Overview
Product Information on Intruder
What is Intruder?
Intruder Pricing
Intruder Product Images


Overall experience with Intruder
“Practical easy to deploy vulnerability scanning with strong cloud discovery”
About Company
Company Description
Intruder helps lean security teams proactively uncover and fix weaknesses by unifying attack surface management, cloud security and continuous vulnerability scanning in one intuitive platform. With compliance-ready reports and actionable results prioritized by severity and exploit likelihood, Intruder helps 3,000+ customers focus on fixing what matters. Integrating seamlessly with AWS, Azure, Google Cloud, Slack, Jira and more, Intruder makes exposure management simple, effective and scalable for growing teams.
Company Details
Key Insights
A Snapshot of What Matters - Based on Validated User Reviews
User Sentiment About Intruder
Reviewer Insights for: Intruder
Deciding Factors: Intruder Vs. Market Average
Performance of Intruder Across Market Features
Intruder Likes & Dislikes
Intruder's strengths for us are clear and practical: fast time to value and a clean UI that lets engineers run scans and triage issues without specialist training; built in cloud connectors (AWS/Azure/GCP) that automatically discover targets and integrations into our ITSM via an easy API.
Read Full ReviewEase of use, simple to setup needing no professional services, clear dashboards and a single pane of glass into our assets and potential vulnerabilities in real-time. Appreciate the emerging threat scans
Read Full ReviewThe service is robust and covers a lot of things while being very low friction. Once we had setup the required whitelisting for our application security, Intruder has been easy to work with and not hindered our resource or workflow while giving us more tools to deliver the client service we aim for.
Read Full ReviewExports and compliance grade Reports aren't as flexible as some other platforms. Feature depth for very large complex Environment.
Read Full ReviewThere have been some false positives which can sometimes cloud the overall posture and/or results. Yes, they can be snoozed as noise. Also picks up (for example) internal (K8s) certs as IP is discovered directly which is perhaps not accessible to the internet/malicious actors.
Read Full ReviewInitially when running the scans I was a little surprised by how long they took (one took nearly 16 hours), but they cover a lot of checks and now I've built the timing into our schedules it is fine (they run automated as a service so it is click and forget to a degree).
Read Full ReviewTop Intruder Alternatives
Peer Discussions
Intruder Reviews and Ratings
- VP, IT50M-1B USDManufacturingReview Source
Practical easy to deploy vulnerability scanning with strong cloud discovery
We use Intruder to cover our external infrastructure and cloud accounts. Setup was very quick, onboarding friction was low and scans returned actionable findings with minimal tuning. Continuous discovery of internet facing services caught changes in our cloud footprint reliably and the risk priotisation meant we could focus on high impact fixes. - Chief Information Security Officer50M-1B USDIT ServicesReview Source
Simple, real-time vulnerability detection across multiple cloud assets
Been super easy to work with since first showcased at a Financial Services tech event. Provides a good level of coverage at a good price, without the additional complexities of the larger vendors who squeeze anything and everything into a product (at a cost) rather than perhaps concentrate on the prime, simple purpose of the product. - Director<50M USDSoftwareReview Source
Flexible and easy scanning solution
Overall our experience with Intruder so far has been great. I had a video call with rep from the Intruder team who was great at understanding our needs/context, and then showing me how the platform could meet our needs. We followed that with a 14 day trial to road test it, followed by a paid plan. We are now implementing Intruder across a range of projects, and a couple of clients have already commented on how much happier they are knowing this sort of solution is running as part of our package for them. - SVP of Technology50M-1B USDSoftwareReview Source
Simple Intruder.io Setup With Intuitive Interface and Automated Vulnerability Scanning
Setting up Intruder.io vulnerability scanning was very easy, the user interface is intuitive, and the real-time scanning provides my team and I with valuable insights and protection. - Software Development Manager<50M USDSoftwareReview Source
Intruder - Autopenetration Testing for Startups and SOC2 Kick off
- Simple to use. - Autopentests are a requirement to the SOC2. Intruder platform offers a solid base to start this. Early products (startup products) do not require customized and tailored penetration testing which costs much more.



