G2 reviewers report that Intruder excels in user experience, with many praising its ease of setup and intuitive interface. Users highlight the autoscanner feature as a key benefit, allowing for quick execution and continuous updates on critical vulnerabilities.
According to verified reviews, Tenable Security Center offers a robust dashboard that provides an informative overview of system and scanner statuses. However, some users feel that while the dashboard is comprehensive, it can be overwhelming for new users compared to Intruder's more straightforward approach.
Users say that Intruder's clarity in reporting vulnerabilities is a standout feature, as it prioritizes significant issues without overwhelming users with low-value noise. This focus on actionable insights helps teams understand their risks better and take necessary actions.
Reviewers mention that Tenable Security Center is particularly strong in compliance scanning, allowing users to perform vulnerability and compliance scans in one report. This feature is beneficial for organizations needing to meet specific regulatory requirements, although it may not be as user-friendly as Intruder's offerings.
G2 reviewers highlight that Intruder has a significantly higher satisfaction score, reflecting its strong market presence and positive user feedback. With a total of 200 reviews, users consistently commend its quality of support and responsiveness, which enhances the overall experience.
According to recent user feedback, while Tenable Security Center is recognized for its powerful features, some users find it less accessible, particularly in terms of setup and administration. In contrast, Intruder's high scores in these areas suggest a more seamless experience for small to medium-sized businesses.
Intruder currently performs ~10,000 checks varying from configuration weaknesses, security patches, and application bugs. An up-to-date list can always be...Read more
Will Intruder's scans damage my systems?
2 Comments
Official Response from Intruder
It's very unlikely that Intruder's scans will damage your systems. If this is a concern of yours, users have the ability to throttle scans.Read more
What are Intruder's key principals?
1 Comment
Official Response from Intruder
We pride ourselves on being a simple, intuitive product that still packs a punch. Vulnerability management can be a complicated task, but it doesn't have to...Read more
What is the best way to break up scans so they don't use licenses up and so scans don't end up getting blocked?
1 Comment
CP
I would recommend to break in to groups based on your organization and run host discovery first and run asset based scanning to avoid this situation....Read more
What is Tenable.sc used for?
1 Comment
SW
Tenable products look for vulnerabilities in systems and devices. This way you can fix those before the bad gues get in. Think of it this way. Remember...Read more
Tenable Security Center has no more discussions with answers
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.