162 Intruder Reviews
Overall Review Sentiment for Intruder
Log in to view review sentiment.


I came across Intruder while searching for a vulnerability scanner and was impressed with how user-friendly it was compared to other options. Despite its simplicity, Intruder offers a wide range of features and integrations, Slack being the most useful for us. We had no trouble integrating it into our deployment processes via an easy-to-use MSI script.
The reporting and portal made it easy to access information and the remediation steps were clear and concise. The interface and reporting were excellent, with the executive summary being particularly precise and understandable to our executive team. Overall, Intruder made my job much easier and I highly recommend it. Review collected by and hosted on G2.com.
Some agents would sometimes stop responding and the only fix was a re-install, this was further compounded by having then wait 30 days for the license to be released before re-adding, this also made re-imaging laptops as we had to wait 30 days for them to be re-added
Hopefully, this is a short-term issue and intruders awesome support will address this. Review collected by and hosted on G2.com.

Every once in a while, you run into a company that gives you a good feeling.
Intruder is that kind of company.
Their customer service is top notch and their enthusiastic willingness to help their clients is a breath of fresh air.
They are a class-act.
They’ve managed to harness the significant power of the Nessus scanner and present it in an extremely user-friendly way to their clients, that’s easy to navigate.
Managing our scans was straightforward and the resulting information was clear, detailed and comprehensive.
It made our remediations easy.
Dealing with Intruder on all levels was a pleasure. Review collected by and hosted on G2.com.
Everything worked well. Nothing to dislike. Review collected by and hosted on G2.com.
My experience so far has been excellent, the web interface is "buttery smooth", easy to get started with, easy to use and affordable. Their support staff has been responsive and helpful. Adding targets, integrating with our cloud environment and integrating with JIRA were very simple. Once all our targets were setup, we built a weekly scan schedule which is fantastic.
However, one of my favorite features is integration with Microsoft Teams and automatic scans for emerging threats. For example, if I have started my weekend already, sometimes Intruder.io becomes aware of an emerging threat. It will immediately kickoff a new scan of our infrastructure to detect if we are vulnerable to this new threat. It will notify us via teams it is starting the scan, and notify when complete and what the findings were. So I can be at a kids sporting event on a saturday and get all these updates. It feels like we have a virtual employee working for us, watching our back for new threats, scanning for them, and then reassuring us we are okay.
I was able to purchase without contacting a sales rep. I was able to use the pricing sliders on their website to build the plan that is right for our business. Review collected by and hosted on G2.com.
This may be a credit to Intruder versus a dislike. I'll explain. We have detected 2 "anomolies or vulnerabilities" that may have been false positives. However, I will say, there is strong evidence to suggest that these were not false positives, but that Intruder actually detected a real world anomoly. For example, it picked up UPNP exposure on an Azure resource that is not a VM we control or have visibility to. We ran our own scan and detected the same UPNP exposure, validating Intruders findings. The finding went away the next day on a followup scan using Intruder. After working with the Intruder team, we beleive this actually revealed the "man behind the curtain", meaning Microsoft Azure infrastructure that is never meant to be seen. While we will never know what this was, it may be a credit to Intruder for finding it and raising our attention to it. Review collected by and hosted on G2.com.
We used to run automated vulnerability scanners, but since support for that ended, we've been unable to find one as easy to use until we found intruder.io. So simple to set up and start scanning your infrastructure with a 14 day free trial. Quickly identifies systems with known vulnerabilities within your production and office environments. Unlike previous systems I've used, we've been able to run internal scans of our product to be even more comprehensive. Be sure to check pricing closer; not as expensive as it would initially appear. Review collected by and hosted on G2.com.
Don't use authentication license on production systems, intruder.io scans will change data within your system as part of the tests that are being run. This should be more obvious, lucky we tested on staging systems first. Review collected by and hosted on G2.com.
We have been using intruder.io for our company's vulnerability scans for a few years, and I am thoroughly impressed. First and foremost, the pricing is absolutely fantastic. The platform seamlessly integrates into our overall security toolbox, providing us with essential knowledge of the software that may be misconfigured or outdated. We can use the API to create our reporting of past scans, vulnerabilities, and how quickly we resolved the issue. The user-friendly interface makes it easy for our team to understand and address vulnerabilities effectively. Thanks to intruder.io, we now know that our systems are thoroughly tested and more secure. I highly recommend intruder.io to organizations seeking reliable and cost-effective security testing solutions. Review collected by and hosted on G2.com.
Unauthenticated website scans can take quite some time to complete. The nice thing is their support team was very responsive when questioned about the length of time. The only other thing is there is not a lot of historical data within reports, so we had to create our own. Review collected by and hosted on G2.com.

We were after an authenticated, comprehensive vulnerability scanner, and after testing the intruder.io platform, we found numerous positive features that make it a standout option in the marketplace.
Firstly, the quality of its support staff. The team is readily available via the chat app and is always willing to help with any queries or concerns. The chat app has a feature that saves the history of the conversation, making it easy to refer back to any technical discussions.
Another notable positive of Intruder.io is the comprehensiveness of the outputs. The results of the scans are clearly explained and categorized, with remediation of any identified threats outlined. This makes it easy to understand the vulnerabilities and take appropriate action to fix them. Regarding the UI, the navigation is intuitive, and the tool's features are clearly accessible. Review collected by and hosted on G2.com.
One potential negative of Intruder.io is the 30-day lock on moving authentication domain targets. If a user wants to switch to a new domain or target for authentication testing, they must wait for 30 days before they can do so. This limitation can be frustrating, especially if switching domains is a requirement. Review collected by and hosted on G2.com.
Intruder provides good value. The cost of their services is lower than most competitors, but don't let that fool you into thinking you are getting an inferior product. Their Customer Support and Product teams cannot be beaten. Customer support is always reachable in a short amount of time and professional in all of my dealings with them. The Product Team has a feedback forum where product end-users can discuss and vote on product enhancements to fit their business needs. Review collected by and hosted on G2.com.
The API cannot dive deep into the details of assets and their associated vulnerabilities. Our business needs changed from needing a giant list of vulnerabilities to wanting to filter on particular vulnerabilities and their associated assets for efficiency reasons. Review collected by and hosted on G2.com.

This platform enables my team not to waste time testing against known vulnerabilities and focus on hardening our services and solutions.
Intruder also provides a huge benefit in proactive Change detection, where it will advise when new instances or hosts are detected as well as any vulnerabilities that it may have, allowing for more agile change management. This also allows the teams to learn positively and move faster. Review collected by and hosted on G2.com.
Once a threat is detected, it would be nice if there was a button on the detected threat to allow customers to retest and validate that their fix has resolved the vulnerability without having to run an unscheduled full gamut pen test to clear the issue out. This slows the remediation process. Having a button that can check and clear that one vulnerability would mean quicker cycle time and I am sure less expense for Intruder from a Cloud Compute standpoint. Review collected by and hosted on G2.com.