We performed a comparison between Red Hat Advanced Cluster Security for Kubernetes and Snyk based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Red Hat Advanced Cluster Security for Kubernetes is highly regarded for its exceptional resource-sharing and segmentation capabilities. Snyk earns praise for its developer-friendly approach and range of scanning features. Snyk also stands out for its software composition analysis and compatibility with containers. Red Hat Advanced Cluster Security reviewers stressed a need for better documentation. They would also like the solution to incorporate features like zero trust and access control. Users said Snyk should work on improving compatibility and enhancing their vulnerability database.
Service and Support: Red Hat has been praised for its efficient and effective technical support. Some Snyk customers said support could better organize and prioritize requests.
Ease of Deployment: Red Hat Advanced Cluster Security for Kubernetes requires users to create various customer resource files and deploy an image as a container, which is a time-consuming process that can take days or weeks to configure. Snyk's setup is simple and uncomplicated, with users reporting positive experiences and excellent support from the vendor team.
Pricing: Advanced Cluster Security for Kubernetes is moderately priced, and Red Hat offers affordable bundled pricing options. Snyk is considered expensive relative to other solutions. Users say it is better suited for larger companies or enterprises that can afford it.
ROI: Red Hat Advanced Cluster Security for Kubernetes provides extensive security features, while Snyk emphasizes cost-effective vulnerability identification.
Comparison Results: Red Hat Advanced Cluster Security for Kubernetes is preferred over Snyk. Users appreciate its comprehensive setup process, scalability, and ability to run multiple containers. It also offers a hybrid cloud approach and seamless integration with other solutions. Some users encountered difficulties integrating Snyk with existing tools.
"The benefit of working with the solution is the fact that it's very straightforward...It is a perfectly stable product since the details are very accurate."
"Scalability-wise, I rate the solution a nine out of ten."
"Segmentation is the most powerful feature."
"One of the most valuable features I found was the ability of this solution to map the network and show you the communication between your containers and your different nodes."
"The most valuable feature of the solution is its monitoring feature."
"The technical support is good."
"It is easy to install and manage."
"I like virtualization and all those tools that come with OpenShift. I also like Advanced Cluster Management and the built-in security."
More Red Hat Advanced Cluster Security for Kubernetes Pros →
"The advantage of Snyk is that Snyk automatically creates a pull request for all the findings that match or are classified according to the policy that we create. So, once we review the PR within Snyk and we approve the PR, Snyk auto-fixes the issue, which is quite interesting and which isn't there in any other product out there. So, Snyk is a step ahead in this particular area."
"Snyk helps me pinpoint security errors in my code."
"I think all the standard features are quite useful when it comes to software component scanning, but I also like the new features they're coming out with, such as container scanning, secrets scanning, and static analysis with SAST."
"Provides clear information and is easy to follow with good feedback regarding code practices."
"The solution has great features and is quite stable."
"The most valuable feature is that they add a lot of their own information to the vulnerabilities. They describe vulnerabilities and suggest their own mitigations or version upgrades. The information was the winning factor when we compared Snyk to others. This is what gave it more impact."
"The code scans on the source code itself were valuable."
"The most valuable features are their GitLab and JIRA integrations. The GitLab integration lets us pull projects in pretty easily, so that it's pretty minimal for developers to get it set up. Using the JIRA integration, it's also pretty easy to get the information that is generated, as a result of that GitLab integration, back to our teams in a non-intrusive way and in a workflow that we are already using."
"The tool's command line and configuration are hard for us to understand and make deployment complex. It should also include zero trust, access control features and database connectivity."
"The testing process could be improved."
"The deprecation of APIs is a concern since the deprecation of APIs will cause issues for us every time we upgrade."
"The solution lacks features when compared to some of the competitors such as Prisma Cloud by Palo Alto Networks and has room for improvement."
"The solution's price could be better."
"They're trying to convert it to the platform as a source. They are moving in the direction of Cloud Foundry so it can be easier for a developer to deploy it."
"Red Hat is somewhat expensive."
"The documentation about Red Hat Advanced Cluster Security available online is very limited... So it's very limited to the documentation."
More Red Hat Advanced Cluster Security for Kubernetes Cons →
"It lists projects. So, if you have a number of microservices in an enterprise, then you could have pages of findings. Developers will then spend zero time going through the pages of reports to figure out, "Is there something I need to fix?" While it may make sense to list all the projects and issues in these very long lists for completeness, Snyk could do a better job of bubbling up and grouping items, e.g., a higher level dashboard that draws attention to things that are new, the highest priority things, or things trending in the wrong direction. That would make it a lot easier. They don't quite have that yet in container security."
"We have to integrate with their database, which means we need to send our entire code to them to scan, and they send us the report. A company working in the financial domain usually won't like to share its code or any information outside its network with any third-party provider."
"All such tools should definitely improve the signatures in their database. Snyk is pretty new to the industry. They have a pretty good knowledge base, but Veracode is on top because Veracode has been in this business for a pretty long time. They do have a pretty large database of all the findings, and the way that the correlation engine works is superb. Snyk is also pretty good, but it is not as good as Veracode in terms of maintaining a large space of all the historical data of vulnerabilities."
"There are some new features that we would like to see added, e.g., more visibility into library usage for the code. Something along the lines where it's doing the identification of where vulnerabilities are used, etc. This would cause them to stand out in the market as a much different platform."
"We've also had technical issues with blocking newly introduced vulnerabilities in PRs and that was creating a lot of extra work for developers in trying to close and reopen the PR to get rid of some areas. We ended up having to disable that feature altogether because it wasn't really working for us and it was actually slowing down developer velocity."
"We have seen cases where tools didn't find or recognize certain dependencies. These are known issues, to some extent, due to the complexity in the language or stack that you using. There are some certain circumstances where the tool isn't actually finding what it's supposed to be finding, then it could be misleading."
"Compatibility with other products would be great."
"The tool's initial use is complex."
More Red Hat Advanced Cluster Security for Kubernetes Pricing and Cost Advice →
Red Hat Advanced Cluster Security for Kubernetes is ranked 16th in Container Security with 10 reviews while Snyk is ranked 5th in Container Security with 41 reviews. Red Hat Advanced Cluster Security for Kubernetes is rated 8.4, while Snyk is rated 8.2. The top reviewer of Red Hat Advanced Cluster Security for Kubernetes writes "Provides network mapping feature for visualizing container communication but complex setup ". On the other hand, the top reviewer of Snyk writes "Performs software composition analysis (SCA) similar to other expensive tools". Red Hat Advanced Cluster Security for Kubernetes is most compared with Prisma Cloud by Palo Alto Networks, Aqua Cloud Security Platform, SUSE NeuVector, CrowdStrike Falcon Cloud Security and Tenable.io Container Security, whereas Snyk is most compared with SonarQube, Black Duck, GitHub Advanced Security, Fortify Static Code Analyzer and Veracode. See our Red Hat Advanced Cluster Security for Kubernetes vs. Snyk report.
See our list of best Container Security vendors.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.