No more typing reviews! Try our Samantha, our new voice AI agent.

Snyk vs WithSecure Elements Exposure Management (XM) comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 11, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Snyk
Ranking in Vulnerability Management
19th
Ranking in Cloud Security Posture Management (CSPM)
17th
Average Rating
8.2
Reviews Sentiment
7.3
Number of Reviews
51
Ranking in other categories
Application Performance Monitoring (APM) and Observability (21st), Application Security Tools (8th), Static Application Security Testing (SAST) (6th), GRC (5th), Cloud Management (13th), Container Security (7th), Software Composition Analysis (SCA) (3rd), Software Development Analytics (2nd), DevSecOps (3rd), Application Security Posture Management (ASPM) (2nd), AI Security (9th)
WithSecure Elements Exposur...
Ranking in Vulnerability Management
78th
Ranking in Cloud Security Posture Management (CSPM)
37th
Average Rating
10.0
Reviews Sentiment
6.6
Number of Reviews
1
Ranking in other categories
Continuous Threat Exposure Management (CTEM) (27th)
 

Mindshare comparison

As of May 2026, in the Vulnerability Management category, the mindshare of Snyk is 2.2%, down from 3.2% compared to the previous year. The mindshare of WithSecure Elements Exposure Management (XM) is 0.5%, up from 0.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Vulnerability Management Mindshare Distribution
ProductMindshare (%)
Snyk2.2%
WithSecure Elements Exposure Management (XM)0.5%
Other97.3%
Vulnerability Management
 

Featured Reviews

Abhishek-Goyal - PeerSpot reviewer
Software Engineer at a computer software company with 11-50 employees
Improves security posture by actively reducing critical vulnerabilities and guiding remediation
Snyk's main features include open-source vulnerability scanning, code security, container security, infrastructure as code security, risk-based prioritization, development-first integration, continuous monitoring and alerting, automation, and remediation. The best features I appreciate are the vulnerability checking, vulnerability scanning, and code security capabilities, as Snyk scans all open-source dependencies for known vulnerabilities and helps with license compliance for open-source components. Snyk integrates into IDEs, allowing issues to be caught as they appear in the code dynamically and prioritizes risk while providing remediation advice. Snyk provides actionable remediation advice on where vulnerabilities can exist and where code security is compromised, automatically scanning everything and providing timely alerts. Snyk has positively impacted my organization by improving the security posture across all software repositories, resulting in fewer critical vulnerabilities, more confidence in overall product security, and faster security compliance for project clients. Snyk has helped reduce vulnerabilities significantly. Initially, the repository had 17 to 31 critical and high vulnerabilities, but Snyk has helped manage them down to just five vulnerabilities, which are now lower and not high or critical.
PP
System Specialist at Fix-Forum Oy
Stable, scalable, and can be deployed on both cloud and on-premises
We usually need the solution to have extra protection against data breaches, as we have seen with our customers. The solution is deployed on the public cloud The solution works both outside and on-premises of the company, thus preventing secondary breaches from reaching the company's data. The…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"There are many valuable features, for example the way the scanning feature works and the integration is cool because I can integrate it and I don't need to wait until the CACD, I can plug it in to our local ID and there I can do the scanning, that is the part I like best."
"Everything that the product promises it will do, it's been doing that for us."
"Snyk allows us to spend less time securing applications, increasing their productivity."
"We have integrated it into our software development environment. We have it in a couple different spots. Developers can use it at the point when they are developing. They can test it on their local machine. If the setup that they have is producing alerts or if they need to upgrade or patch, then at the testing phase when a product is being built for automated testing integrates with Snyk at that point and also produces some checks."
"From the software composition analysis perspective, it first makes sure that we understand what is happening from a third-party perspective for the particular product that we use. This is very difficult when you are building software and incorporating dependencies from other libraries, because those dependencies have dependencies and that chain of dependencies can go pretty deep. There could be a vulnerability in something that is seven layers deep, and it would be very difficult to understand that is even affecting us. Therefore, Snyk provides fantastic visibility to know, "Yes, we have a problem. Here is where it ultimately comes from." It may not be with what we're incorporating, but something much deeper than that."
"A main feature of Snyk is that when you go with SCA, you do get properly done security composition, also from the licensing and open-source parameters perspective. A lot of companies often use open-source libraries or frameworks in their code, which is a big security concern. Snyk deals with all the things and provides you with a proper report about whether any open-source code or framework that you are using is vulnerable. In that way, Snyk is very good as compared to other tools."
"Snyk's ability to scan all of those every time we build, and keep a running status of them and recheck them daily, is extremely valuable for making us aware of what's going on."
"The solution has great features and is quite stable."
"The solution works both outside and on-premises of the company, thus preventing secondary breaches from reaching the company's data."
 

Cons

"It can be improved from the reporting perspective and scanning perspective. They can also improve it on the UI front."
"Scalability has some issues because we have a lot of code and its use is mandatory. Therefore, it can be slow at times, especially because there are a lot of projects and reporting. Some UI improvements could help with this."
"Basically the licensing costs are a little bit expensive."
"We have seen cases where tools didn't find or recognize certain dependencies. There are some certain circumstances where the tool isn't actually finding what it's supposed to be finding, then it could be misleading."
"The log export function could be easier when shipping logs to other platforms such as Splunk."
"Snyk has several limitations, including issues with Gradle, NPM, and Xcode, and trouble with AutoPR."
"We've also had technical issues with blocking newly introduced vulnerabilities in PRs and that was creating a lot of extra work for developers in trying to close and reopen the PR to get rid of some areas."
"The tool's initial use is complex."
"The cost of the solution has room for improvement."
 

Pricing and Cost Advice

"It's good value. That's the primary thing. It's not cheap-cheap, but it's good value."
"I didn't think the price was that great, but it wasn't that bad, either. I'd rate their pricing as average in the market."
"Compared to Veracode, Snyk is definitely a cheaper tool."
"Cost-wise, it's similar to Veracode, but I don't know the exact cost."
"It's inexpensive and easy to license. It comes in standard package sizing, which is straightforward. This information is publicly found on their website."
"Despite Snyk's coverage, scalability, reliability, and stability, it is available at a very competitive price."
"Snyk is a premium-priced product, so it's kind of expensive. The big con that I find frustrating is when a company charges extra for single sign-on (SSO) into their SaaS app. Snyk is one of the few that I'm willing to pay that add-on charge, but generally I disqualify products that charge an extra fee to do integrated authentication to our identity provider, like Okta or some other SSO. That is a big negative. We had to pay extra for that. That little annoyance aside, it is expensive. You get a lot out of it, but you're paying for that premium."
"Snyk is an expensive solution."
"The cost of the solution is mid-ranged but worth the price."
report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
893,244 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Computer Software Company
10%
Manufacturing Company
10%
Comms Service Provider
7%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business21
Midsize Enterprise9
Large Enterprise22
No data available
 

Questions from the Community

How does Snyk compare with SonarQube?
Snyk does a great job identifying and reducing vulnerabilities. This solution is fully automated and monitors 24/7 to find any issues reported on the internet. It will store dependencies that you a...
What needs improvement with Snyk?
There are a lot of false positives that need to be identified and separated. The inclusion of AI to remove false positives would be beneficial. So far, I've not seen any AI features to enhance vuln...
What is your primary use case for Snyk?
I use Snyk ( /products/snyk-reviews ) in the DevOps pipeline to identify vulnerabilities before deploying the application. It integrates with Jenkins ( /products/jenkins-reviews ).
Ask a question
Earn 20 points
 

Also Known As

Fugue, Snyk AppRisk
No data available
 

Interactive Demo

Demo not available
 

Overview

 

Sample Customers

StartApp, Segment, Skyscanner, DigitalOcean, Comic Relief
Information Not Available
Find out what your peers are saying about Wiz, Tenable, Qualys and others in Vulnerability Management. Updated: May 2026.
893,244 professionals have used our research since 2012.