Cloud-Based Tokenization vs Intruder

Starting Price

Not provided by vendor

$37.50/month

Best For

TokenEx secures sensitive data for all industries across the world, including e-commerce, insurance, analytics, health care and more.

Intruder is effortless vulnerability management software for companies with limited internal resources to cope with the demands of running an effective vulnerability management programme.

Rating

(0)


5 / 5
(1)

Ideal number of Users

10 - 1000+

1 - 9

Ease of Use


5 / 5

Customer Support


5 / 5

Features & Functionality


5 / 5

Value for Money


5 / 5

Product Features

  • close Anti Virus
  • check Application Security
  • close Behavioral Analytics
  • check Encryption
  • check Endpoint Management
  • close Incident Management
  • close Intrusion Detection System
  • close Threat Intelligence
  • close Two-Factor Authentication
  • close Vulnerability Management
  • close Anti Virus
  • check Application Security
  • close Behavioral Analytics
  • close Encryption
  • close Endpoint Management
  • close Incident Management
  • close Intrusion Detection System
  • close Threat Intelligence
  • close Two-Factor Authentication
  • check Vulnerability Management

Screenshots

Capterra screenshot placeholder
View 5 screenshots 155246 thumb

Platform

Web/Installed

Mobile

Web/Installed

Mobile

Support

  • 24/7 (Live Rep)
  • Business Hours
  • Online
  • 24/7 (Live Rep)
  • Business Hours
  • Online

Training

  • check In Person
  • check Live Online
  • close Webinars
  • check Documentation
  • close In Person
  • check Live Online
  • close Webinars
  • close Documentation

share Share Your Comparison of Intruder vs Cloud-Based Tokenization

Cloud-Based Tokenization vs Intruder

Share

share Share Your Comparison of Intruder vs Cloud-Based Tokenization