Intruder Features
Administration (7)
Dashboard & Reporting
As reported in 32 Intruder reviews.
Reporting and analytics that report on activity and program effectiveness.
Alerting
This feature was mentioned in 31 Intruder reviews.
Identifies and alerts administrators of threats, issues, incidents and requests related to website security.
API / Integrations
As reported in 28 Intruder reviews.
Application Programming Interface Specification for how the application communicates with other software. APIs typically enable integration of data, logic, objects, etc. with other software applications.
Extensibility
This feature was mentioned in 25 Intruder reviews.
Provides the ability to extend the platform to include additional features and functionalities
Reporting and Analytics
This feature was mentioned in 50 Intruder reviews.
Tools to visualize and analyze data.
API / Integrations
Application Programming Interface Specification for how the application communicates with other software. APIs typically enable integration of data, logic, objects, etc. with other software applications.
Extensibility
Provides the ability to extend the platform to include additional features and functionalities
Risk Analysis (1)
Vulnerability Assessment
Based on 31 Intruder reviews.
Analyzes your existing website and network to outline access points that can be easily compromised.
Analysis (6)
Issue Tracking
41 reviewers of Intruder have provided feedback on this feature.
Track issues and manage resolutions.
Reconnaissance
As reported in 38 Intruder reviews.
Gathers information about the system and potential exploits to be tested.
Vulnerability Scan
51 reviewers of Intruder have provided feedback on this feature.
Scans applications and networks for known vulnerabilities, holes and exploits.
Reporting and Analytics
Tools to visualize and analyze data.
Issue Tracking
Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process.
Vulnerability Scan
Scans applications and networks for known vulnerabilities, holes and exploits.
Testing (9)
Manual Testing
This feature was mentioned in 20 Intruder reviews.
Allows users to perfrom hands-on live simulations and penetration tests.
Test Automation
As reported in 29 Intruder reviews.
Runs pre-scripted security tests without requiring manual work.
Performance and Reliability
This feature was mentioned in 39 Intruder reviews.
Software is consistently available (uptime) and allows users to complete tasks quickly because they are not waiting for the software to respond to an action they took.
Manual Testing
Allows users to perfrom hands-on live simulations and penetration tests.
Test Automation
Runs pre-scripted security tests without requiring manual work.
Compliance Testing
Allows users to test applications for specific compliance requirements.
Black-Box Scanning
Scans functional applications externally for vulnerabilities like SQL injection or XSS.
Detection Rate
The rate at which scans accurately detect all vulnerabilities associated with the target.
False Positives
The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists.
Performance (4)
Issue Tracking
Based on 79 Intruder reviews and verified by the G2 Product R&D team.
Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process.
Detection Rate
Based on 90 Intruder reviews and verified by the G2 Product R&D team.
The rate at which scans accurately detect all vulnerabilities associated with the target.
False Positives
Based on 89 Intruder reviews and verified by the G2 Product R&D team.
The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists.
Automated Scans
Based on 98 Intruder reviews and verified by the G2 Product R&D team.
Runs pre-scripted vulnerability scans without requiring manual work.
Network (2)
Compliance Testing
Based on 39 Intruder reviews.
Allows users to scan applications and networks for specific compliance requirements.
Perimeter Scanning
Based on 82 Intruder reviews and verified by the G2 Product R&D team.
Analyzes network devices, servers and operating systems for vulnerabilities.
Application (2)
Manual Application Testing
Based on 53 Intruder reviews and verified by the G2 Product R&D team.
Allows users to perfrom hands-on live simulations and penetration tests.
Black Box Testing
Based on 50 Intruder reviews and verified by the G2 Product R&D team.
Scans functional applications externally for vulnerabilities like SQL injection or XSS.
API Management (2)
API Discovery
Detects new and undocumented assets as they enter a network and add them to asset inventory.
Reporting
As reported in 10 Intruder reviews.
Provides results of the simulation and reveals potential security gaps or vulnerabilitites.
Security Testing (1)
API Testing
As reported in 10 Intruder reviews.
Runs pre-scripted security tests without requiring manual work.
Configuration (5)
DLP Configuration
Offers data loss prevention tools to protect data from leaving the environments it is allowed to.
Configuration Monitoring
Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Unified Policy Management
Allows users to track and control security policies across cloud services and providers.
Adaptive Access Control
Provides a risk-based approach to determining trust within the network.
API / Integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Visibility (2)
Multicloud Visibility
Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.
Asset Discovery
Detect new assets as they enter a cloud environments and networks to add to asset inventory.
Vulnerability Management (4)
Threat Hunting
Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks.
Vulnerability Scanning
Analyzes your existing cloud, network, and IT infrastructure to outline access points that can be easily compromised.
Vulnerability Intelligence
Stores information related to new and common vulnerabilities and how to resolve them once incidents occur.
Risk-Prioritization
Allows for vulnerability ranking by customized risk and threat priorities.
Monitoring (3)
Vulnerability Intelligence
Based on 22 Intruder reviews.
Stores information related to common vulnerabilities and how to resolve them once incidents occur.
Compliance Monitoring
Based on 21 Intruder reviews.
Monitors data quality and sends alerts based on violations or misuse.
Continuous Monitoring
22 reviewers of Intruder have provided feedback on this feature.
Aggregates real-time updates and historical data from multiplate internal and external data sources to support ongoing proactive threat response.
Asset Management (2)
Asset Discovery
This feature was mentioned in 19 Intruder reviews.
Detects new assets as they enter cloud environments and networks to add to asset inventory.
Shadow IT Detection
This feature was mentioned in 18 Intruder reviews.
Identifies unsanctioned software.
Risk Management (3)
Risk-Prioritization
As reported in 22 Intruder reviews.
Allows for vulnerability ranking by customized risk and threat priorities.
Reconnaissance
This feature was mentioned in 22 Intruder reviews.
Gathers information about the system and potential exploits to be tested.
Threat Intelligence
This feature was mentioned in 20 Intruder reviews.
Stores information related to common threats and how to resolve them once incidents occur.
Generative AI (2)
AI Text Summarization
13 reviewers of Intruder have provided feedback on this feature.
Condenses long documents or text into a brief summary.
AI Text Summarization
This feature was mentioned in 10 Intruder reviews.
Condenses long documents or text into a brief summary.
Generative AI - Exposure Management Platforms (2)
Predictive Analytics
Uses AI-driven models to analyze historical and current data to enable organizations to manage new exposures proactively.
Automated Threat Detection
Uses AI algorithms to analyze data for patterns and anomalies that signify potential risks.
Risk Identification and Assessment - Exposure Management Platforms (2)
Comprehensive Risk Assessment
Identifies, evaluates, and monitors various types of risks to understand the overall risk exposure and prioritize them based on potential impact.
Advanced Analytics and Reporting
Includes tools for deep analysis of risk data, providing insights into trends and patterns that support strategic risk assessment and decision-making.
Monitoring and Integration - Exposure Management Platforms (2)
Integration and Data Consolidation
Ensures seamless interaction with other systems and unification of risk data, enabling a comprehensive view and efficient management of risk exposure.
Real-time Monitoring and Alerts
Allows for continuous surveillance of risk factors, providing timely alerts to mitigate emerging risks effectively.
Agentic AI - Vulnerability Scanner (2)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Proactive Assistance
Anticipates needs and offers suggestions without prompting






