We didn't start Intruder to re-invent the wheel; there were already tons of vulnerability scanners out there with lots in common. In fact, when it comes down to the actual checks they perform, there isn't a huge difference between them, especially at the top end of the spectrum.

That said, we wanted to do things a little differently here, which is why we opted for two different scanners:

Our Essential Plan is powered by the world's most popular open-source scanning engine used globally by both the public and private sector. This is the perfect solution for small companies with a limited internet-footprint and heavy reliance on open-source software.

Pro and Verified Plans on the other hand are built upon a commercial-grade scanning engine, used by large organisations and international Government bodies. This solution caters to those that with a vast number of systems exposed to the internet; but it doesn’t stop at just the external perimeter, it covers internal systems and lots of enterprise software too.

For anyone unsure as to which plan would suit them best need, it might be worth heading over to the pricing page where you can view a comparison chart. Or, if you'd like a more comprehensive evaluation of the scanning engines specifically, it might help to have a read of our blog post, available at the button below:

See and search all checks

If you've signed up for a free trial or you're currently a customer and your first assessment has been completed, you can access and search the full list of checks we perform by clicking on any of the buttons in the checks section on your dashboard:

Did this answer your question?