After securing any systems facing the internet with our External Vulnerability Scanner, your internal systems become the next most important priority. Intruder’s Internal Vulnerability Scans further protect your organisation against more advanced hacker attacks.

Why Is Internal Vulnerability Scanning Important?

While your external network is the easiest to access for hackers, and available for attack 24/7, your internal systems can also be reached with a little extra effort. For example by an email containing a malicious attachment, or link to a web page that exploits known unpatched software on an employee’s device. Similarly, unpatched software or the lack of hardening of internal systems can help an attacker move around internal systems once they’ve gained an initial foothold.

Having a well patched and hardened internal environment will help you avoid this next level of attack, and can be important for compliance with many security standards, or customer security questionnaires. It also helps further protect perimeter systems, by providing next-level information that can’t be gained from the outside.

Enterprise-grade Scanning Engine

When it comes to internal vulnerability scanning, cheap certainly does not mean cheerful. With new vulnerabilities being discovered every day, it’s important to use the highest quality scanner you can find, as saving money here may cost you more in the long run.

Intruder uses an industry leading scanning engine that’s used by banks and governments all over the world. With over 67,000 local checks available for historic vulnerabilities, and new ones being added on a regular basis. You can be confident that while it’s very simple to use, Intruder provides market leading internal security scans.

Automates Your Internal Penetration Testing

Modern attackers don’t wait to act and usually execute their attacks within weeks of new vulnerabilities being discovered. In fact, around 20 new vulnerabilities are discovered every day, many of which are in technologies which sit on your perimeter systems – exposed to the internet.

While some companies choose to have an annual internal penetration test, Intruder’s internal vulnerability scanner allows you to eliminate threats to your business, by discovering security holes in your most exposed systems automatically, as soon as new vulnerabilities are released.

What Does It Check For?

Internal scans check for similar types of issues as our external scans, but can do so from a trusted position on the device, gathering even more data to help secure your systems.

• Common mistakes & configuration weaknesses

Even the most secure software can often be configured in an insecure way. Simple mistakes such as leaving default passwords, not enabling encryption or other security settings.

Intruder has thousands of checks for these kinds of mistakes, making sure all your business sensitive systems are hardened as much as they need to be.

• Missing patches
Patch management is a fundamental part of keeping your digital estate secure, as missing patches can quickly be detected and exploited by attackers.

Intruder’s internal security scans can detect insecure versions of many thousands of software components and frameworks, from web servers to operating systems and network devices.

• Encryption weaknesses
It is common to find that services which are capable of secure encryption, have either not been configured, or mistakenly configured to be less secure.

Intruder has checks for all the latest known encryption weaknesses, some of which include: Heartbleed, SSL/TLS weaknesses, and VPN encryption weaknesses.

Integrations

As a SaaS product, Intruder’s internal vulnerability scanner works seamlessly with your technical environment. There’s no need for lengthy installations or complex configuration, and comes with a range of integrations to make vulnerability management a breeze:

• Slack: Keep an eye on your security exposure in real-time with Intruder’s Slack integration.
• Jira: Send security issues to Jira, for easy tracking of your security issues.
• REST API: Full automation of your vulnerability management process is possible with Intruder’s REST API, so you can integrate Intruder with your development and deployment cycles seamlessly.

What our customers say

"I have used multiple vulnerability scanning tools in the past. Most of them were single-purpose and had a lot of extraneous output that took a long time to configure to get what we needed. With Intruder, I got relevant, actionable results the very first time I scanned, and it's a one-stop shop. I don't have to set up a patchwork of different tools to get good coverage on vulnerability scanning." Read full review

Zach, Co-founder and CTO at Yembo.

Start your 30 day free trial

of Intruder's internal vulnerability scanner, to provide continuous protection for your perimeter systems today!

try for free
BACK TO TOP