Digital DefenseFortra 
                        
                        
                        
                        
                     | 
        
        ||||||
Related Products
  | 
            
            ||||||
                
            
            
            About
            Providing best-in-class cyber security doesn’t mean blindly chasing the latest trends. It does mean a commitment to core technology and meaningful innovation. See how our vulnerability and threat management solutions provide organizations like yours with the security foundation needed to protect vital assets. Eliminating network vulnerabilities doesn’t have to be complicated, even though that’s what some companies would have you believe. You can build a powerful, effective cybersecurity program that is affordable and easy to use. All you need is a strong security foundation. At Digital Defense, we know that effectively dealing with cyber threats is a fact of life for every business. After more than 20 years of developing patented technologies, we’ve built a reputation for pioneering threat and vulnerability management software that’s accessible, manageable, and solid at its core.
             
            
        
         | 
        
        
                
            
            
            About
            Intruder is an international cyber security company that helps organisations reduce their cyber exposure by providing an effortless vulnerability scanning solution. Intruder’s cloud-based vulnerability scanner discovers security weaknesses across your digital estate. Offering industry-leading security checks, continuous monitoring and an easy-to-use platform, Intruder keeps businesses of all sizes safe from hackers. Receive actionable results prioritised by context. Intruder interprets raw data received from leading scanning engines, so you can focus on the issues which truly matter, such as exposed databases. Intruder's high-quality reports help you sail through customer security questionnaires, and make compliance audits like SOC2, ISO27001, and Cyber Essentials a breeze.
             
            
        
         | 
        |||||
        
        Platforms Supported
            
                Windows
            
            
         
        
    
        
        
            
                Mac
            
            
         
        
    
        
        
            
                Linux
            
            
         
        
    
        
        
            
                Cloud
            
            
         
        
    
        
        
            
                On-Premises
            
            
         
        
    
        
        
            
                iPhone
            
            
         
        
    
        
        
            
                iPad
            
            
         
        
    
        
        
            
                Android
            
            
         
        
    
        
        
            
                Chromebook
            
            
         
        
    
         | 
        
        
        
        Platforms Supported
            
                Windows
            
            
         
        
    
        
        
            
                Mac
            
            
         
        
    
        
        
            
                Linux
            
            
         
        
    
        
        
            
                Cloud
            
            
         
        
    
        
        
            
                On-Premises
            
            
         
        
    
        
        
            
                iPhone
            
            
         
        
    
        
        
            
                iPad
            
            
         
        
    
        
        
            
                Android
            
            
         
        
    
        
        
            
                Chromebook
            
            
         
        
    
         | 
        |||||
                
            
        
        Audience
        Companies of all sizes looking for an advanced Vulnerability Management solution
         
        
    
         | 
        
        
                
            
        
        Audience
        Organizations looking for an advanced Vulnerability Management  solution
         
        
    
         | 
        |||||
                
            
        
        Support
            
                Phone Support
            
            
         
        
    
        
        
            
                24/7 Live Support
            
            
         
        
    
        
        
            
                Online
            
            
         
        
    
         | 
        
        
                
            
        
        Support
            
                Phone Support
            
            
         
        
    
        
        
            
                24/7 Live Support
            
            
         
        
    
        
        
            
                Online
            
            
         
        
    
         | 
        |||||
                
            
        
        API
            
                Offers API
            
            
         
        
    
         | 
        
        
                
            
        
        API
            
                Offers API
            
            
         
        
    
         | 
        |||||
                
            
        
        Screenshots and Videos | 
        
        
                
            
        
        Screenshots and Videos | 
        |||||
                
            
        
        Pricing
        No information available.
        
        
     
    
    
        
        
            
                Free Version
            
            
         
        
    
        
        
            
                Free Trial
            
            
         
        
    
         | 
        
        
                
            
        
        Pricing
        No information available.
        
        
     
    
    
        
        
            
                Free Version
            
            
         
        
    
        
        
            
                Free Trial
            
            
         
        
    
         | 
        |||||
                
            
        
    
        
Reviews/
        
    
    
         | 
        
        
                
            
        
    
        
Reviews/
         | 
        |||||
                
            
        
        Training
            
                Documentation
            
            
         
        
    
        
        
            
                Webinars
            
            
         
        
    
        
        
            
                Live Online
            
            
         
        
    
        
        
            
                In Person
            
            
         
        
    
         | 
        
        
                
            
        
        Training
            
                Documentation
            
            
         
        
    
        
        
            
                Webinars
            
            
         
        
    
        
        
            
                Live Online
            
            
         
        
    
        
        
            
                In Person
            
            
         
        
    
         | 
        |||||
                
            
        
        Company InformationFortra 
    
    Founded: 1982 
    
    United States 
    www.digitaldefense.com 
         | 
        
        
                
            
        
        Company InformationIntruder 
    
    Founded: 2015 
    
    United Kingdom 
    intruder.io 
         | 
        |||||
                
            
            
    
        
        
        
            Alternatives | 
        
        
                
            
            
    
        
        
        
            Alternatives | 
        |||||
| 
                
            
            
    
        
        
        
        
             | 
        ||||||
| 
                
            
            
    
        
        
        
        
             | 
        
        
                
            
            
    
        
        
        
        
             | 
        |||||
| 
                
            
            
    
        
        
        
        
             | 
        
        ||||||
                
            
        
    
        Categories | 
        
        
                
            
        
    
        Categories | 
        |||||
                
            
        
    
        
            
            
                
                Cloud Security Features
            
                Antivirus
            
            
         
        
    
        
        
            
                Application Security
            
            
         
        
    
        
        
            
                Behavioral Analytics
            
            
         
        
    
        
        
            
                Encryption
            
            
         
        
    
        
        
            
                Endpoint Management
            
            
         
        
    
        
        
            
                Incident Management
            
            
         
        
    
        
        
            
                Intrusion Detection System
            
            
         
        
    
        
        
            
                Threat Intelligence
            
            
         
        
    
        
        
            
                Two-Factor Authentication
            
            
         
        
    
        
        
            
                Vulnerability Management
            
            
         
        
    
                    Cybersecurity Features
            
                AI / Machine Learning
            
            
         
        
    
        
        
            
                Behavioral Analytics
            
            
         
        
    
        
        
            
                Endpoint Management
            
            
         
        
    
        
        
            
                Incident Management
            
            
         
        
    
        
        
            
                IOC Verification
            
            
         
        
    
        
        
            
                Tokenization
            
            
         
        
    
        
        
            
                Vulnerability Scanning
            
            
         
        
    
        
        
            
                Whitelisting / Blacklisting
            
            
         
        
    
                    Network Security Features
            
                Access Control
            
            
         
        
    
        
        
            
                Analytics / Reporting
            
            
         
        
    
        
        
            
                Compliance Reporting
            
            
         
        
    
        
        
            
                Firewalls
            
            
         
        
    
        
        
            
                Internet Usage Monitoring
            
            
         
        
    
        
        
            
                Intrusion Detection System
            
            
         
        
    
        
        
            
                Threat Response
            
            
         
        
    
        
        
            
                VPN
            
            
         
        
    
        
        
            
                Vulnerability Scanning
            
            
         
        
    
                    Vulnerability Management Features
            
                Asset Discovery
            
            
         
        
    
        
        
            
                Asset Tagging
            
            
         
        
    
        
        
            
                Network Scanning
            
            
         
        
    
        
        
            
                Patch Management
            
            
         
        
    
        
        
            
                Policy Management
            
            
         
        
    
        
        
            
                Prioritization
            
            
         
        
    
        
        
            
                Risk Management
            
            
         
        
    
        
        
            
                Vulnerability Assessment
            
            
         
        
    
        
        
            
                Web Scanning
            
            
         
        
    
                    Endpoint Detection and Response (EDR) Features
            
                Behavioral Analytics
            
            
         
        
    
        
        
            
                Blacklisting/Whitelisting
            
            
         
        
    
        
        
            
                Continuous Monitoring
            
            
         
        
    
        
        
            
                Malware/Anomaly Detection
            
            
         
        
    
        
        
            
                Prioritization
            
            
         
        
    
        
        
            
                Remediation Management
            
            
         
        
    
        
        
            
                Root Cause Analysis
            
            
         
        
    
                     | 
        
        
                
            
        
    
        
            
            
        
            
            
        
            
            
                
                Network Security Features
            
                Access Control
            
            
         
        
    
        
        
            
                Analytics / Reporting
            
            
         
        
    
        
        
            
                Compliance Reporting
            
            
         
        
    
        
        
            
                Firewalls
            
            
         
        
    
        
        
            
                Internet Usage Monitoring
            
            
         
        
    
        
        
            
                Intrusion Detection System
            
            
         
        
    
        
        
            
                Threat Response
            
            
         
        
    
        
        
            
                VPN
            
            
         
        
    
        
        
            
                Vulnerability Scanning
            
            
         
        
    
                    IT Security Features
            
                Anti Spam
            
            
         
        
    
        
        
            
                Anti Virus
            
            
         
        
    
        
        
            
                Email Attachment Protection
            
            
         
        
    
        
        
            
                Event Tracking
            
            
         
        
    
        
        
            
                Internet Usage Monitoring
            
            
         
        
    
        
        
            
                Intrusion Detection System
            
            
         
        
    
        
        
            
                IP Protection
            
            
         
        
    
        
        
            
                Spyware Removal
            
            
         
        
    
        
        
            
                Two-Factor Authentication
            
            
         
        
    
        
        
            
                Vulnerability Scanning
            
            
         
        
    
        
        
            
                Web Threat Management
            
            
         
        
    
        
        
            
                Web Traffic Reporting
            
            
         
        
    
                     | 
        |||||
                
            
        
    
        Integrations
            
                
    6clicks
            
            
         
        
    
        
        
            
                
    Amazon EC2
            
            
         
        
    
        
        
            
                
    Amazon Web Services (AWS)
            
            
         
        
    
        
        
            
                
    CardinalOps
            
            
         
        
    
        
        
            
                
    CodeConductor
            
            
         
        
    
        
        
            
                
    Frontline Vulnerability Manager
            
            
         
        
    
        
        
            
                
    Jira
            
            
         
        
    
        
        
            
                
    Jira Work Management
            
            
         
        
    
        
        
            
                
    Microsoft Azure
            
            
         
        
    
        
        
            
                
    Quickwork
            
            
         
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
                
             | 
        
        
                
            
        
    
        Integrations
            
                
    6clicks
            
            
         
        
    
        
        
            
                
    Amazon EC2
            
            
         
        
    
        
        
            
                
    Amazon Web Services (AWS)
            
            
         
        
    
        
        
            
                
    CardinalOps
            
            
         
        
    
        
        
            
                
    CodeConductor
            
            
         
        
    
        
        
            
                
    Frontline Vulnerability Manager
            
            
         
        
    
        
        
            
                
    Jira
            
            
         
        
    
        
        
            
                
    Jira Work Management
            
            
         
        
    
        
        
            
                
    Microsoft Azure
            
            
         
        
    
        
        
            
                
    Quickwork
            
            
         
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
                
             | 
        |||||
| 
                
            
        
    
     | 
        
        
                
            
        
    
     |