On average 8,000 new vulnerabilities are discovered every year, more than 20 a day. Hackers now exploit these within days, not months. Intruder proactively scans you for the latest vulnerabilities, as soon as they emerge.
We aren't reinventing the wheel. Our vulnerability scanner uses the same underlying scanning engine as the big banks do, so you can enjoy the same level of security, but with none of the complexity.
Intruder interprets the results from advanced vulnerability scanners to help reduce common mistakes that increase your external attack surface, such as when databases get exposed to the internet.
You're too busy to sift through meaningless 'informational' findings. Focus on what matters. Intruder only reports issues that have a genuine impact on your security posture.
Everything we do at Intruder is designed to save you time, we are here to worry about your security, so you don’t have to.
Connect to your cloud provider (Amazon Web Services, Google Cloud Platform, or Microsoft Azure) and automatically synchronise your external IPs and DNS hostnames. Get Slack and email notifications when IPs or hostnames are released to ensure you never scan any systems you no longer own.
Intruder integrates with with popular software development tools, such as Slack and Jira, to notify your team about security issues in real time and push discovered vulnerabilities to your issue tracking platform for remediation.
Keeping track of your exposed ports and services has never been simpler than with Intruder's 'Network View'. Our port scanner checks which ports are open on your perimeter so you can see how your systems look from an external perspective.
Receive email and Slack notifications when scans complete, and summary PDF reports emailed on a monthly basis, perfect for proving how seriously you take security to your own customers.
Intruder has over 10,000 security checks available for each vulnerability scan,
including common web application issues such as SQL Injection and Cross-Site Scripting.
Read more »
We check that no equipment or services have been configured in a way which reduces their security, such as default credentials, or weak encryption.
Where web applications are detected, we check that there are no application-layer vulnerabilities such as SQL Injection, or Cross-Site Scripting in the unauthenticated areas.
Where software versions can be identified or fingerprinted, we check that the software is not missing any security patches which could leave it exposed.
For anything more complicated, such as authenticated web application testing, we also offer bespoke penetration testing consultancy. Contact us to find out more.
We offer a range of plans, to suit everyone from startups to large corporates.
Any questions? Don't hesitate to drop us an email, we'd love to hear from you.
We're based in London in the United Kingdom, but we work for clients all over the globe. Contact us today to see how we can provide you with peace of mind.
Or follow us on:
© 2018 Intruder Systems Ltd
Intruder is a trading name of Intruder Systems Ltd, a company registered in the United Kingdom with registered company number 09529593.