Snyk

4.5
(1)

Snyk is a security solution designed to find and fix vulnerabilities in Node.js and Ruby apps.

Work for Snyk?

Learning about Snyk?

We can help you find the solution that fits you best.

Snyk Reviews

Ask Snyk a Question
Write a Review
Filter Reviews
Filter Reviews
Ratings
User Role
For Category
Industry
Showing 1 Snyk review
LinkedIn Connections
Snyk review by User in Internet
User in Internet
Validated Reviewer
Review Source

"Fantastic, just wish it supported PHP"

What do you like best?

GitLab and GitHub integration, rejects pull/merge requests if vulnerable code introduced, recommends remediation steps.

What do you dislike?

Wish it supported PHP like it does JavaScript. With that, entire codebase would be supported.

Recommendations to others considering the product

If you use GitHub or GitLab repos, look into it.

What business problems are you solving with the product? What benefits have you realized?

See "what do you like best." Prevents insecure code from being merged.

Sign in to G2 Crowd to see what your connections have to say about Snyk

What Data Security solution do you use?

Thanks for letting us know!

There are not enough reviews of Snyk for G2 Crowd to provide buying insight. Below are some alternatives with more reviews:

1
Box Zones Logo
Box Zones
4.2
(30 reviews)
Box Zones enables organizations to address data residency obligations across multiple geographies, allowing them to raise the bar for privacy and control in the cloud.
2
OpenSSH Logo
OpenSSH
4.9
(26 reviews)
OpenSSH provides tools that allows you to encrypt all traffic to help manage eavesdropping, connection hijacking, and other attacks to your Internet while providing secure tunneling capabilities and more.
3
Sophos SafeGuard Encryption Logo
Sophos SafeGuard Encryption
3.8
(24 reviews)
Sophos SafeGuard Encryption provides data protection across multiple platforms and devices allowing you to have secure data without slowing down your workflow.
4
StealthAUDIT Management Platform Logo
StealthAUDIT Management Platform
4.4
(23 reviews)
StealthAUDIT Management Platform (SMP) is an IT infrastructure management framework designed to facilitate data collection, analysis, remediation, and reporting.
5
AWS Key Management Service (KMS) Logo
AWS Key Management Service (KMS)
4.4
(23 reviews)
AWS Key Management Service (KMS) is a service that help to create and control the encryption keys used to encrypt data, and uses Hardware Security Modules (HSMs) to protect the security of keys.
6
Trend Micro Logo
Trend Micro
4.0
(22 reviews)
Trend Micro develops server security, cloud security, and small business content security solutions.
7
TokenEx Logo
TokenEx
4.6
(17 reviews)
TokenEx is an enterprise-class tokenization platform that offers virtually unlimited flexibility in how customers can access, store, and secure data. TokenEx extends flexibility by working with multiple data acceptance channels and by maintaining a processor-agnostic approach. Moreover, TokenEx is able to tokenize and secure almost any data type your company works with, including PCI, PII, PHI, and even unstructured data formats.
8
Amazon Inspector Logo
Amazon Inspector
4.3
(17 reviews)
Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. It automatically assesses applications for vulnerabilities or deviations from best practices.
9
IBM Security Guardium Logo
IBM Security Guardium
4.0
(15 reviews)
IBM Security® Guardium® helps ensure the security, privacy and integrity of your critical data across a full range of environments, from databases to big data, cloud, file systems and more.
10
AVG File Server Edition Logo
AVG File Server Edition
4.4
(13 reviews)
AVG File Server Edition helps keep your customer and business data safe from hackers and malware: hassle and worry you just don't need.
Show more
Kate from G2 Crowd

Learning about Snyk?

I can help.
* We monitor all Snyk reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.