Try our new research platform with insights from 80,000+ expert users

Cequence Security vs Snyk comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cequence Security
Ranking in Application Security Tools
25th
Average Rating
10.0
Reviews Sentiment
6.3
Number of Reviews
1
Ranking in other categories
Bot Management (5th), API Security (6th)
Snyk
Ranking in Application Security Tools
4th
Average Rating
8.2
Reviews Sentiment
7.4
Number of Reviews
44
Ranking in other categories
Container Security (7th), Software Composition Analysis (SCA) (3rd), Software Development Analytics (2nd), DevSecOps (1st)
 

Mindshare comparison

As of February 2025, in the Application Security Tools category, the mindshare of Cequence Security is 0.1%, up from 0.1% compared to the previous year. The mindshare of Snyk is 8.0%, down from 8.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Application Security Tools
 

Featured Reviews

reviewer2395431 - PeerSpot reviewer
Detect and mitigate attacks with API protection
Compliance with standards like those in Europe often requires ensuring that APIs adhere to OAuth and other security protocols. Many organizations need to verify that their APIs meet these compliance requirements. We can include information about where an API was first recorded and create a detailed chart. Some competitors already offer this feature. It is simple to integrate. Overall, I rate the solution a ten out of ten.
meetharoon - PeerSpot reviewer
Affordable tool boosts code scanning efficiency but faces integration hurdles
The most important feature of Snyk is its cost-effectiveness compared to other solutions such as Check Point. It is easy to consolidate Snyk across multiple entities within a large organization. Additionally, our integration of Snyk into GitHub allows us to automatically scan codebases and identify issues, which has improved efficiency.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It uses machine learning algorithms to detect attacks and manage API inventory."
"Snyk has given us really good results because it is fully automated. We don't have to scan projects every time to find vulnerabilities, as it already stores the dependencies that we are using. It monitors 24/7 to find out if there are any issues that have been reported out on the Internet."
"The most valuable feature of Snyk is the SBOM."
"The product's most valuable features are an open-source platform, remote functionality, and good pricing."
"A main feature of Snyk is that when you go with SCA, you do get properly done security composition, also from the licensing and open-source parameters perspective. A lot of companies often use open-source libraries or frameworks in their code, which is a big security concern. Snyk deals with all the things and provides you with a proper report about whether any open-source code or framework that you are using is vulnerable. In that way, Snyk is very good as compared to other tools."
"The solution's vulnerability database, in terms of comprehensiveness and accuracy, is very high-level. As far as I know, it's the best among their competitors."
"Snyk categorizes the level of vulnerability into high, medium, and low, which helps organizations prioritize which issues to tackle first."
"It is a stable solution. Stability-wise, I rate the solution a ten out of ten."
"The dependency checks of the libraries are very valuable, but the licensing part is also very important because, with open source components, licensing can be all over the place. Our project is not an open source project, but we do use quite a lot of open source components and we want to make sure that we don't have surprises in there."
 

Cons

"It is expensive."
"The way Snyk notifies if we have an issue, there are a few options: High vulnerability or medium vulnerability. The problem with that is high vulnerabilities are too broad, because there are too many. If you enable notifications, you get a lot of notifications, When you get many notifications, they become irrelevant because they're not specific. I would prefer to have control over the notifications and somehow decide if I want to get only exploitable vulnerabilities or get a specific score for a vulnerability. Right now, we receive too many high vulnerabilities. If we enable notifications, then we just get a lot of spam message. Therefore, we would like some type of filtering system to be built-in for the system to be more precise."
"The tool's initial use is complex."
"Compatibility with other products would be great."
"Generating reports and visibility through reports are definitely things they can do better."
"It lists projects. So, if you have a number of microservices in an enterprise, then you could have pages of findings. Developers will then spend zero time going through the pages of reports to figure out, "Is there something I need to fix?" While it may make sense to list all the projects and issues in these very long lists for completeness, Snyk could do a better job of bubbling up and grouping items, e.g., a higher level dashboard that draws attention to things that are new, the highest priority things, or things trending in the wrong direction. That would make it a lot easier. They don't quite have that yet in container security."
"The solution's reporting and storage could be improved."
"We tried to integrate it into our software development environment but it went really badly. It took a lot of time and prevented the developers from using the IDE. Eventually, we didn't use it in the development area... I would like to see better integrations to help the developers get along better with the tool. And the plugin for the IDE is not so good. This is something we would like to have..."
"It can be improved from the reporting perspective and scanning perspective. They can also improve it on the UI front."
 

Pricing and Cost Advice

Information not available
"The price is good. Snyk had a good price compared to the competition, who had higher pricing than them. Also, their licensing and billing are clear."
"Compared to Veracode, Snyk is definitely a cheaper tool."
"Cost-wise, it's similar to Veracode, but I don't know the exact cost."
"Presently, my company uses an open-source version of the solution. The solution's pricing can be considered quite reasonable owing to the features they offer."
"The pricing is reasonable."
"With Snyk, you get what you pay for. It is not a cheap solution, but you get a comprehensiveness and level of coverage that is very good. The dollars in the security budget only go so far. If I can maximize my value and be able to have some funds left over for other initiatives, I want to do that. That is what drives me to continue to say, "What's out there in the market? Snyk's expensive, but it's good. Is there something as good, but more affordable?" Ultimately, I find we could go cheaper, but we would lose the completeness of vision or scope. I am not willing to do that because Snyk does provide a pretty important benefit for us."
"The product's price is okay."
"Snyk is a premium-priced product, so it's kind of expensive. The big con that I find frustrating is when a company charges extra for single sign-on (SSO) into their SaaS app. Snyk is one of the few that I'm willing to pay that add-on charge, but generally I disqualify products that charge an extra fee to do integrated authentication to our identity provider, like Okta or some other SSO. That is a big negative. We had to pay extra for that. That little annoyance aside, it is expensive. You get a lot out of it, but you're paying for that premium."
report
Use our free recommendation engine to learn which Application Security Tools solutions are best for your needs.
832,138 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Computer Software Company
16%
Manufacturing Company
8%
Educational Organization
6%
Financial Services Firm
16%
Computer Software Company
15%
Manufacturing Company
9%
Insurance Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

Cequence Security vs Jscrambler: What are the advantages and disadvantages of each?
From a Cequence perspective: There are several reasons to consider Cequence. First, we're an API security solution. We protect APIs that act as the glue that makes your applications work. Since API...
How does Cequence Security establish a baseline of normal application behavior and detect anomalies?
Cequence Security employs advanced machine learning and AI techniques to analyze the behavior of our applications in real-time. By continuously monitoring and processing data from user interactions...
What is Cequence Security's API Spartan and how can it help defend our company's infrastructure from bot attacks?
Cequence Security's behavior-based bot defense relies on the industry's largest threat database of bot behaviors, enabling users to track and block automated attacks with unparalleled efficacy rate...
How does Snyk compare with SonarQube?
Snyk does a great job identifying and reducing vulnerabilities. This solution is fully automated and monitors 24/7 to find any issues reported on the internet. It will store dependencies that you a...
What do you like most about Snyk?
The most effective feature in securing project dependencies stems from its ability to highlight security vulnerabilities.
What needs improvement with Snyk?
Snyk has several limitations, including issues with Gradle, NPM, and Xcode, and trouble with AutoPR. It lacks the ability to select branches on its Web UI, forcing users to rely on CLI or CI/CD for...
 

Comparisons

 

Also Known As

Cequence ASP, Cequence Unified API Protection Platform
No data available
 

Overview

 

Sample Customers

American Express, Lbrands, Ulta Beauty
StartApp, Segment, Skyscanner, DigitalOcean, Comic Relief
Find out what your peers are saying about Sonar, Veracode, Checkmarx and others in Application Security Tools. Updated: January 2025.
832,138 professionals have used our research since 2012.