# Intruder Software Pricing, Alternatives & More 2026 | Capterra

> With the help of Capterra, learn about Intruder Software - reviews, pricing plans, popular comparisons to other Vulnerability Scanner products and more.

Source: https://www.capterra.com/p/161379/Intruder/alternatives

---

# 

 Intruder Software Review 2026: Features, Reviews, Integrations, Pros & Cons

Last updated on March 13, 2026

Provider data verified by our Software Research team, and reviews moderated by our Reviews Verification team.

[Description](#description)[Use cases](#use-cases)[Alternatives](#alternatives)[Features](#features)[Pricing](#pricing)[Integrations](#integrations)[Support](#support)[Reviews](#reviews)

Intruder

## What is Intruder?

Intruder is a cloud-based vulnerability scanner that helps to find weaknesses in your online systems. It saves you time by proactively scanning for new threats as well as offering a unique threat prioritisation solution. Our vulnerability scanner uses the same underlying engine as the big banks do, so you can enjoy the same level of security, but with none of the complexity. Intruder also integrates with AWS, Google Cloud Platform and Microsoft Azure cloud providers.

## What is Intruder used for?

[Vulnerability Scanner](https://www.capterra.com/vulnerability-scanner-software/)[Vulnerability Management](https://www.capterra.com/vulnerability-management-software/)[Penetration Testing](https://www.capterra.com/penetration-testing-software/)

Top alternative

Featured

Overall rating

Based on 2 user reviews

Reviews sentiment

Positive

\-

Neutral

\-

Negative

\-

Starting price

$108

Per Feature, Per Month

Free trial  
available

Capterra Shortlist charts the highest-rated and most popular products...

Our "Best of" badge program showcases products with the highest ratings...

Our "Best of" badge program showcases products with the highest ratings...

Do you work for Intruder?[Manage this product listing](https://digitalmarkets.gartner.com/get-listed/claim-bx?url=https://intruder.io&name=Intruder)

## Compare with a popular alternative

Capterra selects software alternatives based on relevant features, verified user reviews and user interactions. Placement may be influenced by client status.

### Intruder

5.0 (2)

VS.

[4.6 (32)](https://www.capterra.com/p/185510/ManageEngine-Vulnerability-Manager-Plus/reviews/)

Starting Price

$108

Per Feature, Per Month

Starting Price

$695

Flat Rate, Per Year

Free Trial

Free Version

Pricing Options

Free Trial

Free Version

Ease Of Use

4.5 (2)

Ease Of Use

4.5 (42)

Value For Money

4.5 (2)

Value For Money

4.5 (36)

Customer Service

4.5 (2)

Customer Service

4.4 (36)

## Intruder alternatives

[4.7 (26)](https://www.capterra.com/p/171539/Netsparker-Web-Application-Security-Scanner/reviews/)

Starting price

Contact vendor for pricing

Highest Rated

[5.0 (16)](https://www.capterra.com/p/10008516/GlitchSecure/reviews/)

Starting price

$275.00

Per User, Per Month

[4.8 (22)](https://www.capterra.com/p/236943/Red-Sentry/#reviews)

Starting price

$4200.00

Per User, Per Month

[CyLock EVA](https://www.capterra.com/p/253040/CyLock-Anti-Hacker/)

[4.9 (42)](https://www.capterra.com/p/253040/CyLock-Anti-Hacker/reviews/)

Starting price

$29.00

Per User, Per Month

[Learn More](https://www.capterra.com/p/253040/CyLock-Anti-Hacker/)

## Features

Features with the highest number of reviews are displayed first. Those that have no reviews appear next, sorted alphabetically.

Network Scanning

5.0 (1)

0.00% of 1 reviewers that rated this feature as important or highly important

Scanning networks to identify security threats

Vulnerability Assessment

5.0 (1)

0.00% of 1 reviewers that rated this feature as important or highly important

The process of identifying, quantifying, and prioritizing the vulnerabilities in a system.

Vulnerability Scanning

5.0 (1)

0.00% of 1 reviewers that rated this feature as important or highly important

Discover patch statuses and vulnerabilities

Vulnerability/Threat Prioritization

5.0 (1)

0.00% of 1 reviewers that rated this feature as important or highly important

Classify levels of threat and organize actions based on priorities

Web-Application Security

5.0 (1)

0.00% of 1 reviewers that rated this feature as important or highly important

Identify and respond to security threats to web applications

Access Controls/Permissions

Define levels of authorization for access to specific files or systems

Intruder 23 features

Define levels of authorization for access to specific files or systems

Alerts or notifications of various types such as pop-up messages, sounds, banners, or badges

Application programming interface that allows for integration with other systems/databases

Identify and respond to security threats to developed applications

Creation, administration, and evaluation of assessments or tests

Manage and track all disruptions and incidents

Observe and track the demand, usage, progress or quality of a system, product, or user

Scanning networks to identify security threats

Install software updates and bug fixes remotely

View and track pertinent metrics to find patterns and gain insights from data

Initiate collection and analysis of known risks

Process of identifying, evaluating, mitigating, addressing and reporting on potential risks or uncertainties

Search and filter data across systems to locate required information by entering keywords or certain criteria

Systematic evaluation of the security of a company's overall security system and situation

Controlled, realistic exercises that mimic real cyber threats to test an organization/user's security measures and preparedness.

Set up connections to third-party platforms to improve business processes

Information to prevent, understand and identify cyber threats

The process of identifying, quantifying, and prioritizing the vulnerabilities in a system.

Detect (and block) vulnerabilities and threats in your applications based on vulnerability information

Safeguards to protect network vulnerabilities

Discover patch statuses and vulnerabilities

Classify levels of threat and organize actions based on priorities

Identify and respond to security threats to web applications

Features

5.0 (2)

5.0

Based on 2 reviews

## Pricing

Value for money

4.5 (2)

Free Trial

Basic

$108.00

Per Feature,Per Month

Value for money

4.5 (2)

4.5

Based on 2 reviews

## Integrations

[

Slack](https://www.capterra.com/p/135003/Slack/)[

Jira](https://www.capterra.com/p/19319/JIRA/)[

Microsoft Azure](https://www.capterra.com/p/16365/Azure/)[

Amazon EC2](https://www.capterra.com/p/219781/EC2/)

## Support, customer service and training options

Customer Service

4.5 (2)

Support

-   Email/Help Desk
-   FAQs/Forum
-   Knowledge Base
-   Phone Support
-   24/7 (Live rep)
-   Chat

Training

-   In Person
-   Live Online
-   Webinars
-   Documentation
-   Videos

Deployment

-   Web
-   Android
-   iPhone/iPad

Typical users

-   Freelancers
-   Small businesses
-   Mid size businesses
-   Enterprises

Customer Service

4.5 (2)

4.5

Based on 2 reviews

## User reviews

Overall rating

5.0

Based on 2 reviews

Filter by rating

5(2)

4(0)

3(0)

2(0)

1(0)

Mentioned topic

Sorted by most recent

BA

Brandi A.

owner

Cosmetics

### "Intruder"

5.0

Overall Rating

5.0

5.0

Ease of Use

4.0

4.0

Features

5.0

5.0

Customer Service

4.0

4.0

Likelihood to Recommend

10/10

July 29, 2023

Pros

I use Intruder for external threats and vulnerabilities.

Cons

I can't think of anything I don't like about this product.

Switched from

[OpenVAS](https://www.capterra.com/p/238823/OpenVAS/)

Review source

Non-incentivized review: any software user can leave a review for any product listed on our site. All submitted reviews are subject to our verification process prior to publication.

CW

Colleen W.

Founder

Consumer Electronics

### "Great product, team and service "

5.0

Overall Rating

5.0

5.0

Ease of Use

5.0

5.0

Features

5.0

5.0

Customer Service

5.0

5.0

Likelihood to Recommend

10/10

July 5, 2019

Brilliant and we would and have been recommending them to everyone.

Pros

We are a small team and we cannot spend time looking into security issues every day. Intruder's proactive scans mean that we get notified as soon as there is a problem, because Intruder is always watching over us. We also use Intruder for our annual pen tests and this has been invaluable to us. As a provider of technology for children, the cyber security of our tech could not be more important. Intruder helps us keep our products fully up to date with the latest security patches, and helps us avoid serious data breaches.

Cons

Would be nice to have the opportunity to schedule daily scans, but the proactive scans mean we are always covered against the latest threats.

Review source

Non-incentivized review: any software user can leave a review for any product listed on our site. All submitted reviews are subject to our verification process prior to publication.

Independent research methodology

Capterra's researchers use a mix of verified reviews, independent research and objective methodologies to bring you selection and ranking information you can trust. While we may earn a referral fee when you visit a provider through our links or speak to an advisor, this has no influence on our research or methodology.

[Learn more](https://www.capterra.com/resources/proprietary-data-research/)

How Capterra verifies reviews

Capterra carefully verified over 2.5 million+ reviews to bring you authentic software experiences from real users. Our human moderators verify that reviewers are real people and that reviews are authentic. They use leading tech to analyze text quality and to detect plagiarism and generative AI.

[Learn more](https://www.capterra.com/resources/how-we-verify-reviews/)

How Capterra ensures transparency

Capterra lists all providers across its website—not just those that pay us—so that users can make informed purchase decisions. Capterra is free for users. Software providers pay us for sponsored profiles to receive web traffic and sales opportunities. Sponsored profiles include a link-out icon that takes users to the provider's website.

[Learn more](https://www.capterra.com/resources/how-we-ensure-transparency/)