We are using Snyk to find the vulnerabilities inside dependencies. It is one of the best tool in the market for this.
Information Security Engineer at a financial services firm with 1,001-5,000 employees
Saves time and increases developer productivity, but we struggle a bit due to a lack of documentation
Pros and Cons
- "Snyk has given us really good results because it is fully automated. We don't have to scan projects every time to find vulnerabilities, as it already stores the dependencies that we are using. It monitors 24/7 to find out if there are any issues that have been reported out on the Internet."
- "They were a couple of issues which happened because Snyk lacked some documentation on the integration side. Snyk is lacking a lot of documentation, and I would like to see them improve this. This is where we struggle a bit. For example, if something breaks, we can't figure out how to fix that issue. It may be a very simple thing, but because we don't have the proper documentation around an issue, it takes us a bit longer."
What is our primary use case?
How has it helped my organization?
It is pretty easy and straightforward to use because integration won't take more than 15 minutes to be honest. After that, developers don't have to do anything. Snyk automatically monitors their projects. All they need to do is wait and see if any vulnerabilities have been reported, and if yes, how to fix those vulnerability.
So far, Snyk has given us really good results because it is fully automated. We don't have to scan projects every time to find vulnerabilities, as it already stores the dependencies that we are using. It monitors 24/7 to find out if there are any issues that have been reported out on the Internet.
Whenever Snyk reports to us about a vulnerability, it always reports to us the whole issue in detail:
- What is the issue.
- What is the fix.
- What version we should use.
E.g., if upgrading to a new version may break an application, developers can easily understand the references and details that we receive from Snyk regarding what could break if we upgrade the version.
The solution allows our developers to spend less time securing applications, increasing their productivity. As soon as there is a fix available, developers don't have to look into what was affected. They can easily upgrade their dependencies using Snyk's recommendation. After that, all they need is to test their application to determine if the new upgrade is breaking their application. Therefore, they are completely relaxed on the security side.
Snyk is playing a big role in our security tooling. There were a couple of breaches in the past, which used vulnerability dependencies. If they had been using Snyk and had visibility into what vulnerabilities they had in their dependencies, they could have easily patched it and saved themselves from their breaches.
So far, we have really good feedback from our developers. They enjoy using it. When they receive a notification that they have a vulnerability in their project, they find that they like using Snyk as they have a very easy way to fix an issue. They don't have to spend time on the issue and can also fix it. This is the first time I have seen in my career that developers like a security tool.
I'm the only person who is currently maintaining everything for Snyk. We don't need more resources to maintain Snyk or work full-time on it. The solution has Slack integration, which is a good feature. We have a public channel where we are reporting all our vulnerabilities. This provides visibility for our developers. They can see vulnerabilities in their projects and fix them on their own without the help of security.
What is most valuable?
Snyk integrations and notifications with Slack are the most valuable feature because they are really handy. By monitoring dependencies, if there is a vulnerability reported, Snyk will fire off a Slack message to us. With that Slack message, we can create a request just from the notifications which we receive on Slack. It's like having visibility in a general channel and also flexibility to fix that issue with a few clicks.
The solution’s vulnerability database is always accurate since the chances of getting a false positive is very rare. It only reports the vulnerabilities which have already been reported publicly.
The solution’s Container security feature allows developers to own security for the applications and the containers they run in in the cloud. Without using Snyk, developers might be not aware if they are creating a vulnerability in their Docker images. While using Snyk, they have at least a layer of protection where they can be notified by a Snyk if there is a vulnerability in the Docker images or communities.
What needs improvement?
If the Snyk had a SAST or DAST solution, then we could have easily gone with just one vendor rather than buying more tools from other vendors. It would save us time, not having to maintain relationships with other vendors. We would just need to manage with one vendor. From a profitability standpoint, we will always choose the vendor who gives us multiple services. Though, we went ahead with Snyk because it was a strong tool.
Snyk needs to support more languages. It's not supporting all our languages, e.g., Sift packages for our iOS applications. They don't support that but are working to build it for us. They are also missing some plugins for IDEs, which is the application that we are using for developers to code.
There are a couple of feature request that I have asked from Snyk. For example, I would like Snyk to create a Jira ticket from Slack notifications. We already have Snyk creating a pull request from Slack notifications, so I asked if we could create a Jira ticket as well so we can track the vulnerability.
Buyer's Guide
Snyk
September 2025

Learn what your peers think about Snyk. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
870,697 professionals have used our research since 2012.
For how long have I used the solution?
I started working with at my company eight months ago and Snyk was already in place. As for my own experience, I was using this solution before I joined the company, so I was familiar with the tool and how it works.
What do I think about the stability of the solution?
They were a couple of issues which happened because Snyk lacked some documentation on the integration side. Snyk is lacking a lot of documentation, and I would like to see them improve this. This is where we struggle a bit. For example, if something breaks, we can't figure out how to fix that issue. It may be a very simple thing, but because we don't have the proper documentation around an issue, it takes us a bit longer.
What do I think about the scalability of the solution?
So far, we have onboarded all our developers to Snyk, and it's still running fine. However, they could improve it. For example, if I create a bulk request for more than 15 or 20 vulnerabilities, then it takes a bit longer than it should in terms of time.
Including security, the total developers that we have on Snyk is almost 50 at this time. We are pushing more to the developers and would like to have 200 developers in the coming month or two.
How are customer service and support?
The people with whom I'm connected are really good. If I have issues, they will quickly jump on a call and I will start troubleshooting with them over the call. The people with whom I'm talking are very technical.
Which solution did I use previously and why did I switch?
Before using Snyk, we didn't have visibility into how many dependencies we were using or importing into our projects. Snyk gives us how many third-party libraries we are using and what version they are running on. Also, it let us know if there are any vulnerabilities in those libraries when we are writing our code. Because of the potential impact, we have to ensure that there aren't any vulnerabilities in these libraries (since we have no visibility) when we are importing.
How was the initial setup?
The initial setup was straightforward. Onboarding projects didn't take me too long. It was pretty straightforward and easy to integrate with event/packet cloud and import all our projects from there. Then, it was easy to generate the organizational ID and API key, then add it to the Snyk plug-in that we are using in our build pipeline.
Snyk was already onboard when I joined. Deployment of my 23 projects took me an hour.
What was our ROI?
The solution has reduced the amount of time it takes to find problems by three or four hours per day.
The solution has reduced the amount of time by at least two to three hours a day to fix problems because the documentation which we receive is very helpful. This also depends on a couple of factors, such as, how big a project or library is.
Developer productivity has increased a lot. Considering all the projects about security vulnerabilities, we are saving at least six to seven hours a day.
What other advice do I have?
It saves a lot of my time and the developers' time. Also, because everything is super simple and straightforward in one place, it is really convenient for the security team to keep an eye on vulnerabilities in their projects.
Having this type of tool for a security team is really helpful. In my previous role, we didn't have this type of tool for our team. We struggled a lot with how we could enhance our visibility or see our projects: what dependencies they were using and if we could monitor those dependencies for any vulnerabilities. Without the tool, we could be attacked by some random vulnerability which we were not even aware of. Thus, I strongly recommend having this type of tool for a security team.
This is integrated with our CI/CD.
For Containers, we are still not fully rolled out and working around it.
I would rate this solution as a seven (out of 10).
Which deployment model are you using for this solution?
Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.

Manager, Information Security Architecture at a consultancy with 5,001-10,000 employees
Reduced the amount of active vulnerabilities in our applications
Pros and Cons
- "It has improved our vulnerability rating and reduced our vulnerabilities through the tool during the time that we've had it. It's definitely made us more aware, as we have removed scoping for existing vulnerabilities and platforms since we rolled it out up until now."
- "There are some new features that we would like to see added, e.g., more visibility into library usage for the code. Something along the lines where it's doing the identification of where vulnerabilities are used, etc. This would cause them to stand out in the market as a much different platform."
What is our primary use case?
It is a source composition analysis tool that we use to perform vulnerability scanning for those vulnerabilities within open source libraries.
This is a SaaS solution.
How has it helped my organization?
It has improved our vulnerability rating and reduced our vulnerabilities through the tool during the time that we've had it. It's definitely made us more aware, as we have removed scoping for existing vulnerabilities and platforms since we rolled it out up until now.
We were aware of problems that were there, but we weren't looking for them until we had Snyk. It is definitely showing us things that we should have been concerned about, and we have found a lot of value in resolving those things since we've discovered them.
It's reduced the amount of active vulnerabilities in our applications, providing both a more stable and secure environment for us in the libraries that we develop. It has highlighted a number of things we weren't aware of in our applications and the reduction of those is definitely a benefit and value-add to our applications.
What is most valuable?
The general source composition analysis is the key to the piece. That is the feature to check our open source libraries for vulnerabilities and the primary feature that we use the tool for.
It is extremely easy to use and very simple to catch on for every team that we train on it. We generally have our development teams leverage the tool themselves. It's extremely easy to teach them how to use it and get them to onboard it.
From a speed perspective, we use Git repository. It was very easy to integrate into that platform.
The solution’s ability to help developers find and fix vulnerabilities quickly is very good and convenient. It provides the ability to easily work the platform into our existing repositories and leverage our repository. It also pulls notifications as a means for notifying developers of vulnerabilities within the projects that are developing.
The solution’s vulnerability database is very comprehensive and accurate.
What needs improvement?
There are some new features that we would like to see added, e.g., more visibility into library usage for the code. Something along the lines where it's doing the identification of where vulnerabilities are used, etc. This would cause them to stand out in the market as a much different platform.
For how long have I used the solution?
We have been using Snyk for about a year.
What do I think about the stability of the solution?
It is very stable.
We use existing staff to maintain and operationalize it.
What do I think about the scalability of the solution?
It is extremely easy to scale and hooks into all of our application repositories without any issues. We use the product extensively in the projects that we are currently running. We are using the product at close to 100 percent.
Developer-adoption of the solution has been good. It is one of the better tools in our application security library from an adoption perspective and needs of use. It has the most positive feedback out of all our solutions.
There are probably 50 users who are security/developers and development-focused security professionals.
How are customer service and technical support?
The only technical support that we have received has been through our account team, and it's been fantastic. I haven't actually had to open any tickets or anything using the tool. The only time we've ever needed assistance was to open up a ticket for single sign-on configuration. It was extremely quick. They had a very easy, fast response for how to deliver it.
Which solution did I use previously and why did I switch?
We previously used Black Duck. We switched to Snyk because of its better false positive ratings along with its ease of use, integration, and deployment.
How was the initial setup?
The initial setup was straightforward. It was just extremely easy to integrate into our repositories, get the code scanning working, and add our projects into the application.
The deployment was quick. We had our first application in it within minutes.
Implementation strategy: We hooked up our applications and integrated them into the tool. Then, we started to address vulnerabilities as we saw fit from a risk perspective.
What was our ROI?
We have seen ROI with Snyk. It has showed us a lot of things that we were not privy to before. This has opened our eyes to a lot of very important things, e.g., vulnerabilities.
The solution has reduced the amount of time it takes to fix problems. It has done a great job explaining what the problem is and how to resolve it with remediation. It gives you a lot of details about versioning and such for the library. It is definitely helpful there.
The time-to-value of the solution in our company was almost immediate.
What's my experience with pricing, setup cost, and licensing?
It's inexpensive and easy to license. It comes in standard package sizing, which is straightforward. This information is publicly found on their website.
Which other solutions did I evaluate?
We focused our evaluation specifically on Black Duck and Snyk, plus Veracode as a larger product offering.
The Snyk platform does everything we've expected it to do. It works much better than some of the competitors we looked at during our assessment.
What other advice do I have?
If you're looking for a source composition analysis tool or a tool to monitor your open source security, then it's a fantastic solution.
SAST and DAST are very important functions. We have alternative options for those though. I wouldn't say the solution’s lack of SAST and DAST hurts or affects us. It would be nice if these were a platform or offering that they did have.
We don't use the solution’s Container security feature at the moment, but we are planning on using it.
I would rate this solution as an eight or nine (out of 10).
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
Snyk
September 2025

Learn what your peers think about Snyk. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
870,697 professionals have used our research since 2012.
Application Security at Finos
Provides good scalability, but its reporting feature needs improvement
Pros and Cons
- "The product's most valuable features are an open-source platform, remote functionality, and good pricing."
- "Snyk's API and UI features could work better in terms of speed."
What is most valuable?
The product's most valuable features are an open-source platform, remote functionality, and good pricing.
What needs improvement?
Snyk's API and UI features could work better in terms of speed. Additionally, they could optimize and provide better reports, including reports for security, technical, and developer level.
For how long have I used the solution?
We have been using Snyk for two and a half years.
What do I think about the stability of the solution?
I rate the platform's stability an eight or nine out of ten. Sometimes, we encounter downtime issues, but it has quick recovery. It impacts our system and needs improvement for better outcomes during the development phase.
What do I think about the scalability of the solution?
We have 20 to 50 Snyk users in the development team of our organization. It is a scalable product.
How are customer service and support?
The technical support services are available quickly for developers. However, they should improve their speed of response for customers.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I have used Checkmarx and some other open-source software.
How was the initial setup?
The initial setup is neither difficult nor easy. However, it works slowly. It takes some weeks or months to complete the process.
What's my experience with pricing, setup cost, and licensing?
The product has good pricing.
What other advice do I have?
I recommend Snyk to others and rate it a seven out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Principal Software Engineer at a healthcare company with 11-50 employees
Useful scanning, simple setup, and reliable
Pros and Cons
- "The most valuable features of Snyk are vulnerability scanning and automation. The automation the solution brings around vulnerability scanning is useful."
- "The solution could improve the reports. They have been working on improving the reports but more work could be done."
What is our primary use case?
I am using Snyk for DevOps and security.
What is most valuable?
The most valuable features of Snyk are vulnerability scanning and automation. The automation the solution brings around vulnerability scanning is useful.
What needs improvement?
The solution could improve the reports. They have been working on improving the reports but more work could be done.
For how long have I used the solution?
I have been using Snyk for a few months.
What do I think about the stability of the solution?
The stability of Snyk is good.
What do I think about the scalability of the solution?
We have not had any challenges with the scalability of Snyk.
How are customer service and support?
There are good resources to answer questions when we have issues.
Which solution did I use previously and why did I switch?
I have not used a testing solution prior to Snyk.
How was the initial setup?
The initial setup of Snyk was easy.
What's my experience with pricing, setup cost, and licensing?
The price of the solution is expensive compared to other solutions.
What other advice do I have?
I would recommend people use the free tier first before they purchase.
I rate Snyk a ten out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Managing Director at ProQuanta
Great features and stability with a straightforward setup
Pros and Cons
- "The solution has great features and is quite stable."
- "The log export function could be easier when shipping logs to other platforms such as Splunk."
What is our primary use case?
The solution is set up in a test lab for proof of concept on the ACIA component. Our client is proposing the solution in an RFP response that will include 3,000 users when awarded.
What is most valuable?
The solution has great features and is quite stable.
What needs improvement?
The log export function could be easier when shipping logs to other platforms such as Splunk.
For how long have I used the solution?
I have been using the solution for months.
What do I think about the stability of the solution?
The stability is quite good.
What do I think about the scalability of the solution?
The solution is scalable with no issues.
How are customer service and support?
I have not needed technical support.
How was the initial setup?
The initial setup is quite straightforward and took fifteen minutes.
What about the implementation team?
We implemented the solution in-house.
In our lab environment, the deployment strategy is to install and run with no complex operations.
What other advice do I have?
I rate the solution a nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Security Solutions Architect at a tech services company with 51-200 employees
Developer-friendly and easy to setup
Pros and Cons
- "Snyk is a developer-friendly product."
- "Compatibility with other products would be great."
What is our primary use case?
I am a reseller. We provide solutions for our customers.
What is most valuable?
It's a good product. I haven't seen any weakness.
Snyk is a developer-friendly product.
What needs improvement?
Compatibility with other products would be great.
How are customer service and technical support?
I have not contacted technical support.
Which solution did I use previously and why did I switch?
Previously, I was working with Micro Focus Fortify.
How was the initial setup?
The initial setup is easy.
Which other solutions did I evaluate?
We have also evaluated Prisma Cloud by Palo Alto.
What other advice do I have?
We tried to partner up with Snyk, but we were not successful in gaining a partnership. We are not authorized Snyk resellers.
I would rate Snyk an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer.
Engineering Manager at a comms service provider with 51-200 employees
Extremely easy to integrate, simple to use and hassle-free
Pros and Cons
- "What is valuable about Snyk is its simplicity."
- "Could include other types of security scanning and statistical analysis"
What is our primary use case?
We use the product to scan our code for any vulnerable dependencies we might have. We depend on open source libraries and need to make sure they're secure. If not, we need to highlight the areas and replace them, update them quickly. A secondary, minor use case is to also look at licensing and make sure that we're not using open source licenses we should not be using. Those are our two use cases.
What is most valuable?
What is valuable about Snyk is its simplicity, and that's the main selling point. It's understandably also very cheap because you don't need as much account management resources to manage the relationship with the customer and that's a benefit. I also like that it's self-service, with extremely easy integration. You don't need to speak to anybody to get you off and running and they have loads of integrations with source control and cloud CI systems. They are a relatively new product so they might not have a bigger library than competitors, but it's a good product overall.
They do however have the option to install Snyk on-prem, but it is much more expensive.
What needs improvement?
The product could be improved by including other types of security scanning (e.g. SAST or DAST), which is important. It would also help to include the static analysis specifically to the open-source scanning so we could get an idea of whether a particular library is vulnerable and recognise if we're actually using the vulnerable part of it or not, they do have runtime analysis, but it is a hassle to set up.
It would be the same issue in terms of the inclusion of additional features. I think static analysis is really important. A second additional feature would be to add tags to projects, identifying an important project or assigning a project to a particular team. Custom tags would be helpful.
For how long have I used the solution?
I've been using the product for less than a year. It's an SaaS solution, online, so we're always using the latest version.
What do I think about the stability of the solution?
It's a very stable product, they are clear when a specific feature is in beta.
What do I think about the scalability of the solution?
We have hundreds of source code repositories, and Snyk scans them in minutes (it just looks at package management files to identify the dependency tree), Snyk uses the same infrastructure to scan for all customers on the cloud which gives it lots of scalability opportunities compared to some other vendors where the software is installed on-prem or on a dedicated instance which makes the software pricy and limited (this dedicated instance will be idle most of the time, and the customer needs to pay for it).
How are customer service and technical support?
The technical support is very good.
What other advice do I have?
Some of our products are deployed on the private cloud behind firewalls, Snyk has tools to carry out security scanning from our private repositories.
For anyone thinking of using the product, I would suggest using cloud and SaaS providers. Generally, they are easy to work with and there's no hassle of having to talk to salespeople and arrange demos, etc. Self-service SaaS products are a good way to go when it's appropriate.
I would rate this product a nine out of 10.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Head of Sales at a tech services company with 11-50 employees
A stable and affordable solution that offers exceptional technical support to its users
Pros and Cons
- "It is a stable solution. Stability-wise, I rate the solution a ten out of ten."
- "DAST has shortcomings, and Snyk needs to improve and overcome such shortcomings."
What is our primary use case?
In my company, Snyk is useful because it provides container security and DAST.
How has it helped my organization?
Snyk is a strong security solution that helps customers analyze static code and improve their security and code in their main application.
What is most valuable?
What needs improvement?
DAST has shortcomings, and Snyk needs to improve and overcome such shortcomings.
For how long have I used the solution?
I have experience with Snyk, and it is a new solution chosen by my company. I am a reseller of the solution.
What do I think about the stability of the solution?
It is a stable solution. Stability-wise, I rate the solution a ten out of ten.
What do I think about the scalability of the solution?
Scalability-wise, I rate the solution an eight out of ten.
One security engineer uses Snyk in our company, but we don't use the tool for our own use cases, and we only deploy it for our customers.
How are customer service and support?
I rate the technical support a ten out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Our company previously used Micro Focus for three or four months. We have worked with Checkmark for more than two or three years.
We provide Snyk to our customers. It is a very strong solution.
How was the initial setup?
I rate the initial setup a ten on a scale of one to ten, where one is difficult, and ten is easy.
The solution is deployed on the cloud since it is a SaaS solution and doesn't have an on-premises version.
The deployment process for Snyk takes like a week.
For the steps in Snyk's deployment, one has to buy a license and click on the deploy icon on Snyk's website, after which it syncs up with the system.
One person is required for deployment. Even if we talk about something like container security or DAST, only one person would be required for the deployment process.
What's my experience with pricing, setup cost, and licensing?
On a scale of one to ten, where one is cheap and ten is expensive, I rate the pricing a three. It is a cheap solution.
What other advice do I have?
I would definitely recommend the solution to those planning to use it since it is easy to deploy and has strong features like machine learning and the ability to analyze static codes.
Overall, I rate the solution an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Snyk Report and get advice and tips from experienced pros
sharing their opinions.
Updated: September 2025
Product Categories
Application Security Tools Application Performance Monitoring (APM) and Observability Static Application Security Testing (SAST) GRC Cloud Management Vulnerability Management Container Security Software Composition Analysis (SCA) Software Development Analytics Cloud Security Posture Management (CSPM) DevSecOps Application Security Posture Management (ASPM)Popular Comparisons
SonarQube Server (formerly SonarQube)
Wiz
SentinelOne Singularity Cloud Security
Datadog
Microsoft Defender for Cloud
Prisma Cloud by Palo Alto Networks
GitLab
Checkmarx One
Veracode
New Relic
Qualys VMDR
Tenable Nessus
Coverity Static
Black Duck SCA
CrowdStrike Falcon Cloud Security
Buyer's Guide
Download our free Snyk Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which software is ideal for code quality and security?
- How does Snyk compare with SonarQube?
- How do you use Snyk for running SAST?
- What do I scan when changing code in Snyk?
- If you had to both encrypt and compress data during transmission, which would you do first and why?
- When evaluating Application Security, what aspect do you think is the most important to look for?
- What are the Top 5 cybersecurity trends in 2022?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- We're evaluating Tripwire, what else should we consider?
- Which application security solutions include both vulnerability scans and quality checks?