Users report that Intruder excels in Ease of Use with a score of 9.5, making it highly accessible for small businesses, while Tenable Nessus, with a score of 8.9, is noted for being more complex, which may require additional training for users.
Reviewers mention that Intruder's Alerting feature is particularly robust, scoring 9.8, which allows for timely notifications of vulnerabilities, whereas Tenable Nessus, with a score of 8.8, has been described as less responsive in alerting users about critical issues.
G2 users highlight Intruder's Asset Discovery capabilities, achieving a perfect score of 10.0, which helps organizations identify all assets in their network effectively. In contrast, Tenable Nessus, while still effective, scored lower at 8.5, indicating room for improvement in this area.
Users on G2 report that Intruder's Quality of Support is exceptional, with a score of 9.7, often citing quick response times and helpful resources. Tenable Nessus, however, received a lower score of 8.4, with some users expressing frustration over slower support responses.
Reviewers mention that Intruder's Automated Scans are highly efficient, scoring 9.5, which allows for regular vulnerability assessments without manual intervention. Tenable Nessus, while also effective with a score of 9.0, has been noted for requiring more configuration to achieve similar results.
Users say that Intruder's Vulnerability Assessment feature is particularly strong, scoring 9.7, providing comprehensive insights into security weaknesses. In comparison, Tenable Nessus, with a score of 8.8, is seen as effective but less user-friendly in presenting vulnerability data.
Intruder currently performs ~10,000 checks varying from configuration weaknesses, security patches, and application bugs. An up-to-date list can always be...Read more
Will Intruder's scans damage my systems?
2 Comments
Official Response from Intruder
It's very unlikely that Intruder's scans will damage your systems. If this is a concern of yours, users have the ability to throttle scans.Read more
What are Intruder's key principals?
1 Comment
Official Response from Intruder
We pride ourselves on being a simple, intuitive product that still packs a punch. Vulnerability management can be a complicated task, but it doesn't have to...Read more
Nessus Professional has always been designed for the security professional. The typical Nessus user is a consultant or contractor who is very experienced...Read more
Can I use Nessus professional data in other applications?
2 Comments
Official Response from Tenable Nessus
Yes. Many third party applications can incorporate a Nessus file. This allows consultants to share the data with their clients’ other applications for the...Read more
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.