We performed a comparison between Mirantis Container Cloud and Snyk based on real PeerSpot user reviews.
Find out in this report how the two Container Security solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."We like the platform and its response time. We also like that its console is user-friendly as well as modern and sleek."
"It is fairly simple. Anybody can use it."
"Cloud Native Security offers a valuable tool called an offensive search engine."
"PingSafe offers three key features: vulnerability management notifications, cloud configuration assistance, and security scanning."
"The UI is very good."
"Cloud Native Security's best feature is its ability to identify hard-coded secrets during pull request reviews."
"PingSafe's integration is smooth. They are highly customer-oriented, and the integration went well for us."
"The multi-cloud support is valuable. They are expanding to different clouds. It is not restricted to only AWS. It allows us to have different clouds on one platform."
"Now it is easier to set up the development environment and also to test the applications on the pipelines."
"Docker is very helpful for taking the code from development and applying it to the end user."
"Very easy solution to use as it is intuitive."
"I like the automation in deployment. I can deploy whenever I want based on the environment, and I can easily roll back to a previous version for testing."
"The product is easy to use."
"The most valuable aspect is the excellent support. In addition, the billing system is really easy to understand."
"The product's most valuable feature is cloud simulation to predict application behavior on the cloud."
"It is a compact, complete solution that performs well."
"The code scans on the source code itself were valuable."
"It is easy for developers to use. The documentation is clear as well as the APIs are good and easily readable. It's a good solution overall."
"Snyk is a developer-friendly product."
"Snyk helps me pinpoint security errors in my code."
"The dependency checks of the libraries are very valuable, but the licensing part is also very important because, with open source components, licensing can be all over the place. Our project is not an open source project, but we do use quite a lot of open source components and we want to make sure that we don't have surprises in there."
"Snyk performs software composition analysis (SCA) similar to other expensive tools."
"Static code analysis is one of the best features of the solution."
"Snyk categorizes the level of vulnerability into high, medium, and low, which helps organizations prioritize which issues to tackle first."
"Currently, we would have to export our vulnerability report to an .xlsx file, and review it in an Excel spreadsheet, and then we sort of compile a list from there. It would be cool if there was a way to actually toggle multiple applications for review and then see those file paths on multiple users rather than only one user at a time or only one application at a time."
"We are getting reports only in a predefined form. I would like to have customized reports so that I can see how many issues are open or closed today or in two weeks."
"There is room for improvement in the current active licensing model for PingSafe."
"Some of the navigation and some aspects of the portal may be a little bit confusing."
"It would be really helpful if the solution improves its agent deployment process."
"The could improve their mean time to detect."
"PingSafe is an excellent CSPM tool, but the CWPP features need to improve, and there is a scope for more application security posture management features. There aren't many ASPM solutions on the market, and existing ones are costly. I would like to see PingSafe develop into a single pane of glass for ASPM, CSPM, and CWPP. Another feature I'd like to see is runtime protection."
"The integration with Oracle has room for improvement."
"The solution's stability could be improved."
"The orchestration and tracing should be improved."
"I find Docker easier to use, but I gave it to an inexperienced developer and it took him a lot of time to understand."
"With the Mirantis runtime being removed from Kubernetes, which is the industry-wide standard for orchestration of containers, I think it's going in a direction that is not super scalable."
"In my previous years, I have brainstormed about the development of Container software. I have recently shifted focus, but the knowledge gained from those were really helpful. In my experience, Containers have their own complexities and to implement them, open source information is crucial. A software with new features would be beneficial. I suggest to implement a flow-based approach for container sequences, similar to Google Cloud's machine learning. The current process of deploying containers involves too many steps, and a more streamlined method would be appreciated. I've even automated deployment using APIs. Overall, simplifying container management and deployment processes would be valuable."
"The solution would benefit in improvements made to the storage, cleaning up information from the disk, and reading logs."
"There are a couple of things. Firstly, the vaultStore database within Container isn't as efficient as a standalone Container vault. This needs improvement."
"I would also like to see more features inside Docker as well as more integration with different solutions."
"Could include other types of security scanning and statistical analysis"
"The tool should provide more flexibility and guidance to help us fix the top vulnerabilities before we go into production."
"They were a couple of issues which happened because Snyk lacked some documentation on the integration side. Snyk is lacking a lot of documentation, and I would like to see them improve this. This is where we struggle a bit. For example, if something breaks, we can't figure out how to fix that issue. It may be a very simple thing, but because we don't have the proper documentation around an issue, it takes us a bit longer."
"The documentation sometimes is not relevant. It does not cover the latest updates, scanning, and configurations. The documentation for some things is wrong and does not cover some configuration scannings for the multiple project settings."
"A feature we would like to see is the ability to archive and store historical data, without actually deleting it. It's a problem because it throws my numbers off. When I'm looking at the dashboard's current vulnerabilities, it's not accurate."
"I think Snyk should add more of a vulnerability protection feature in the tool since it is an area where it lacks."
"DAST has shortcomings, and Snyk needs to improve and overcome such shortcomings."
"Scalability has some issues because we have a lot of code and its use is mandatory. Therefore, it can be slow at times, especially because there are a lot of projects and reporting. Some UI improvements could help with this."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
Mirantis Container Cloud is ranked 14th in Container Security with 29 reviews while Snyk is ranked 5th in Container Security with 41 reviews. Mirantis Container Cloud is rated 8.8, while Snyk is rated 8.2. The top reviewer of Mirantis Container Cloud writes "An easy-to-manage solution that helps to manage web pages ". On the other hand, the top reviewer of Snyk writes "Performs software composition analysis (SCA) similar to other expensive tools". Mirantis Container Cloud is most compared with SUSE Rancher, whereas Snyk is most compared with SonarQube, Black Duck, GitHub Advanced Security, Fortify Static Code Analyzer and Veracode. See our Mirantis Container Cloud vs. Snyk report.
See our list of best Container Security vendors.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.