We performed a comparison between Singularity Cloud Workload Security and Snyk based on real PeerSpot user reviews.
Find out in this report how the two Container Security solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The management console is highly intuitive to comprehend and operate."
"My favorite feature is Storyline."
"The visibility is the best part of the solution."
"The management console is the most valuable feature."
"We like the platform and its response time. We also like that its console is user-friendly as well as modern and sleek."
"The ease of use of the platform is very nice."
"We really appreciate the Slack integration. When we have an incident, we get an instant notification. We also use Joe Sandbox, which Singularity can integrate with, so we can verify if a threat is legitimate."
"It's helped free up staff time so that they can work on other projects."
"The most valuable features are their GitLab and JIRA integrations. The GitLab integration lets us pull projects in pretty easily, so that it's pretty minimal for developers to get it set up. Using the JIRA integration, it's also pretty easy to get the information that is generated, as a result of that GitLab integration, back to our teams in a non-intrusive way and in a workflow that we are already using."
"Snyk performs software composition analysis (SCA) similar to other expensive tools."
"Snyk is a developer-friendly product."
"It has an accurate database of vulnerabilities with a low amount of false positives."
"The most valuable feature of Snyk is the SBOM."
"Our customers find container scans most valuable. They are always talking about it."
"Our overall security has improved. We are running fewer severities and vulnerabilities in our packages. We fixed a lot of the vulnerabilities that we didn't know were there."
"The CLI feature is quite useful because it gives us a lot of flexibility in what we want to do. If you use the UI, all the information is there and you can see what Snyk is showing you, but there is nothing else that you can change. However, when you use the CLI, then you can use commands and can get the output or response back from Snyk. You can also take advantage of that output in a different way. For the same reason, we have been using the CLI for the hard gate in the pipeline: Obtain a particular CDSS score for vulnerability. Based on that information, we can then decide if we want to block or allow the build. We have more flexibility if we use the CLI."
"One of our use cases was setting up a firewall for our endpoints, specifically for our remote users... We were hoping to utilize SentinelOne's firewall capabilities, but there were limitations on how many URLs we could implement. Because of those limitations on the number of URLs, we weren't able to utilize that feature in the way we had hoped to."
"Bugs need to be disclosed quickly."
"Some of the navigation and some aspects of the portal may be a little bit confusing."
"The cost has the potential for improvement."
"Whenever I view the processes and the process aspect, it takes a long time to load."
"Sometimes the Storyline ID is a bit wacky."
"Their search feature could be better."
"It took us a while to configure the software to work well in this type of environment, as the support documents were not always clear."
"I think Snyk should add more of a vulnerability protection feature in the tool since it is an area where it lacks."
"There is always more work to do around managing the volume of information when you've got thousands of vulnerabilities. Trying to get those down to zero is virtually impossible, either through ignoring them all or through fixing them. That filtering or information management is always going to be something that can be improved."
"One area where Snyk could improve is in providing developers with the line where the error occurs."
"The feature for automatic fixing of security breaches could be improved."
"The tool needs improvement in license compliance. I would like to see the integration of better policy management in the product's future release. When it comes to the organization that I work for, there are a lot of business units since we are a group of companies. Each of these companies has its specific requirements and its own appetite for risk. This should be able to reflect in flexible policies. We need to be able to configure policies that can be adjusted later or overridden by the business unit that is using the product."
"Because Snyk has so many integrations and so many things it can do, it's hard to really understand all of them and to get that information to each team that needs it... If there were more self-service, perhaps tutorials or overviews for new teams or developers, so that they could click through and see things themselves, that would help."
"We've also had technical issues with blocking newly introduced vulnerabilities in PRs and that was creating a lot of extra work for developers in trying to close and reopen the PR to get rid of some areas. We ended up having to disable that feature altogether because it wasn't really working for us and it was actually slowing down developer velocity."
"The solution's integration with JFrog Artifactory could be improved."
More Singularity Cloud Workload Security Pricing and Cost Advice →
Singularity Cloud Workload Security is ranked 10th in Container Security with 15 reviews while Snyk is ranked 5th in Container Security with 41 reviews. Singularity Cloud Workload Security is rated 9.0, while Snyk is rated 8.2. The top reviewer of Singularity Cloud Workload Security writes "Provides excellent workload telemetry, hunting capabilities, and deep visibility ". On the other hand, the top reviewer of Snyk writes "Performs software composition analysis (SCA) similar to other expensive tools". Singularity Cloud Workload Security is most compared with Prisma Cloud by Palo Alto Networks, AWS GuardDuty, Qualys VMDR, Sysdig Secure and Akamai Guardicore Segmentation, whereas Snyk is most compared with SonarQube, Black Duck, GitHub Advanced Security, Fortify Static Code Analyzer and Veracode. See our Singularity Cloud Workload Security vs. Snyk report.
See our list of best Container Security vendors.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.