews) | Not enough data | Not enough data | 

#### Security Management

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **Security and Policy Enforcement** | Feature Not Available | Not enough data | Not enough data | 
| **Anomoly Detection** | Feature Not Available | Not enough data | Not enough data | 
| **Bot Detection** | Feature Not Available | Not enough data | Not enough data | 

### ServiceNow Store Apps

| Product | Score | Reviews |
|---|---|---|
| **Intruder** | N/A | N/A |
| **Microsoft Defender External Attack Surface Management** | N/A | N/A |
| **Tenable Vulnerability Management** | 8.5/10 | 8 |

#### ServiceNow Apps

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **ServiceNow Integration** | Not enough data | Not enough data | 8.3 (7 reviews) | 
| **Value** | Not enough data | Not enough data | 8.3 (7 reviews) | 

#### Agentic AI - ServiceNow Store Apps

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | Not enough data | 
| **Multi-step Planning** | Not enough data | Not enough data | Not enough data | 
| **Cross-system Integration** | Not enough data | Not enough data | Not enough data | 
| **Proactive Assistance** | Not enough data | Not enough data | Not enough data | 

### Cloud Security Posture Management (CSPM)

| Product | Score | Reviews |
|---|---|---|
| **Intruder** | N/A | N/A |
| **Microsoft Defender External Attack Surface Management** | N/A | N/A |
| **Tenable Vulnerability Management** | N/A | N/A |

#### Configuration

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **DLP Configuration** | Not enough data | Not enough data | Not enough data | 
| **Configuration Monitoring** | Not enough data | Not enough data | Not enough data | 
| **Unified Policy Management** | Not enough data | Not enough data | Not enough data | 
| **Adaptive Access Control** | Not enough data | Not enough data | Not enough data | 
| **API / Integrations** | Not enough data | Not enough data | Not enough data | 

#### Visibility

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **Multicloud Visibility** | Not enough data | Not enough data | Not enough data | 
| **Asset Discovery** | Not enough data | Not enough data | Not enough data | 

#### Vulnerability Management

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **Threat Hunting** | Not enough data | Not enough data | Not enough data | 
| **Vulnerability Scanning** | Not enough data | Not enough data | Not enough data | 
| **Vulnerability Intelligence** | Not enough data | Not enough data | Not enough data | 
| **Risk-Prioritization** | Not enough data | Not enough data | Not enough data | 

### Attack Surface Management

| Product | Score | Reviews |
|---|---|---|
| **Intruder** | 8.8/10 | 25 |
| **Microsoft Defender External Attack Surface Management** | 8.6/10 | 15 |
| **Tenable Vulnerability Management** | N/A | N/A |

#### Asset Management

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **Asset Discovery** | 9.3 (19 reviews) | 8.1 (14 reviews) | Not enough data | 
| **Shadow IT Detection** | 8.1 (18 reviews) | 8.5 (14 reviews) | Not enough data | 
| **Change Management** | Feature Not Available | 8.0 (14 reviews) | Not enough data | 

#### Monitoring

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **Gap Analysis** | Feature Not Available | 8.8 (15 reviews) | Not enough data | 
| **Vulnerability Intelligence** | 9.5 (22 reviews) | 9.0 (14 reviews) | Not enough data | 
| **Compliance Monitoring** | 9.3 (21 reviews) | 8.8 (14 reviews) | Not enough data | 
| **Continuous Monitoring** | 9.6 (22 reviews) | 8.9 (14 reviews) | Not enough data | 

#### Risk Management

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **Risk-Prioritization** | 9.2 (22 reviews) | 8.5 (14 reviews) | Not enough data | 
| **Reconnaissance** | 8.9 (22 reviews) | 8.7 (15 reviews) | Not enough data | 
| **At-Risk Analysis** | Feature Not Available | 8.9 (15 reviews) | Not enough data | 
| **Threat Intelligence** | 9.3 (20 reviews) | 9.0 (15 reviews) | Not enough data | 

#### Generative AI

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **AI Text Summarization** | 6.3 (13 reviews) | 8.3 (12 reviews) | Not enough data | 

### Exposure Management Platforms

| Product | Score | Reviews |
|---|---|---|
| **Intruder** | N/A | N/A |
| **Microsoft Defender External Attack Surface Management** | N/A | N/A |
| **Tenable Vulnerability Management** | N/A | N/A |

#### Generative AI - Exposure Management Platforms

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **Predictive Analytics** | Not enough data | Not enough data | Not enough data | 
| **Automated Threat Detection** | Not enough data | Not enough data | Not enough data | 

#### Risk Identification and Assessment - Exposure Management Platforms

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **Comprehensive Risk Assessment** | Not enough data | Not enough data | Not enough data | 
| **Advanced Analytics and Reporting** | Not enough data | Not enough data | Not enough data | 

#### Monitoring and Integration - Exposure Management Platforms

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **Integration and Data Consolidation** | Not enough data | Not enough data | Not enough data | 
| **Real-time Monitoring and Alerts** | Not enough data | Not enough data | Not enough data | 

### Cloud Security

| Product | Score | Reviews |
|---|---|---|
| **Intruder** | N/A | N/A |
| **Microsoft Defender External Attack Surface Management** | N/A | N/A |
| **Tenable Vulnerability Management** | N/A | N/A |

#### Cloud Visibility

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **Data Discovery** | Not enough data | Not enough data | Not enough data | 
| **Cloud Registry** | Not enough data | Not enough data | Not enough data | 
| **Cloud Gap Analytics** | Not enough data | Not enough data | Not enough data | 

#### Security

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **Data Security** | Not enough data | Not enough data | Not enough data | 
| **Data loss Prevention** | Not enough data | Not enough data | Not enough data | 
| **Security Auditing** | Not enough data | Not enough data | Not enough data | 

#### Identity

| Feature | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **SSO** | Not enough data | Not enough data | Not enough data | 
| **Governance** | Not enough data | Not enough data | Not enough data | 
| **User Analytics** | Not enough data | Not enough data | Not enough data | 

---
## Categories

**Unique to Intruder (8):** [ Attack Surface Management Software](https://www.g2.com/categories/attack-surface-management), [Exposure Management Platforms](https://www.g2.com/categories/exposure-management-platforms), [API Security Tools](https://www.g2.com/categories/api-security), [Dynamic Application Security Testing (DAST) Software](https://www.g2.com/categories/dynamic-application-security-testing-dast), [Penetration Testing Tools](https://www.g2.com/categories/penetration-testing-tools), [Website Security Software](https://www.g2.com/categories/website-security), [Vulnerability Scanner Software](https://www.g2.com/categories/vulnerability-scanner), [Cloud Security Posture Management (CSPM) Software](https://www.g2.com/categories/cloud-security-posture-management-cspm)

**Unique to Microsoft Defender External Attack Surface Management (1):** [ Attack Surface Management Software](https://www.g2.com/categories/attack-surface-management)

**Unique to Tenable Vulnerability Management (3):** [Risk-Based Vulnerability Management Software](https://www.g2.com/categories/risk-based-vulnerability-management), [Vulnerability Scanner Software](https://www.g2.com/categories/vulnerability-scanner), [ServiceNow Marketplace Apps](https://www.g2.com/categories/servicenow-store-apps)


---
## Reviewer Demographics

### By Company Size

| Segment | Intruder | Microsoft Defender External Attack Surface Management | Tenable Vulnerability Management | 
|---|---|---|---|
| **Small-Business** | 58.7% | 37.5% | 10.7% | 
| **Mid-Market** | 36.8% | 37.5% | 31.3% | 
| **Enterprise** | 4.5% | 25.0% | 58.0% | 

### By Industry

#### Intruder

- **Computer Software:** 21.0%
- **Information Technology and Services:** 15.5%
- **Financial Services:** 7.5%
- **Computer &amp; Network Security:** 6.0%
- **Insurance:** 2.5%
- **Information Services:** 2.0%
- **Retail:** 2.0%
- **Internet:** 2.0%
- **Legal Services:** 2.0%
- **Hospital &amp; Health Care:** 2.0%
- **Other:** 37.5%

#### Microsoft Defender External Attack Surface Management

- **Information Technology and Services:** 31.3%
- **Consulting:** 18.8%
- **Manufacturing:** 12.5%
- **Security and Investigations:** 6.3%
- **Non-Profit Organization Management:** 6.3%
- **Marketing and Advertising:** 6.3%
- **Fund-Raising:** 6.3%
- **Computer Software:** 6.3%
- **Automotive:** 6.3%

#### Tenable Vulnerability Management

- **Information Technology and Services:** 14.3%
- **Financial Services:** 13.4%
- **Computer &amp; Network Security:** 8.9%
- **Banking:** 6.3%
- **Computer Software:** 5.4%
- **Government Administration:** 4.5%
- **Hospital &amp; Health Care:** 4.5%
- **Telecommunications:** 2.7%
- **Security and Investigations:** 2.7%
- **Pharmaceuticals:** 2.7%
- **Other:** 34.8%

---
## Alternatives

### Alternatives to Intruder

- [Detectify](https://www.g2.com/products/detectify/reviews) — 4.5/5 stars (51 reviews)
- [Tenable Nessus](https://www.g2.com/products/tenable-nessus/reviews) — 4.5/5 stars (301 reviews)
- [Invicti (formerly Netsparker)](https://www.g2.com/products/invicti-formerly-netsparker/reviews) — 4.6/5 stars (69 reviews)
- [Acunetix by Invicti](https://www.g2.com/products/acunetix-by-invicti/reviews) — 4.1/5 stars (105 reviews)
- [Pentest-Tools.com](https://www.g2.com/products/pentest-tools-com/reviews) — 4.8/5 stars (100 reviews)
- [Beagle Security](https://www.g2.com/products/beagle-security/reviews) — 4.7/5 stars (88 reviews)
- [Wiz](https://www.g2.com/products/wiz-wiz/reviews) — 4.7/5 stars (791 reviews)
- [Burp Suite](https://www.g2.com/products/burp-suite/reviews) — 4.8/5 stars (129 reviews)
- [Astra Pentest](https://www.g2.com/products/astra-pentest/reviews) — 4.6/5 stars (185 reviews)
- [GitLab](https://www.g2.com/products/gitlab/reviews) — 4.5/5 stars (890 reviews)

### Alternatives to Microsoft Defender External Attack Surface Management

- [Wiz](https://www.g2.com/products/wiz-wiz/reviews) — 4.7/5 stars (791 reviews)
- [Scrut Automation](https://www.g2.com/products/scrut-automation/reviews) — 4.9/5 stars (1300 reviews)
- [Tenable Nessus](https://www.g2.com/products/tenable-nessus/reviews) — 4.5/5 stars (301 reviews)
- [Recorded Future](https://www.g2.com/products/recorded-future/reviews) — 4.6/5 stars (229 reviews)
- [Check Point Exposure Management](https://www.g2.com/products/check-point-exposure-management/reviews) — 4.6/5 stars (169 reviews)
- [Pentera](https://www.g2.com/products/pentera/reviews) — 4.5/5 stars (144 reviews)
- [Cyble](https://www.g2.com/products/cyble/reviews) — 4.8/5 stars (145 reviews)
- [CloudSEK](https://www.g2.com/products/cloudsek/reviews) — 4.8/5 stars (134 reviews)
- [RiskProfiler - External Threat Exposure Management](https://www.g2.com/products/riskprofiler-external-threat-exposure-management/reviews) — 4.9/5 stars (118 reviews)
- [CTM360](https://www.g2.com/products/ctm360-ctm360/reviews) — 4.7/5 stars (118 reviews)

### Alternatives to Tenable Vulnerability Management

- [InsightVM (Nexpose)](https://www.g2.com/products/insightvm-nexpose/reviews) — 4.4/5 stars (78 reviews)
- [Wiz](https://www.g2.com/products/wiz-wiz/reviews) — 4.7/5 stars (791 reviews)
- [Qualys VMDR](https://www.g2.com/products/qualys-vmdr/reviews) — 4.4/5 stars (167 reviews)
- [Cisco Vulnerability Management (formerly Kenna.VM)](https://www.g2.com/products/cisco-vulnerability-management-formerly-kenna-vm/reviews) — 4.3/5 stars (217 reviews)
- [SentinelOne Singularity Endpoint](https://www.g2.com/products/sentinelone-singularity-endpoint/reviews) — 4.7/5 stars (201 reviews)
- [Burp Suite](https://www.g2.com/products/burp-suite/reviews) — 4.8/5 stars (129 reviews)
- [OpenVAS](https://www.g2.com/products/openvas/reviews) — 4.4/5 stars (32 reviews)
- [Amazon Inspector](https://www.g2.com/products/amazon-inspector/reviews) — 4.4/5 stars (26 reviews)
- [Microsoft Defender Vulnerability Management](https://www.g2.com/products/microsoft-defender-vulnerability-management/reviews) — 4.4/5 stars (34 reviews)
- [Acunetix by Invicti](https://www.g2.com/products/acunetix-by-invicti/reviews) — 4.1/5 stars (105 reviews)

---
## Top Discussions

### Intruder

- Title: [Will Intruder&#39;s scans damage my systems?](https://www.g2.com/discussions/safety-c5a12906-e3b1-45c9-8cf9-355ece492a98) — 2 comments, 1 upvote
  > **Top comment:** "No"
- Title: [What does Intruder actually test for you?](https://www.g2.com/discussions/vulnerability-scanning) — 2 comments, 1 upvote
  > **Top comment:** "Saas applications, website and WAN"
- Title: [Is intruder IO safe?](https://www.g2.com/discussions/is-intruder-io-safe) — 1 comment
  > **Top comment:** "Intruder’s scanning engines are configured to be safe to use – even when scanning production systems, that said, this question does crop up from time to time..."
- Title: [What is intruder software?](https://www.g2.com/discussions/what-is-intruder-software) — 1 comment
  > **Top comment:** "Intruder is an online vulnerability scanning tool, designed to help you keep your internal, external, cloud systems and web-apps secure.

You can read all..."
- Title: [Who is Intruder?](https://www.g2.com/discussions/about-intruder) — 1 comment, 1 upvote *(includes official response)*
  > **Top comment:** "Intruder is a cloud-based vulnerability scanner that finds cybersecurity weaknesses in your digital infrastructure, helping you manage your attack surface..."

### Microsoft Defender External Attack Surface Management

No discussions available for this product.

### Tenable Vulnerability Management

- Title: [What is your primary use case for Tenable Vulnerability Management, and how has it impacted your security posture?](https://www.g2.com/discussions/what-is-your-primary-use-case-for-tenable-vulnerability-management-and-how-has-it-impacted-your-security-posture) — 1 comment
  > **Top comment:** "Hello, good morning!
Well, our first impression was of the completely vulnerable and exposed environment. This was a view we didn&#39;t have before Tenable VM...."
- Title: [What is Tenable.io used for?](https://www.g2.com/discussions/what-is-tenable-io-used-for) — 1 comment
  > **Top comment:** "vulnerability and security management."
- Title: [What is tenable io?](https://www.g2.com/discussions/what-is-tenable-io) — 1 comment
  > **Top comment:** "Tenable.io is user-friendly front end for Nessus scanners that provides a digestible view of all of the data the scanner is picking up. It allows you to..."
- Title: [Please advice on best practices for utilizing API to tie to visualization dashboards such as Power BI, Qlick, or Tableau](https://www.g2.com/discussions/34558-please-advice-on-best-practices-for-utilizing-api-to-tie-to-visualization-dashboards-such-as-power-bi-qlick-or-tableau) — 1 comment, 1 upvote
  > **Top comment:** "Table"

---
**Source:** [G2.com](https://www.g2.com) | [Comparison Page](https://www.g2.com/compare/intruder-vs-microsoft-defender-external-attack-surface-management-vs-tenable-vulnerability-management)

