Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Paid
Claimed
Optimized for quick response

Intruder Features

What are the features of Intruder?

Administration

  • Dashboard & Reporting
  • Alerting
  • Reporting and Analytics

Risk Analysis

  • Vulnerability Assessment

Analysis

  • Issue Tracking
  • Reconnaissance
  • Vulnerability Scan

Testing

  • Performance and Reliability

Performance

  • Issue Tracking
  • Detection Rate
  • False Positives
  • Automated Scans

Network

  • Perimeter Scanning

Application

  • Manual Application Testing
  • Black Box Testing

Filter for Features

Administration

Dashboard & Reporting

Reporting and analytics that report on activity and program effectiveness. 21 reviewers of Intruder have provided feedback on this feature.
90%
(Based on 21 reviews)

Alerting

Identifies and alerts administrators of threats, issues, incidents and requests related to website security. This feature was mentioned in 20 Intruder reviews.
98%
(Based on 20 reviews)

API / Integrations

Application Programming Interface Specification for how the application communicates with other software. APIs typically enable integration of data, logic, objects, etc. with other software applications. 16 reviewers of Intruder have provided feedback on this feature.
82%
(Based on 16 reviews)

Extensibility

Provides the ability to extend the platform to include additional features and functionalities This feature was mentioned in 14 Intruder reviews.
85%
(Based on 14 reviews)

Reporting and Analytics

Tools to visualize and analyze data. This feature was mentioned in 37 Intruder reviews.
92%
(Based on 37 reviews)

API / Integrations

Application Programming Interface Specification for how the application communicates with other software. APIs typically enable integration of data, logic, objects, etc. with other software applications.

Not enough data

Extensibility

Provides the ability to extend the platform to include additional features and functionalities

Not enough data

Risk Analysis

Vulnerability Assessment

Based on 20 Intruder reviews. Analyzes your existing website and network to outline access points that can be easily compromised.
97%
(Based on 20 reviews)

Analysis

Issue Tracking

As reported in 30 Intruder reviews. Track issues and manage resolutions.
93%
(Based on 30 reviews)

Reconnaissance

As reported in 27 Intruder reviews. Gathers information about the system and potential exploits to be tested.
90%
(Based on 27 reviews)

Vulnerability Scan

Based on 39 Intruder reviews. Scans applications and networks for known vulnerabilities, holes and exploits.
96%
(Based on 39 reviews)

Reporting and Analytics

Tools to visualize and analyze data.

Not enough data

Issue Tracking

Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process.

Not enough data

Vulnerability Scan

Scans applications and networks for known vulnerabilities, holes and exploits.

Not enough data

Testing

Manual Testing

Allows users to perfrom hands-on live simulations and penetration tests.

Not enough data

Test Automation

Runs pre-scripted security tests without requiring manual work. This feature was mentioned in 18 Intruder reviews.
89%
(Based on 18 reviews)

Performance and Reliability

Based on 27 Intruder reviews. Software is consistently available (uptime) and allows users to complete tasks quickly because they are not waiting for the software to respond to an action they took.
94%
(Based on 27 reviews)

Manual Testing

Allows users to perfrom hands-on live simulations and penetration tests.

Not enough data

Test Automation

Runs pre-scripted security tests without requiring manual work.

Not enough data

Compliance Testing

Allows users to test applications for specific compliance requirements.

Not enough data

Black-Box Scanning

Scans functional applications externally for vulnerabilities like SQL injection or XSS.

Not enough data

Detection Rate

The rate at which scans accurately detect all vulnerabilities associated with the target.

Not enough data

False Positives

The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists.

Not enough data

Performance

Issue Tracking

Based on 55 Intruder reviews and verified by the G2 Product R&D team. Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process.
91%
(Based on 55 reviews)

Detection Rate

Based on 64 Intruder reviews and verified by the G2 Product R&D team. The rate at which scans accurately detect all vulnerabilities associated with the target.
95%
(Based on 64 reviews)

False Positives

Based on 61 Intruder reviews and verified by the G2 Product R&D team. The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists.
78%
(Based on 61 reviews)

Automated Scans

Based on 70 Intruder reviews and verified by the G2 Product R&D team. Runs pre-scripted vulnerability scans without requiring manual work.
95%
(Based on 70 reviews)

Network

Compliance Testing

Allows users to scan applications and networks for specific compliance requirements. This feature was mentioned in 16 Intruder reviews.
96%
(Based on 16 reviews)

Perimeter Scanning

Based on 56 Intruder reviews and verified by the G2 Product R&D team. Analyzes network devices, servers and operating systems for vulnerabilities.
92%
(Based on 56 reviews)

Application

Manual Application Testing

Based on 31 Intruder reviews and verified by the G2 Product R&D team. Allows users to perfrom hands-on live simulations and penetration tests.
85%
(Based on 31 reviews)

Black Box Testing

Based on 29 Intruder reviews and verified by the G2 Product R&D team. Scans functional applications externally for vulnerabilities like SQL injection or XSS.
85%
(Based on 29 reviews)

API Management

API Discovery

Detects new and undocumented assets as they enter a network and add them to asset inventory.

Not enough data

Reporting

Provides results of the simulation and reveals potential security gaps or vulnerabilitites.

Not enough data

Security Testing

API Testing

Runs pre-scripted security tests without requiring manual work.

Not enough data

Monitoring

Vulnerability Intelligence

Stores information related to common vulnerabilities and how to resolve them once incidents occur.

Not enough data

Compliance Monitoring

Monitors data quality and sends alerts based on violations or misuse.

Not enough data

Continuous Monitoring

Aggregates real-time updates and historical data from multiplate internal and external data sources to support ongoing proactive threat response.

Not enough data

Asset Management

Asset Discovery

Detects new assets as they enter cloud environments and networks to add to asset inventory.

Not enough data

Shadow IT Detection

Identifies unsanctioned software.

Not enough data

Risk Management

Risk-Prioritization

As reported in 11 Intruder reviews. Allows for vulnerability ranking by customized risk and threat priorities.
94%
(Based on 11 reviews)

Reconnaissance

As reported in 11 Intruder reviews. Gathers information about the system and potential exploits to be tested.
89%
(Based on 11 reviews)

Threat Intelligence

Stores information related to common threats and how to resolve them once incidents occur.

Not enough data