G2 reviewers report that Intruder excels in ease of setup, with many users highlighting its intuitive onboarding process. One user mentioned, "I like how easy Intruder is to set up and execute," which reflects a common sentiment among users who appreciate the straightforward implementation.
Users say that Orca Security provides a comprehensive overview of cloud security, with features like dashboards and integration with Jira being particularly praised. A reviewer noted, "I like the change to get a full overview of the security of my cloud environment using only one tool," indicating its effectiveness in managing complex environments.
Reviewers mention that Intruder's autoscanner is a standout feature, providing continuous updates on critical vulnerabilities. Users appreciate the clarity and prioritization of findings, with one stating, "What we’ve found most helpful about Intruder is the clarity and prioritisation of its findings," which helps teams focus on the most pressing issues.
According to verified reviews, Orca Security's customer support is noted for its responsiveness, even at standard support levels. A user remarked, "Customer support is pretty fast," which can be crucial for organizations needing timely assistance.
G2 reviewers highlight that Intruder has a higher overall satisfaction score, reflecting its strong performance in areas like quality of support and detection rate. Users have expressed satisfaction with the product's ability to help them understand their risks and take action, stating, "It helped us gain visibility on our network."
Users report that while Orca Security has a solid feature set, some find it less intuitive compared to Intruder, particularly in terms of ease of use. One reviewer mentioned the need for improvement in certain areas, suggesting that while it offers powerful tools, the user experience could be enhanced.
An annual Orca subscription license is priced by compute asset. This lets you embrace new technologies (such as Orca) without concern of being charged for such assets as cloud storage or databases.
Intruder currently performs ~10,000 checks varying from configuration weaknesses, security patches, and application bugs. An up-to-date list can always be...Read more
Will Intruder's scans damage my systems?
2 Comments
Official Response from Intruder
It's very unlikely that Intruder's scans will damage your systems. If this is a concern of yours, users have the ability to throttle scans.Read more
What are Intruder's key principals?
1 Comment
Official Response from Intruder
We pride ourselves on being a simple, intuitive product that still packs a punch. Vulnerability management can be a complicated task, but it doesn't have to...Read more
SIEM tool for hunting threats, outdated oackages, overpowerful permissions, expired certificates. Mainly for AWS servicesRead more
What does Orca Security do?
1 Comment
Official Response from Orca Security
Orca Security is a leader in CNAPP innovation (Cloud Native Application Protection Platform) for workload and data protection, cloud security posture...Read more
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.