Compare Intruder and VulScan

At a Glance
Intruder
Intruder
Star Rating
(206)4.8 out of 5
Market Segments
Small-Business (58.7% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Starting at $149.00 Per Month
Free Trial is available
Browse all 4 pricing plans
VulScan
VulScan
Star Rating
(120)4.1 out of 5
Market Segments
Small-Business (66.7% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about VulScan

Intruder vs VulScan

When assessing the two solutions, reviewers found Intruder easier to use, set up, and administer. Reviewers also preferred doing business with Intruder overall.

  • Reviewers felt that Intruder meets the needs of their business better than VulScan.
  • When comparing quality of ongoing product support, reviewers felt that Intruder is the preferred option.
  • For feature updates and roadmaps, our reviewers preferred the direction of Intruder over VulScan.
Pricing
Entry-Level Pricing
Intruder
Essential
Starting at $149.00
Per Month
Browse all 4 pricing plans
VulScan
No pricing available
Free Trial
Intruder
Free Trial is available
VulScan
No trial information available
Ratings
Meets Requirements
9.4
159
8.0
105
Ease of Use
9.5
164
8.1
111
Ease of Setup
9.6
143
7.5
104
Ease of Admin
9.5
132
7.9
94
Quality of Support
9.7
153
8.1
96
Has the product been a good partner in doing business?
9.7
125
8.2
91
Product Direction (% positive)
9.8
149
7.9
106
Features by Category
8.8
33
Not enough data
Administration
Feature Not Available
Not enough data
9.2
32
Not enough data
9.7
31
Not enough data
Risk Analysis
Feature Not Available
Not enough data
9.6
31
Not enough data
Feature Not Available
Not enough data
Threat Protection
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Generative AI
6.8
10
Not enough data
9.0
53
Not enough data
Administration
8.6
28
Not enough data
8.5
25
Not enough data
9.1
50
Not enough data
Analysis
9.4
41
Not enough data
9.2
38
Not enough data
9.6
51
Not enough data
Testing
Feature Not Available
Not enough data
8.6
20
Not enough data
8.7
29
Not enough data
9.4
39
Not enough data
Dynamic Application Security Testing (DAST)Hide 13 FeaturesShow 13 Features
8.8
8
Not enough data
Administration
8.9
6
Not enough data
8.6
6
Not enough data
Analysis
9.5
7
Not enough data
9.6
8
Not enough data
Feature Not Available
Not enough data
9.8
8
Not enough data
Feature Not Available
Not enough data
Testing
7.9
7
Not enough data
8.8
7
Not enough data
7.8
6
Not enough data
9.0
7
Not enough data
9.5
7
Not enough data
7.9
7
Not enough data
8.7
103
6.7
87
Performance
9.1
80
|
Verified
7.6
82
9.3
90
|
Verified
7.7
85
7.8
89
|
Verified
6.0
82
9.5
98
|
Verified
8.6
83
Network
9.0
39
7.6
79
9.0
82
|
Verified
7.8
80
Feature Not Available
6.9
76
Application
8.2
54
|
Verified
6.3
76
Feature Not Available
Feature Not Available
8.4
50
|
Verified
6.0
73
Agentic AI - Vulnerability Scanner
8.1
8
4.9
13
8.3
9
4.4
13
Risk-Based Vulnerability ManagementHide 11 FeaturesShow 11 Features
Not enough data
7.0
39
Risk Analysis
Not enough data
7.8
37
Not enough data
7.2
38
Not enough data
7.5
37
Vulnerability Assesment
Not enough data
8.2
39
Not enough data
7.6
38
Not enough data
7.1
34
Not enough data
6.8
38
Automation
Not enough data
5.1
31
Not enough data
6.0
32
Not enough data
6.1
36
Not enough data
7.2
32
8.9
11
Not enough data
API Management
8.8
8
Not enough data
Feature Not Available
Not enough data
9.2
10
Not enough data
Feature Not Available
Not enough data
Security Testing
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.7
10
Not enough data
Security Management
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Cloud Security Posture Management (CSPM)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Configuration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Attack Surface ManagementHide 12 FeaturesShow 12 Features
8.8
25
Not enough data
Asset Management
9.3
19
Not enough data
8.1
18
Not enough data
Feature Not Available
Not enough data
Monitoring
Feature Not Available
Not enough data
9.5
22
Not enough data
9.3
21
Not enough data
9.6
22
Not enough data
Risk Management
9.2
22
Not enough data
8.9
22
Not enough data
Feature Not Available
Not enough data
9.3
20
Not enough data
Generative AI
6.3
13
Not enough data
Not enough data
4.4
15
Generative AI
Not enough data
4.4
15
Monitoring - IT Risk Management
Not enough data
Not enough data
Agentic AI - IT Risk Management
Not enough data
Not enough data
Not enough data
Not enough data
Exposure Management PlatformsHide 6 FeaturesShow 6 Features
Not enough data
Not enough data
Generative AI - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Risk Identification and Assessment - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring and Integration - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
7.1
26
Orchestration
Not enough data
7.4
23
Not enough data
6.9
22
Not enough data
7.5
24
Not enough data
6.3
21
Information
Not enough data
7.6
23
Not enough data
6.7
23
Not enough data
7.6
24
Personalization
Not enough data
8.0
24
Not enough data
8.1
24
Not enough data
Feature Not Available
Generative AI
Not enough data
4.5
10
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Threat Intelligence
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Intruder
Intruder
VulScan
VulScan
Intruder and VulScan are categorized as Vulnerability Scanner
Reviews
Reviewers' Company Size
Intruder
Intruder
Small-Business(50 or fewer emp.)
58.7%
Mid-Market(51-1000 emp.)
36.8%
Enterprise(> 1000 emp.)
4.5%
VulScan
VulScan
Small-Business(50 or fewer emp.)
66.7%
Mid-Market(51-1000 emp.)
31.7%
Enterprise(> 1000 emp.)
1.7%
Reviewers' Industry
Intruder
Intruder
Computer Software
21.0%
Information Technology and Services
15.5%
Financial Services
7.5%
Computer & Network Security
6.0%
Insurance
2.5%
Other
47.5%
VulScan
VulScan
Information Technology and Services
42.5%
Computer & Network Security
30.8%
Computer Networking
3.3%
Financial Services
2.5%
Computer Software
1.7%
Other
19.2%
Alternatives
Intruder
Intruder Alternatives
Detectify
Detectify
Add Detectify
Tenable Nessus
Tenable Nessus
Add Tenable Nessus
Invicti (formerly Netsparker)
Invicti (formerly Netsparker)
Add Invicti (formerly Netsparker)
Acunetix by Invicti
Acunetix by Invicti
Add Acunetix by Invicti
VulScan
VulScan Alternatives
Tenable Nessus
Tenable Nessus
Add Tenable Nessus
Wiz
Wiz
Add Wiz
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
UpGuard
UpGuard
Add UpGuard
Discussions
Intruder
Intruder Discussions
What does Intruder actually test for you?
2 Comments
Official Response from Intruder
Intruder currently performs ~10,000 checks varying from configuration weaknesses, security patches, and application bugs. An up-to-date list can always be...Read more
Will Intruder's scans damage my systems?
2 Comments
Official Response from Intruder
It's very unlikely that Intruder's scans will damage your systems. If this is a concern of yours, users have the ability to throttle scans.Read more
What are Intruder's key principals?
1 Comment
Official Response from Intruder
We pride ourselves on being a simple, intuitive product that still packs a punch. Vulnerability management can be a complicated task, but it doesn't have to...Read more
VulScan
VulScan Discussions
Monty the Mongoose crying
VulScan has no discussions with answers