No more typing reviews! Try our Samantha, our new voice AI agent.

Debricked Security vs Snyk comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 11, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Debricked Security
Ranking in Vulnerability Management
115th
Ranking in Software Composition Analysis (SCA)
22nd
Average Rating
0.0
Reviews Sentiment
8.4
Number of Reviews
1
Ranking in other categories
No ranking in other categories
Snyk
Ranking in Vulnerability Management
19th
Ranking in Software Composition Analysis (SCA)
3rd
Average Rating
8.2
Reviews Sentiment
7.3
Number of Reviews
51
Ranking in other categories
Application Performance Monitoring (APM) and Observability (21st), Application Security Tools (8th), Static Application Security Testing (SAST) (6th), GRC (5th), Cloud Management (13th), Container Security (7th), Software Development Analytics (2nd), Cloud Security Posture Management (CSPM) (17th), DevSecOps (3rd), Application Security Posture Management (ASPM) (2nd), AI Security (9th)
 

Mindshare comparison

As of May 2026, in the Vulnerability Management category, the mindshare of Debricked Security is 0.2%, up from 0.1% compared to the previous year. The mindshare of Snyk is 2.2%, down from 3.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Vulnerability Management Mindshare Distribution
ProductMindshare (%)
Snyk2.2%
Debricked Security0.2%
Other97.6%
Vulnerability Management
 

Featured Reviews

Jonathan Steyn - PeerSpot reviewer
Principal Technical Consultant at EOH
Allows for organizations and projects to manage open source vulnerabilities in an efficient, smooth and secure way
Debricked Security has already implemented several improvements, which are great. One area that could be improved is simplifying the process of converting other SBOM data formats into files that Debricked can understand. While the conversion isn't difficult, it is pretty technical and could be challenging for non-technical users. Apart from that, all software features work seamlessly. The integration with endpoints took less than fifteen minutes, and everything from security conventions to automation rules works perfectly. As for AI, Debricked Security uses it effectively, reducing manual work and unnecessary analysis. It enhances data analysis, making it much easier for customers, which I appreciate about the tool.
Abhishek-Goyal - PeerSpot reviewer
Software Engineer at a computer software company with 11-50 employees
Improves security posture by actively reducing critical vulnerabilities and guiding remediation
Snyk's main features include open-source vulnerability scanning, code security, container security, infrastructure as code security, risk-based prioritization, development-first integration, continuous monitoring and alerting, automation, and remediation. The best features I appreciate are the vulnerability checking, vulnerability scanning, and code security capabilities, as Snyk scans all open-source dependencies for known vulnerabilities and helps with license compliance for open-source components. Snyk integrates into IDEs, allowing issues to be caught as they appear in the code dynamically and prioritizes risk while providing remediation advice. Snyk provides actionable remediation advice on where vulnerabilities can exist and where code security is compromised, automatically scanning everything and providing timely alerts. Snyk has positively impacted my organization by improving the security posture across all software repositories, resulting in fewer critical vulnerabilities, more confidence in overall product security, and faster security compliance for project clients. Snyk has helped reduce vulnerabilities significantly. Initially, the repository had 17 to 31 critical and high vulnerabilities, but Snyk has helped manage them down to just five vulnerabilities, which are now lower and not high or critical.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"One of the most valuable features of Debricked Security is its ability to integrate with other tools like the Software Security Center and Fortify on Demand. This integration allows users to make comparisons and generate detailed reports based on the data that Debricked Security populates or aggregates. While this feature may not be unique, it is highly effective for detecting vulnerabilities and providing comprehensive insights."
"The dependency checks of the libraries are very valuable, but the licensing part is also very important because, with open source components, licensing can be all over the place. Our project is not an open source project, but we do use quite a lot of open source components and we want to make sure that we don't have surprises in there."
"Snyk has allowed our developers to spend less time securing applications, increasing their productivity."
"They evolved their maturity because they could find the vulnerabilities before the pipeline runs."
"The solution has great features and is quite stable."
"Snyk has positively impacted my organization by improving the security posture across all software repositories, resulting in fewer critical vulnerabilities, more confidence in overall product security, and faster security compliance for project clients."
"I think all the standard features are quite useful when it comes to software component scanning, but I also like the new features they're coming out with, such as container scanning, secrets scanning, and static analysis with SAST."
"The advantage of Snyk is that Snyk automatically creates a pull request for all the findings that match or are classified according to the policy that we create, so once we review the PR within Snyk and we approve the PR, Snyk auto-fixes the issue, which is quite interesting and which isn't there in any other product out there, so Snyk is a step ahead in this particular area."
"It has an accurate database of vulnerabilities with a low amount of false positives."
 

Cons

"Debricked Security has already implemented several improvements, which are great. One area that could be improved is simplifying the process of converting other SBOM data formats into files that Debricked can understand. While the conversion isn't difficult, it is pretty technical and could be challenging for non-technical users. Apart from that, all software features work seamlessly. The integration with endpoints took less than fifteen minutes, and everything from security conventions to automation rules works perfectly. As for AI, Debricked Security uses it effectively, reducing manual work and unnecessary analysis. It enhances data analysis, making it much easier for customers, which I appreciate about the tool."
"The solution's reporting and storage could be improved."
"The reporting mechanism of Snyk could improve. The reporting mechanism is available only on the higher level of license."
"Snyk has several limitations, including issues with Gradle, NPM, and Xcode, and trouble with AutoPR."
"The tool needs improvement in license compliance. I would like to see the integration of better policy management in the product's future release. When it comes to the organization that I work for, there are a lot of business units since we are a group of companies. Each of these companies has its specific requirements and its own appetite for risk. This should be able to reflect in flexible policies. We need to be able to configure policies that can be adjusted later or overridden by the business unit that is using the product."
"The way Snyk notifies if we have an issue, there are a few options: High vulnerability or medium vulnerability. The problem with that is high vulnerabilities are too broad, because there are too many. If you enable notifications, you get a lot of notifications, When you get many notifications, they become irrelevant because they're not specific. I would prefer to have control over the notifications and somehow decide if I want to get only exploitable vulnerabilities or get a specific score for a vulnerability. Right now, we receive too many high vulnerabilities. If we enable notifications, then we just get a lot of spam message. Therefore, we would like some type of filtering system to be built-in for the system to be more precise."
"We've also had technical issues with blocking newly introduced vulnerabilities in PRs and that was creating a lot of extra work for developers in trying to close and reopen the PR to get rid of some areas. We ended up having to disable that feature altogether because it wasn't really working for us and it was actually slowing down developer velocity."
"There is always more work to do around managing the volume of information when you've got thousands of vulnerabilities."
"A feature we would like to see is the ability to archive and store historical data, without actually deleting it."
 

Pricing and Cost Advice

"Regarding the cost, in my country, I would say it is expensive. However, I’m not directly involved in the sales process, so I don't have the exact license costs."
"Cost-wise, it's similar to Veracode, but I don't know the exact cost."
"It's good value. That's the primary thing. It's not cheap-cheap, but it's good value."
"The pricing is reasonable."
"It is pretty expensive. It is not a cheap product."
"I didn't think the price was that great, but it wasn't that bad, either. I'd rate their pricing as average in the market."
"The license model is based on the number of contributing developers. Snyk is expensive, for a startup company will most likely use the community edition, while larger companies will buy the licensed version. The price of Snyk is more than other SLA tools."
"Presently, my company uses an open-source version of the solution. The solution's pricing can be considered quite reasonable owing to the features they offer."
"The product has good pricing."
report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
893,221 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Construction Company
19%
Computer Software Company
14%
Financial Services Firm
10%
Comms Service Provider
8%
Financial Services Firm
14%
Computer Software Company
10%
Manufacturing Company
9%
Comms Service Provider
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business21
Midsize Enterprise9
Large Enterprise22
 

Questions from the Community

What is your experience regarding pricing and costs for Debricked Security?
Regarding the cost, in my country, I would say it is expensive. However, I’m not directly involved in the sales process, so I don't have the exact license costs.
What needs improvement with Debricked Security?
Debricked Security has already implemented several improvements, which are great. One area that could be improved is simplifying the process of converting other SBOM data formats into files that De...
What is your primary use case for Debricked Security?
I initially did proof of value or concept walkthroughs of Debricked Security for the customer. I demonstrated the value of Debricked and how it enhances their current security architecture. With my...
How does Snyk compare with SonarQube?
Snyk does a great job identifying and reducing vulnerabilities. This solution is fully automated and monitors 24/7 to find any issues reported on the internet. It will store dependencies that you a...
What needs improvement with Snyk?
There are a lot of false positives that need to be identified and separated. The inclusion of AI to remove false positives would be beneficial. So far, I've not seen any AI features to enhance vuln...
What is your primary use case for Snyk?
I use Snyk ( /products/snyk-reviews ) in the DevOps pipeline to identify vulnerabilities before deploying the application. It integrates with Jenkins ( /products/jenkins-reviews ).
 

Comparisons

 

Also Known As

No data available
Fugue, Snyk AppRisk
 

Overview

 

Sample Customers

Information Not Available
StartApp, Segment, Skyscanner, DigitalOcean, Comic Relief
Find out what your peers are saying about Wiz, Tenable, Qualys and others in Vulnerability Management. Updated: May 2026.
893,221 professionals have used our research since 2012.