Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
                    Intruder, an international cyber security company, helps organisations reduce cyber exposure by providing an easy vulnerability scanning solution. The cloud-based vulnerability scanner from Intruder finds security holes in your digital estate. Intruder protects businesses of all sizes with industry-leading security checks and continuous monitoring.
                
            
        
            Description
                    Zenmap serves as the official graphical user interface for the Nmap Security Scanner. This free and open-source application is compatible with multiple platforms, including Linux, Windows, Mac OS X, and BSD, and is designed to simplify Nmap for novices while still offering comprehensive features for seasoned users. Users can save frequently used scans as profiles, facilitating easy execution of those scans in the future. Additionally, a command creator is available for the interactive construction of Nmap command lines. The application allows users to save scan outcomes for later viewing, and it also enables the comparison of saved results to highlight differences. Recent scan results are conveniently stored in a database that can be searched. Zenmap can typically be downloaded alongside Nmap from the official Nmap download page. While Zenmap is user-friendly, further information on its features and usage can be found in the Zenmap User's Guide or the Zenmap man page for quick reference. The combination of its intuitive interface and robust functionalities makes Zenmap a valuable tool for network security assessments.
                
            
        
            API Access
            
                Has API
            
            
        
        
    
                API Access
            
                Has API
            
            
        
        
    
                Integrations
            
                
    6clicks
            
            
        
        
    
        
        
            
                
    Amazon EC2
            
            
        
        
    
        
        
            
                
    Amazon Web Services (AWS)
            
            
        
        
    
        
        
            
                
    CardinalOps
            
            
        
        
    
        
        
            
                
    CodeConductor
            
            
        
        
    
        
        
            
                
    Jira
            
            
        
        
    
        
        
            
                
    Jira Work Management
            
            
        
        
    
        
        
            
                
    Microsoft Azure
            
            
        
        
    
        
        
            
                
    Quickwork
            
            
        
        
    
        
        
            
                
    Seemplicity
            
            
        
        
    
                
                    
    
        
        
        
    
        
        
        
    
                
            Integrations
            
                
    6clicks
            
            
        
        
    
        
        
            
                
    Amazon EC2
            
            
        
        
    
        
        
            
                
    Amazon Web Services (AWS)
            
            
        
        
    
        
        
            
                
    CardinalOps
            
            
        
        
    
        
        
            
                
    CodeConductor
            
            
        
        
    
        
        
            
                
    Jira
            
            
        
        
    
        
        
            
                
    Jira Work Management
            
            
        
        
    
        
        
            
                
    Microsoft Azure
            
            
        
        
    
        
        
            
                
    Quickwork
            
            
        
        
    
        
        
            
                
    Seemplicity
            
            
        
        
    
                
                    
    
        
        
        
    
        
        
        
    
                
            Pricing Details
        No price information available.
        
        
    
    
    
        
        
            
                Free Trial
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Pricing Details
        No price information available.
        
        
    
    
    
        
        
            
                Free Trial
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Deployment
            
                Web-Based
            
            
        
        
    
        
        
            
                On-Premises
            
            
        
        
    
        
        
            
                iPhone App
            
            
        
        
    
        
        
            
                iPad App
            
            
        
        
    
        
        
            
                Android App
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
                Deployment
            
                Web-Based
            
            
        
        
    
        
        
            
                On-Premises
            
            
        
        
    
        
        
            
                iPhone App
            
            
        
        
    
        
        
            
                iPad App
            
            
        
        
    
        
        
            
                Android App
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
                Customer Support
            
                Business Hours
            
            
        
        
    
        
        
            
                Live Rep (24/7)
            
            
        
        
    
        
        
            
                Online Support
            
            
        
        
    
                Customer Support
            
                Business Hours
            
            
        
        
    
        
        
            
                Live Rep (24/7)
            
            
        
        
    
        
        
            
                Online Support
            
            
        
        
    
                Types of Training
            
                Training Docs
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Live Training (Online)
            
            
        
        
    
        
        
            
                In Person
            
            
        
        
    
                Types of Training
            
                Training Docs
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Live Training (Online)
            
            
        
        
    
        
        
            
                In Person
            
            
        
        
    
                Vendor Details
Company Name
Intruder
Founded
2015
Country
United Kingdom
Website
intruder.io
Vendor Details
Company Name
Zenmap
Founded
1997
Country
United States
Website
nmap.org/zenmap/
Product Features
Cloud Security
                                        Antivirus
                                        
                                    
                                    
                                    
                                        Application Security
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Encryption
                                        
                                    
                                    
                                    
                                        Endpoint Management
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Threat Intelligence
                                        
                                    
                                    
                                    
                                        Two-Factor Authentication
                                        
                                    
                                    
                                    
                                        Vulnerability Management
                                        
                                    
                            
                        Computer Security
                                        Anti Spam
                                        
                                    
                                    
                                    
                                        Antivirus
                                        
                                    
                                    
                                    
                                        Audit Trail
                                        
                                    
                                    
                                    
                                        Compliance Management
                                        
                                    
                                    
                                    
                                        Database Security Audit
                                        
                                    
                                    
                                    
                                        File Access Control
                                        
                                    
                                    
                                    
                                        Financial Data Protection
                                        
                                    
                                    
                                    
                                        Maintenance Scheduling
                                        
                                    
                                    
                                    
                                        Real Time Monitoring
                                        
                                    
                                    
                                    
                                        Security Event Log
                                        
                                    
                                    
                                    
                                        Virus Definition Update
                                        
                                    
                                    
                                    
                                        Vulnerability Protection
                                        
                                    
                            
                        Cybersecurity
                                        AI / Machine Learning
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Endpoint Management
                                        
                                    
                                    
                                    
                                        IOC Verification
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        Tokenization
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                                    
                                    
                                        Whitelisting / Blacklisting
                                        
                                    
                            
                        IT Security
                                        Anti Spam
                                        
                                    
                                    
                                    
                                        Anti Virus
                                        
                                    
                                    
                                    
                                        Email Attachment Protection
                                        
                                    
                                    
                                    
                                        Event Tracking
                                        
                                    
                                    
                                    
                                        IP Protection
                                        
                                    
                                    
                                    
                                        Internet Usage Monitoring
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Spyware Removal
                                        
                                    
                                    
                                    
                                        Two-Factor Authentication
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                                    
                                    
                                        Web Threat Management
                                        
                                    
                                    
                                    
                                        Web Traffic Reporting
                                        
                                    
                            
                        Network Security
                                        Access Control
                                        
                                    
                                    
                                    
                                        Analytics / Reporting
                                        
                                    
                                    
                                    
                                        Compliance Reporting
                                        
                                    
                                    
                                    
                                        Firewalls
                                        
                                    
                                    
                                    
                                        Internet Usage Monitoring
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Threat Response
                                        
                                    
                                    
                                    
                                        VPN
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                            
                        Vulnerability Management
                                        Asset Discovery
                                        
                                    
                                    
                                    
                                        Asset Tagging
                                        
                                    
                                    
                                    
                                        Network Scanning
                                        
                                    
                                    
                                    
                                        Patch Management
                                        
                                    
                                    
                                    
                                        Policy Management
                                        
                                    
                                    
                                    
                                        Prioritization
                                        
                                    
                                    
                                    
                                        Risk Management
                                        
                                    
                                    
                                    
                                        Vulnerability Assessment
                                        
                                    
                                    
                                    
                                        Web Scanning
                                        
                                    
                            
                        Vulnerability Scanners
                                        Asset Discovery
                                        
                                    
                                    
                                    
                                        Black Box Scanning
                                        
                                    
                                    
                                    
                                        Compliance Monitoring
                                        
                                    
                                    
                                    
                                        Continuous Monitoring
                                        
                                    
                                    
                                    
                                        Defect Tracking
                                        
                                    
                                    
                                    
                                        Interactive Scanning
                                        
                                    
                                    
                                    
                                        Logging and Reporting
                                        
                                    
                                    
                                    
                                        Network Mapping
                                        
                                    
                                    
                                    
                                        Perimeter Scanning
                                        
                                    
                                    
                                    
                                        Risk Analysis
                                        
                                    
                                    
                                    
                                        Threat Intelligence
                                        
                                    
                                    
                                    
                                        Web Inspection
                                        
                                    
                            
                        Product Features
Vulnerability Scanners
                                        Asset Discovery
                                        
                                    
                                    
                                    
                                        Black Box Scanning
                                        
                                    
                                    
                                    
                                        Compliance Monitoring
                                        
                                    
                                    
                                    
                                        Continuous Monitoring
                                        
                                    
                                    
                                    
                                        Defect Tracking
                                        
                                    
                                    
                                    
                                        Interactive Scanning
                                        
                                    
                                    
                                    
                                        Logging and Reporting
                                        
                                    
                                    
                                    
                                        Network Mapping
                                        
                                    
                                    
                                    
                                        Perimeter Scanning
                                        
                                    
                                    
                                    
                                        Risk Analysis
                                        
                                    
                                    
                                    
                                        Threat Intelligence
                                        
                                    
                                    
                                    
                                        Web Inspection
                                        
                                    
                            
                         
        