Intruder Features
What are the features of Intruder?
Administration
- Dashboard & Reporting
- Alerting
- Reporting and Analytics
Risk Analysis
- Vulnerability Assessment
Analysis
- Issue Tracking
- Reconnaissance
- Vulnerability Scan
Testing
- Performance and Reliability
Performance
- Issue Tracking
- Detection Rate
- False Positives
- Automated Scans
Network
- Perimeter Scanning
Application
- Manual Application Testing
- Black Box Testing
Intruder Categories on G2
Filter for Features
Administration
Dashboard & Reporting | Based on 25 Intruder reviews. Reporting and analytics that report on activity and program effectiveness. | 91% (Based on 25 reviews) | |
Alerting | Identifies and alerts administrators of threats, issues, incidents and requests related to website security. 24 reviewers of Intruder have provided feedback on this feature. | 97% (Based on 24 reviews) | |
API / Integrations | Application Programming Interface Specification for how the application communicates with other software. APIs typically enable integration of data, logic, objects, etc. with other software applications. 19 reviewers of Intruder have provided feedback on this feature. | 83% (Based on 19 reviews) | |
Extensibility | As reported in 17 Intruder reviews. Provides the ability to extend the platform to include additional features and functionalities | 84% (Based on 17 reviews) | |
Reporting and Analytics | Tools to visualize and analyze data. 40 reviewers of Intruder have provided feedback on this feature. | 90% (Based on 40 reviews) | |
API / Integrations | Application Programming Interface Specification for how the application communicates with other software. APIs typically enable integration of data, logic, objects, etc. with other software applications. | Not enough data | |
Extensibility | Provides the ability to extend the platform to include additional features and functionalities | Not enough data |
Risk Analysis
Vulnerability Assessment | Analyzes your existing website and network to outline access points that can be easily compromised. 24 reviewers of Intruder have provided feedback on this feature. | 97% (Based on 24 reviews) |
Analysis
Issue Tracking | Based on 33 Intruder reviews. Track issues and manage resolutions. | 93% (Based on 33 reviews) | |
Reconnaissance | Gathers information about the system and potential exploits to be tested. This feature was mentioned in 30 Intruder reviews. | 91% (Based on 30 reviews) | |
Vulnerability Scan | Scans applications and networks for known vulnerabilities, holes and exploits. 42 reviewers of Intruder have provided feedback on this feature. | 96% (Based on 42 reviews) | |
Reporting and Analytics | Tools to visualize and analyze data. | Not enough data | |
Issue Tracking | Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process. | Not enough data | |
Vulnerability Scan | Scans applications and networks for known vulnerabilities, holes and exploits. | Not enough data |
Testing
Manual Testing | Based on 12 Intruder reviews. Allows users to perfrom hands-on live simulations and penetration tests. | 81% (Based on 12 reviews) | |
Test Automation | Runs pre-scripted security tests without requiring manual work. This feature was mentioned in 21 Intruder reviews. | 87% (Based on 21 reviews) | |
Performance and Reliability | Software is consistently available (uptime) and allows users to complete tasks quickly because they are not waiting for the software to respond to an action they took. 30 reviewers of Intruder have provided feedback on this feature. | 93% (Based on 30 reviews) | |
Manual Testing | Allows users to perfrom hands-on live simulations and penetration tests. | Not enough data | |
Test Automation | Runs pre-scripted security tests without requiring manual work. | Not enough data | |
Compliance Testing | Allows users to test applications for specific compliance requirements. | Not enough data | |
Black-Box Scanning | Scans functional applications externally for vulnerabilities like SQL injection or XSS. | Not enough data | |
Detection Rate | The rate at which scans accurately detect all vulnerabilities associated with the target. | Not enough data | |
False Positives | The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists. | Not enough data |
Performance
Issue Tracking | Based on 62 Intruder reviews and verified by the G2 Product R&D team. Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process. | 90% (Based on 62 reviews) | |
Detection Rate | Based on 71 Intruder reviews and verified by the G2 Product R&D team. The rate at which scans accurately detect all vulnerabilities associated with the target. | 94% (Based on 71 reviews) | |
False Positives | Based on 68 Intruder reviews and verified by the G2 Product R&D team. The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists. | 78% (Based on 68 reviews) | |
Automated Scans | Based on 77 Intruder reviews and verified by the G2 Product R&D team. Runs pre-scripted vulnerability scans without requiring manual work. | 95% (Based on 77 reviews) |
Network
Compliance Testing | Allows users to scan applications and networks for specific compliance requirements. 23 reviewers of Intruder have provided feedback on this feature. | 90% (Based on 23 reviews) | |
Perimeter Scanning | Based on 63 Intruder reviews and verified by the G2 Product R&D team. Analyzes network devices, servers and operating systems for vulnerabilities. | 90% (Based on 63 reviews) |
Application
Manual Application Testing | Based on 37 Intruder reviews and verified by the G2 Product R&D team. Allows users to perfrom hands-on live simulations and penetration tests. | 81% (Based on 37 reviews) | |
Black Box Testing | Based on 35 Intruder reviews and verified by the G2 Product R&D team. Scans functional applications externally for vulnerabilities like SQL injection or XSS. | 83% (Based on 35 reviews) |
API Management
API Discovery | Detects new and undocumented assets as they enter a network and add them to asset inventory. | Not enough data | |
Reporting | Provides results of the simulation and reveals potential security gaps or vulnerabilitites. | Not enough data |
Security Testing
API Testing | Runs pre-scripted security tests without requiring manual work. | Not enough data |
Monitoring
Vulnerability Intelligence | Based on 12 Intruder reviews. Stores information related to common vulnerabilities and how to resolve them once incidents occur. | 96% (Based on 12 reviews) | |
Compliance Monitoring | Monitors data quality and sends alerts based on violations or misuse. 12 reviewers of Intruder have provided feedback on this feature. | 94% (Based on 12 reviews) | |
Continuous Monitoring | Aggregates real-time updates and historical data from multiplate internal and external data sources to support ongoing proactive threat response. 12 reviewers of Intruder have provided feedback on this feature. | 96% (Based on 12 reviews) |
Asset Management
Asset Discovery | Detects new assets as they enter cloud environments and networks to add to asset inventory. 10 reviewers of Intruder have provided feedback on this feature. | 93% (Based on 10 reviews) | |
Shadow IT Detection | Identifies unsanctioned software. | Not enough data |
Risk Management
Risk-Prioritization | Allows for vulnerability ranking by customized risk and threat priorities. This feature was mentioned in 14 Intruder reviews. | 92% (Based on 14 reviews) | |
Reconnaissance | Based on 14 Intruder reviews. Gathers information about the system and potential exploits to be tested. | 88% (Based on 14 reviews) | |
Threat Intelligence | Stores information related to common threats and how to resolve them once incidents occur. 11 reviewers of Intruder have provided feedback on this feature. | 94% (Based on 11 reviews) |
Generative AI
AI Text Summarization | Condenses long documents or text into a brief summary. | Not enough data | |
AI Text Summarization | Condenses long documents or text into a brief summary. | Not enough data |