No more typing reviews! Try our Samantha, our new voice AI agent.

Intruder vs Tenable Cloud Security comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Intruder
Average Rating
0.0
Number of Reviews
0
Ranking in other categories
Vulnerability Management (85th)
Tenable Cloud Security
Average Rating
8.4
Reviews Sentiment
6.5
Number of Reviews
12
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (15th), Container Security (22nd), Cloud Workload Protection Platforms (CWPP) (13th), Cloud Security Posture Management (CSPM) (14th), Cloud-Native Application Protection Platforms (CNAPP) (12th), Cloud Infrastructure Entitlement Management (CIEM) (3rd)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. Intruder is designed for Vulnerability Management and holds a mindshare of 0.3%, up 0.1% compared to last year.
Tenable Cloud Security, on the other hand, focuses on Cloud-Native Application Protection Platforms (CNAPP), holds 3.0% mindshare, up 2.4% since last year.
Vulnerability Management Mindshare Distribution
ProductMindshare (%)
Intruder0.3%
Wiz5.5%
Qualys VMDR4.4%
Other89.8%
Vulnerability Management
Cloud-Native Application Protection Platforms (CNAPP) Mindshare Distribution
ProductMindshare (%)
Tenable Cloud Security3.0%
Wiz15.4%
Prisma Cloud by Palo Alto Networks11.4%
Other70.2%
Cloud-Native Application Protection Platforms (CNAPP)
 

Featured Reviews

Use Intruder?
Leave a review
CD
Information Security Architect at WSP
Has significantly improved proactive monitoring through automated asset discovery and seamless integration with cloud environments
Making the system smarter would be beneficial. Adding modules for integration with AWS and Azure would be helpful. Adding capabilities for the scanner to automatically pick up changes and add assets automatically would be valuable. When discussing a big company, it is mandatory to have tools that will assist us rather than waiting for manual input to add hosts. Adding assets manually is prone to mistakes. Humans might forget to add an asset or make errors when adding multiple assets. Taking the human element out of the context and making it more streamlined is the future for security. The human should be involved where expertise is needed, such as analysis and decision-making. Currently, with resource constraints, we need tools to collect and aggregate data, eliminate false positives as much as possible, and present relevant information to employees for action.
report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
886,719 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Construction Company
43%
Insurance Company
17%
Comms Service Provider
8%
Healthcare Company
8%
Government
11%
Financial Services Firm
10%
Computer Software Company
9%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise2
Large Enterprise5
 

Questions from the Community

Ask a question
Earn 20 points
What do you like most about Tenable Cloud Security?
The solution’s vulnerability management feature has helped us identify and mitigate risks well.
What needs improvement with Tenable Cloud Security?
Making the system smarter would be beneficial. Adding modules for integration with AWS and Azure would be helpful. Adding capabilities for the scanner to automatically pick up changes and add asset...
What is your primary use case for Tenable Cloud Security?
We had other solutions that we used. One solution was that we did not have something exactly similar to what Element is doing. For example, we were using Bitsight, Evelin, and also Tenable Cloud Se...
 

Also Known As

No data available
Ermetic, Ermetic Identity Governance for AWS
 

Overview

 

Sample Customers

Information Not Available
Tyler Technologies, Bilfinger, BarkBox, MongoDB, airSlate, Adama, Latch, Cloudinary, Riskified, AppsFlyer, IntelyCare, Aidoc, 42Dot, and more.
Find out what your peers are saying about Wiz, Tenable, Qualys and others in Vulnerability Management. Updated: April 2026.
886,719 professionals have used our research since 2012.