Intruder pricing
What middleBrick covers
- Transparent per-seat and per-scan cost variables
- Support for authenticated scanning and domain verification
- Compliance reporting aligned to PCI-DSS 4.0, SOC 2 Type II, OWASP API Top 10 (2023)
- Enterprise add-ons for custom integrations and SLAs
- Usage-based pricing for on-demand scans and historical data
- Quote-driven model without published public rates
Intruder pricing model overview
Intruder does not publish a transparent, itemized price list. The public site describes plan tiers but leaves core cost variables quoted only after direct contact with sales. Factors that typically drive a quote include seat count, number of targets, scan frequency, and whether the deployment requires authenticated scans or compliance reporting.
Per-seat and per-scan variables
Many scanner vendors price by the number of operator seats and the number of scans or targets. Intruder follows this pattern: seats usually map to named users who can initiate scans, while targets may be billed per scan or grouped under subscription caps. Additional charges often appear for on-demand scan triggers, historical report retention, and security dashboards that aggregate results across teams.
Authenticated scanning and compliance features
Higher tiers add authenticated scanning, which requires credentials and domain verification to test behind login walls. Features tied to compliance evidence—such as scheduled scans, detailed audit trails, and signed reports for frameworks like PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023)—are typically gated behind mid or upper plans. These capabilities increase operational cost because they require longer scan times, more storage for diffs, and tighter access controls.
Enterprise add-ons and support costs
Enterprises commonly need custom integrations, such as API clients, CI/CD gates, and webhook relays, which can shift pricing from subscription to usage-based models. Dedicated support, SLAs, and advanced features like custom rules or private IP exclusions usually require enterprise agreements. Quote generation depends on deployment scale, required uptime, and the level of professional services needed to operationalize the scanner.
How to obtain a reliable price
Because public pricing is not itemized, the most reliable path is to request a tailored quote that lists seats, target coverage, and feature bundles. Ask vendors to break out recurring subscription fees versus one-time setup, and clarify what happens to pricing when you add or remove targets. Validate that any quoted plan includes the specific controls you need for PCI-DSS 4.0, SOC 2 Type II, or OWASP API Top 10 (2023) evidence generation.