Try our new research platform with insights from 80,000+ expert users

SUSE NeuVector vs Snyk comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 11, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Snyk
Ranking in Container Security
6th
Average Rating
8.2
Reviews Sentiment
7.4
Number of Reviews
50
Ranking in other categories
Application Performance Monitoring (APM) and Observability (16th), Application Security Tools (7th), Static Application Security Testing (SAST) (8th), GRC (4th), Cloud Management (11th), Vulnerability Management (13th), Software Composition Analysis (SCA) (1st), Software Development Analytics (2nd), Cloud Security Posture Management (CSPM) (15th), DevSecOps (2nd), Application Security Posture Management (ASPM) (2nd), AI Security (11th)
SUSE NeuVector
Ranking in Container Security
17th
Average Rating
7.8
Reviews Sentiment
7.3
Number of Reviews
8
Ranking in other categories
Cloud Workload Protection Platforms (CWPP) (20th)
 

Mindshare comparison

As of January 2026, in the Container Security category, the mindshare of Snyk is 4.8%, down from 5.9% compared to the previous year. The mindshare of SUSE NeuVector is 2.1%, down from 2.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Container Security Market Share Distribution
ProductMarket Share (%)
Snyk4.8%
SUSE NeuVector2.1%
Other93.1%
Container Security
 

Featured Reviews

Abhishek-Goyal - PeerSpot reviewer
Software Engineer at a computer software company with 11-50 employees
Improves security posture by actively reducing critical vulnerabilities and guiding remediation
Snyk's main features include open-source vulnerability scanning, code security, container security, infrastructure as code security, risk-based prioritization, development-first integration, continuous monitoring and alerting, automation, and remediation. The best features I appreciate are the vulnerability checking, vulnerability scanning, and code security capabilities, as Snyk scans all open-source dependencies for known vulnerabilities and helps with license compliance for open-source components. Snyk integrates into IDEs, allowing issues to be caught as they appear in the code dynamically and prioritizes risk while providing remediation advice. Snyk provides actionable remediation advice on where vulnerabilities can exist and where code security is compromised, automatically scanning everything and providing timely alerts. Snyk has positively impacted my organization by improving the security posture across all software repositories, resulting in fewer critical vulnerabilities, more confidence in overall product security, and faster security compliance for project clients. Snyk has helped reduce vulnerabilities significantly. Initially, the repository had 17 to 31 critical and high vulnerabilities, but Snyk has helped manage them down to just five vulnerabilities, which are now lower and not high or critical.
Danie Joubert - PeerSpot reviewer
Managing Director at ProQuanta
Good value for money; great for policy management
Our model of deployment for this solution is on-premises. For people looking into this solution and trying to use it for the first time, I'd say make your life easier by using the SUSE product as well on top of your community scale stack. That makes your integration points a lot easier and smoother. I would also say during your initial setup, make sure that your clusters are already in terms of the capabilities with the version required. I would rate this solution an eight, on a scale from one to 10, with one being the worst and 10 being the best. The reason for this rating is that what they offer is solid, but they could expand their service and add more features just to make more things integrated into an enterprise itself.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It is easy for developers to use. The documentation is clear as well as the APIs are good and easily readable. It's a good solution overall."
"The CLI feature is quite useful because it gives us a lot of flexibility in what we want to do. If you use the UI, all the information is there and you can see what Snyk is showing you, but there is nothing else that you can change. However, when you use the CLI, then you can use commands and can get the output or response back from Snyk. You can also take advantage of that output in a different way. For the same reason, we have been using the CLI for the hard gate in the pipeline: Obtain a particular CDSS score for vulnerability. Based on that information, we can then decide if we want to block or allow the build. We have more flexibility if we use the CLI."
"Snyk has positively impacted my organization by improving the security posture across all software repositories, resulting in fewer critical vulnerabilities, more confidence in overall product security, and faster security compliance for project clients."
"Our overall security has improved. We are running fewer severities and vulnerabilities in our packages. We fixed a lot of the vulnerabilities that we didn't know were there."
"Snyk is a developer-friendly product."
"Provides clear information and is easy to follow with good feedback regarding code practices."
"The advantage of Snyk is that Snyk automatically creates a pull request for all the findings that match or are classified according to the policy that we create. So, once we review the PR within Snyk and we approve the PR, Snyk auto-fixes the issue, which is quite interesting and which isn't there in any other product out there. So, Snyk is a step ahead in this particular area."
"Snyk has positively impacted my organization by improving the security posture across all software repositories, resulting in fewer critical vulnerabilities, more confidence in overall product security, and faster security compliance for project clients."
"The tool's deployment is simple. Also, I am impressed with its risk capabilities."
"The solution includes many features, not only for container and client security but also for scanning nodes, networks, and vulnerabilities."
"When it comes to the price, we got a really good deal from the vendor instantly."
"The UI has a lot of features."
"The initial setup is quite good, it's straightforward."
"The most valuable feature of SUSE NeuVector is the performance, deployment, and cost."
"The features of image scanning and anti-malware are really valuable."
"The most valuable feature of SUSE NeuVector is its run-time security."
 

Cons

"We would like to have upfront knowledge on how easy it should be to just pull in an upgraded dependency, e.g., even introduce full automation for dependencies supposed to have no impact on the business side of things. Therefore, we would like some output when you get the report with the dependencies. We want to get additional information on the expected impact of the business code that is using the dependency with the newer version. This probably won't be easy to add, but it would be helpful."
"We use Bamboo for CI.CD, and we had problems integrating Snyk with it. Ultimately, we got the two solutions to work together, but it was difficult."
"The solution's reporting and storage could be improved."
"Snyk has several limitations, including issues with Gradle, NPM, and Xcode, and trouble with AutoPR."
"We tried to integrate it into our software development environment but it went really badly. It took a lot of time and prevented the developers from using the IDE. Eventually, we didn't use it in the development area... I would like to see better integrations to help the developers get along better with the tool. And the plugin for the IDE is not so good. This is something we would like to have..."
"We have to integrate with their database, which means we need to send our entire code to them to scan, and they send us the report. A company working in the financial domain usually won't like to share its code or any information outside its network with any third-party provider."
"Offering API access in the lower or free open-source tiers would be better. That would help our customers. If you don't have an enterprise plan, it becomes challenging to integrate with the rest of the systems. Our customers would like to have some open-source integrations in the next release."
"One area where Snyk could improve is in providing developers with the line where the error occurs."
"Using a node port instead of a cluster IP is less ideal when implementing federation features between two clusters and could be improved."
"I would say that this solution should improve monitoring and reporting. I would also like to see more integrations so that we could essentially make it a part of a developing pipeline."
"SUSE NeuVector could improve by increasing its visibility into other elements of the DevSecOps pipeline. Additionally, scanning around infrastructure would be helpful."
"The tool should offer seamless integration of other security tools while in a hybrid environment."
"However, I found that the support in Egypt was not very qualified, and there was a need to upgrade to a higher support layer to solve my issues."
"SUSE NeuVector should provide more security protection rules and better container image scanning."
"We are also working with IaaS VMS, but NeuVector doesn't support virtual machines."
"The image-scanning features need improvement."
 

Pricing and Cost Advice

"The product has good pricing."
"We are using the open-source version for the scans."
"With Snyk, you get what you pay for. It is not a cheap solution, but you get a comprehensiveness and level of coverage that is very good. The dollars in the security budget only go so far. If I can maximize my value and be able to have some funds left over for other initiatives, I want to do that. That is what drives me to continue to say, "What's out there in the market? Snyk's expensive, but it's good. Is there something as good, but more affordable?" Ultimately, I find we could go cheaper, but we would lose the completeness of vision or scope. I am not willing to do that because Snyk does provide a pretty important benefit for us."
"It is pretty expensive. It is not a cheap product."
"You can get a good deal with Snyk for pricing. It's a little expensive, but it is worth it."
"Pricing-wise, it is not expensive as compared to other tools. If you have a couple of licenses, you can scan a certain number of projects. It just needs to be attached to them."
"The pricing is reasonable."
"The price is good. Snyk had a good price compared to the competition, who had higher pricing than them. Also, their licensing and billing are clear."
"SUSE NeuVector is an open-source solution."
"Licensing fees are paid yearly."
"The price of SUSE NeuVector is low. There is an additional cost for support."
"The solution's pricing could be better. The cost of a subscription is calculated on the basis of work."
report
Use our free recommendation engine to learn which Container Security solutions are best for your needs.
881,114 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
11%
Manufacturing Company
10%
Comms Service Provider
6%
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
10%
Government
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business21
Midsize Enterprise9
Large Enterprise21
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise1
Large Enterprise2
 

Questions from the Community

How does Snyk compare with SonarQube?
Snyk does a great job identifying and reducing vulnerabilities. This solution is fully automated and monitors 24/7 to find any issues reported on the internet. It will store dependencies that you a...
What do you like most about Snyk?
The most effective feature in securing project dependencies stems from its ability to highlight security vulnerabilities.
What needs improvement with Snyk?
There are a lot of false positives that need to be identified and separated. The inclusion of AI to remove false positives would be beneficial. So far, I've not seen any AI features to enhance vuln...
What needs improvement with NeuVector?
One area for improvement is NeuVector's ability to import CVEs from different sources. Additionally, using a node port instead of a cluster IP is less ideal when implementing federation features be...
What is your primary use case for NeuVector?
In my company, I am looking to deploy a container security runtime solution.
 

Comparisons

 

Also Known As

Fugue, Snyk AppRisk
NeuVector
 

Overview

 

Sample Customers

StartApp, Segment, Skyscanner, DigitalOcean, Comic Relief
Figo, Clear Review, Arvato Bertelsmann, Experian, Chime
Find out what your peers are saying about SUSE NeuVector vs. Snyk and other solutions. Updated: December 2025.
881,114 professionals have used our research since 2012.