Compare Intruder and SentinelOne Singularity Cloud Security

At a Glance
Intruder
Intruder
Star Rating
(206)4.8 out of 5
Market Segments
Small-Business (58.7% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Starting at $149.00 Per Month
Free Trial is available
Browse all 4 pricing plans
SentinelOne Singularity Cloud Security
SentinelOne Singularity Cloud Security
Star Rating
(112)4.9 out of 5
Market Segments
Mid-Market (59.8% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about SentinelOne Singularity Cloud Security
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Intruder excels in its ease of setup and user-friendly interface, with many users highlighting the simplicity of the onboarding process and the effectiveness of the autoscanner feature. This has made it a popular choice among small businesses looking for straightforward vulnerability management.
  • Users say that SentinelOne Singularity Cloud Security offers impressive real-time threat detection capabilities, automatically isolating threats and remediating issues without manual intervention. This feature is particularly beneficial for organizations that require robust security for cloud environments.
  • Reviewers mention that Intruder provides clear prioritization of vulnerabilities, helping users focus on the most critical issues rather than being overwhelmed by low-value alerts. This clarity in reporting has been praised as a significant advantage for teams looking to tighten their defenses effectively.
  • According to verified reviews, SentinelOne Singularity Cloud Security is noted for its unified visibility across various platforms, including cloud servers and containers. Users appreciate its ability to analyze potential security risks, which enhances their overall security posture.
  • G2 reviewers highlight that while Intruder has a higher overall satisfaction score, SentinelOne Singularity Cloud Security boasts slightly better ratings in areas like quality of support and issue tracking, indicating a strong commitment to customer service and responsiveness.
  • Users report that Intruder's focus on small businesses allows it to cater specifically to their needs, while SentinelOne Singularity Cloud Security is more tailored for mid-market companies, which may affect the user experience depending on the organization's size and requirements.
Pricing
Entry-Level Pricing
Intruder
Essential
Starting at $149.00
Per Month
Browse all 4 pricing plans
SentinelOne Singularity Cloud Security
No pricing available
Free Trial
Intruder
Free Trial is available
SentinelOne Singularity Cloud Security
Free Trial is available
Ratings
Meets Requirements
9.4
159
9.8
105
Ease of Use
9.5
164
9.8
105
Ease of Setup
9.6
143
9.8
57
Ease of Admin
9.5
132
9.8
56
Quality of Support
9.7
153
9.9
103
Has the product been a good partner in doing business?
9.7
125
9.9
56
Product Direction (% positive)
9.8
149
10.0
102
Features by Category
8.8
33
Not enough data
Administration
Feature Not Available
Not enough data
9.2
32
Not enough data
9.7
31
Not enough data
Risk Analysis
Feature Not Available
Not enough data
9.6
31
Not enough data
Feature Not Available
Not enough data
Threat Protection
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Generative AI
6.8
10
Not enough data
Cloud Workload Protection PlatformsHide 10 FeaturesShow 10 Features
Not enough data
9.8
58
Management
Not enough data
9.8
56
Not enough data
9.9
34
Not enough data
9.7
50
Operations
Not enough data
9.9
37
Not enough data
9.9
37
Not enough data
9.9
34
Security Controls
Not enough data
9.7
32
Not enough data
9.8
30
Not enough data
9.9
37
Not enough data
9.7
32
9.0
53
Not enough data
Administration
8.6
28
Not enough data
8.5
25
Not enough data
9.1
50
Not enough data
Analysis
9.4
41
Not enough data
9.2
38
Not enough data
9.6
51
Not enough data
Testing
Feature Not Available
Not enough data
8.6
20
Not enough data
8.7
29
Not enough data
9.4
39
Not enough data
Dynamic Application Security Testing (DAST)Hide 13 FeaturesShow 13 Features
8.8
8
Not enough data
Administration
8.9
6
Not enough data
8.6
6
Not enough data
Analysis
9.5
7
Not enough data
9.6
8
Not enough data
Feature Not Available
Not enough data
9.8
8
Not enough data
Feature Not Available
Not enough data
Testing
7.9
7
Not enough data
8.8
7
Not enough data
7.8
6
Not enough data
9.0
7
Not enough data
9.5
7
Not enough data
7.9
7
Not enough data
Not enough data
9.8
50
Administration
Not enough data
10.0
30
Not enough data
9.8
43
Not enough data
9.9
44
Not enough data
9.8
44
Monitoring
Not enough data
9.6
32
Not enough data
9.8
20
Not enough data
10.0
24
Protection
Not enough data
9.5
31
Not enough data
9.9
25
Not enough data
9.8
28
Not enough data
9.8
20
Not enough data
9.8
56
Security
Not enough data
9.9
51
Not enough data
9.8
30
Not enough data
9.7
25
Not enough data
9.8
47
Compliance
Not enough data
9.8
45
Not enough data
9.9
33
Not enough data
9.9
46
Administration
Not enough data
9.9
45
Not enough data
9.8
47
Not enough data
9.9
24
8.7
103
9.8
52
Performance
9.1
80
|
Verified
9.8
45
9.3
90
|
Verified
9.8
45
7.8
89
|
Verified
9.2
38
9.5
98
|
Verified
9.8
44
Network
9.0
39
9.9
30
9.0
82
|
Verified
9.8
21
Feature Not Available
9.9
32
Application
8.2
54
|
Verified
9.8
21
Feature Not Available
9.9
23
8.4
50
|
Verified
9.9
18
Agentic AI - Vulnerability Scanner
8.1
8
Not enough data
8.3
9
Not enough data
Cloud Security Monitoring and AnalyticsHide 13 FeaturesShow 13 Features
Not enough data
9.8
53
Activity Monitoring
Not enough data
9.8
28
Not enough data
9.9
29
Not enough data
9.6
30
Not enough data
9.7
25
Security
Not enough data
9.8
46
Not enough data
9.7
47
Not enough data
9.8
46
Administration
Not enough data
9.7
49
Not enough data
9.8
45
Not enough data
9.9
42
Agentic AI - Cloud Security Monitoring and Analytics
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.9
11
Not enough data
API Management
8.8
8
Not enough data
Feature Not Available
Not enough data
9.2
10
Not enough data
Feature Not Available
Not enough data
Security Testing
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.7
10
Not enough data
Security Management
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Cloud Security Posture Management (CSPM)Hide 11 FeaturesShow 11 Features
Not enough data
9.8
49
Configuration
Not enough data
9.9
23
Not enough data
9.8
44
Not enough data
9.7
44
Not enough data
9.9
30
Not enough data
10.0
31
Visibility
Not enough data
9.9
44
Not enough data
9.8
47
Vulnerability Management
Not enough data
9.8
40
Not enough data
9.9
48
Not enough data
9.8
48
Not enough data
9.8
46
Attack Surface ManagementHide 12 FeaturesShow 12 Features
8.8
25
9.7
56
Asset Management
9.3
19
9.5
43
8.1
18
9.8
20
Feature Not Available
9.4
38
Monitoring
Feature Not Available
9.6
38
9.5
22
9.7
40
9.3
21
9.8
40
9.6
22
9.9
41
Risk Management
9.2
22
9.8
53
8.9
22
9.7
44
Feature Not Available
9.6
36
9.3
20
9.7
29
Generative AI
6.3
13
Feature Not Available
Not enough data
Not enough data
Alerts management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Automation
Not enough data
Not enough data
Not enough data
Not enough data
Analysis
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Issue Resolution
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud-Native Application Protection Platform (CNAPP)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Security - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Exposure Management PlatformsHide 6 FeaturesShow 6 Features
Not enough data
Not enough data
Generative AI - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Risk Identification and Assessment - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring and Integration - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
AI Security Posture Management (AI-SPM) ToolsHide 9 FeaturesShow 9 Features
Not enough data
Not enough data
Functionality - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk Assessment - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Governance & Compliance - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Intruder
Intruder
SentinelOne Singularity Cloud Security
SentinelOne Singularity Cloud Security
Intruder and SentinelOne Singularity Cloud Security are categorized as Attack Surface Management, Exposure Management Platforms, Vulnerability Scanner, and Cloud Security Posture Management (CSPM)
Reviews
Reviewers' Company Size
Intruder
Intruder
Small-Business(50 or fewer emp.)
58.7%
Mid-Market(51-1000 emp.)
36.8%
Enterprise(> 1000 emp.)
4.5%
SentinelOne Singularity Cloud Security
SentinelOne Singularity Cloud Security
Small-Business(50 or fewer emp.)
8.9%
Mid-Market(51-1000 emp.)
59.8%
Enterprise(> 1000 emp.)
31.3%
Reviewers' Industry
Intruder
Intruder
Computer Software
21.0%
Information Technology and Services
15.5%
Financial Services
7.5%
Computer & Network Security
6.0%
Insurance
2.5%
Other
47.5%
SentinelOne Singularity Cloud Security
SentinelOne Singularity Cloud Security
Information Technology and Services
22.3%
Financial Services
19.6%
Computer & Network Security
10.7%
Health, Wellness and Fitness
6.3%
Computer Software
5.4%
Other
35.7%
Alternatives
Intruder
Intruder Alternatives
Detectify
Detectify
Add Detectify
Tenable Nessus
Tenable Nessus
Add Tenable Nessus
Invicti (formerly Netsparker)
Invicti (formerly Netsparker)
Add Invicti (formerly Netsparker)
Acunetix by Invicti
Acunetix by Invicti
Add Acunetix by Invicti
SentinelOne Singularity Cloud Security
SentinelOne Singularity Cloud Security Alternatives
Wiz
Wiz
Add Wiz
Microsoft Defender for Cloud
Microsoft Defender for Cloud
Add Microsoft Defender for Cloud
FortiCNAPP
FortiCNAPP
Add FortiCNAPP
Scrut Automation
Scrut Automation
Add Scrut Automation
Discussions
Intruder
Intruder Discussions
What does Intruder actually test for you?
2 Comments
Official Response from Intruder
Intruder currently performs ~10,000 checks varying from configuration weaknesses, security patches, and application bugs. An up-to-date list can always be...Read more
Will Intruder's scans damage my systems?
2 Comments
Official Response from Intruder
It's very unlikely that Intruder's scans will damage your systems. If this is a concern of yours, users have the ability to throttle scans.Read more
What are Intruder's key principals?
1 Comment
Official Response from Intruder
We pride ourselves on being a simple, intuitive product that still packs a punch. Vulnerability management can be a complicated task, but it doesn't have to...Read more
SentinelOne Singularity Cloud Security
SentinelOne Singularity Cloud Security Discussions
Monty the Mongoose crying
SentinelOne Singularity Cloud Security has no discussions with answers