Skip to main content

Which service is right for me?

Not sure if you need an automated tool, managed service or manual assessment? Then this article should help.

Updated over 3 weeks ago

Essential plan

Those most suited to our Essential plan would be early-stage start-ups or SMEs with a limited internet footprint and those that rely mostly on open-source software and devices.


Scanning engine

This plan is powered by OpenVAS - the world's most popular open-source scanning engine used globally by both the public and private sectors.

Number of checks
>18,000 external checks

Type of checks

  • Common infrastructure weaknesses

  • Unintentionally exposed systems

  • Information leakage

  • Misconfigurations & common mistakes

  • Remote vulnerable software and missing patches

Features

  • Unlimited users

  • One editable scheduled scan per month

  • An unlimited number of ad-hoc scans

  • Smart Recon (which tells you exactly how many of your systems are active and require a license to scan them – after all, there’s no point in scanning targets that aren’t exposed to the internet).


Cloud plan

This plan is designed for organisations with AWS, Azure, or Google Cloud infrastructure looking for seamless cloud asset discovery and monitoring.


Scanning engine
This plan is powered by OpenVAS and Nuclei, combining the world's leading open-source vulnerability scanner with Nuclei's extensive check library.

Number of checks

>89,000 external checks

Type of checks

  • Common infrastructure weaknesses

  • Unintentionally exposed systems

  • Information leakage

  • Misconfigurations & common mistakes

  • Remote vulnerable software and missing patches

Features


Pro plan

This plan is suitable for those who host their own servers; run enterprise solutions (Exchange, VPN endpoints, etc), or need to cover internal systems that aren’t exposed to the internet.


Scanning engine
This plan is powered by Tenable Nessus – a commercial-grade scanning engine, used by large organisations and international Government bodies.

Number of checks

>141,000 external checks

>14,000 internal checks

Type of checks

  • Common infrastructure weaknesses

  • Unintentionally exposed systems

  • Information leakage

  • Misconfigurations & common mistakes

  • Remote vulnerable software and missing patches

  • Local misconfigurations & common mistakes

  • Vulnerable software packages & missing patches

Features


Enterprise plan

This plan is geared towards young companies scaling quickly, with a large attack surface or cloud infrastructure, where there is a need for continuous monitoring and a desire for supplementary support.

Scanning engine

This plan is powered by Tenable Nessus – a commercial-grade scanning engine, used by large organisations and international Government bodies –  and Nuclei, an open-source vulnerability scanning engine popular with bug bounty hunters, penetration testers and researchers looking to produce repeatable checks for serious weaknesses.

Number of checks

>141,000 external Tenable checks

>28,000 external Nuclei checks (~21,500 are custom checks written by Intruder)

>14,000 internal Tenable checks

Type of checks

  • Common infrastructure weaknesses

  • Unintentionally exposed systems

  • Information leakage

  • Misconfigurations & common mistakes (including the identification of admin panels and default logins)

  • Remote vulnerable software and missing patches

  • Out-of-band vulnerabilities

  • Local misconfigurations & common mistakes

  • Vulnerable software packages & missing patches

Features

Bolt-ons (purchased separately)


Vanguard plan

This plan is a hybrid vulnerability management solution with our continuous penetration testing capability, most suited to those that would benefit from a team of security professionals dedicated to proactively identifying weaknesses in their assets.

Scanning engine / manual penetration testers

This plan is powered by Tenable Nessus – a commercial-grade scanning engine, used by large organisations and international Government bodies and Nuclei, an open-source vulnerability scanning engine popular with bug bounty hunters, penetration testers and researchers looking to produce repeatable checks for serious weaknesses.

Number of checks

>141,000 external Tenable checks

>28,000 external Nuclei checks (~21,500 are custom checks written by Intruder)

>14,000 internal Tenable checks

Type of checks

  • Common infrastructure weaknesses

  • Unintentionally exposed systems

  • Information leakage

  • Misconfigurations & common mistakes (including the identification of admin panels and default logins)

  • Remote vulnerable software and missing patches

  • Out-of-band vulnerabilities

  • Local misconfigurations & common mistakes

  • Vulnerable software packages & missing patches

Complementary manual efforts

  • The chaining of vulnerabilities (where appropriate)

  • Investigation of false positives and their removal from scan results

  • Impact review: if the scanner flags something that looks interesting, the team will manually investigate further to see if it can be exploited

  • Contextualisation of issues as they relate to your business

  • Vanguard advisories (when applicable): emails that inform you of any additional weaknesses that the team have uncovered during their investigations

Features

Bolt-on (purchased separately):


Web-application scanning

(with an Application License on any plan)

This feature expands the scanning capabilities and would be especially valuable to:

  • Anyone with a complex/custom web-app and an API schema who wants to ensure all of their endpoints are found and scanned for vulnerabilities.

  • Anyone managing a web-app with a login page – the functionality available to authenticated users is often much more sensitive and would pose a greater risk if exploited by a malicious authenticated user.

  • Developers/managers seeking reassurance that any updates they’re releasing are free of vulnerabilities.

  • Anyone needing to satisfy a client or compliance requirement for authenticated web-app scanning.

Scanning engine

Web application scanning is powered by OWASP ZAP.

Number of checks

~100 zap web-application checks
+ relevant external checks

Type of checks

  • OS command injection

  • Cross-site scripting (XSS); persistent/stored, reflected and DOM-based XSS

  • SQL injection against multiple types of databases

  • NoSQL injection, specifically against MongoDB

  • LDAP injection

  • XPath injection

  • Server-side includes

  • Server-side code injection

  • Java serialisation weaknesses

  • Buffer and integer overflows

Features

  • Enhanced web-application checks

  • Login form detection

  • API detection

  • WAF interference detection

For more information, have a read of Web-app scanning with Intruder.


So what should I choose?

If you're still unsure as to what service you need, then perhaps it's worth booking a call with a member of the team?

Did this answer your question?