Great scanner for networks of any size!
Use Cases and Deployment Scope
We use Intruder to scan for external vulnerabilities across the various fleets of servers.
Pros
- Auto scanning.
- New vulnerability detection.
- Alert levels.
Cons
- Reports could contain more detail.
Likelihood to Recommend
When the infrastructure landscape and risk profile is not well known and is legacy, Intruder can scan and automate reporting on open security risks, as well as coordinate responses.
