No more typing reviews! Try our Samantha, our new voice AI agent.
Chris Coetzee - PeerSpot reviewer
Managing Director at Digalance
Real User
May 11, 2022
The solution lets developers see any vulnerabilities or AGPL license issues associated with code in the early stages of development
Pros and Cons
  • "Lifecycle lets developers see any vulnerabilities or AGPL license issues associated with code in the early stages of development. The nice thing is that it's built into the ID so that they can see all versions of a specific code."
  • "Lifecycle integrates everything from IDE down to production, helping customers embrace open-source development where innovation is happening while ensuring the code coming into their environment is clean."
  • "In the beginning, we sometimes struggle to access the customer environment. The customer must issue the required certificates because many customers use cell phone certificates, and Sonatype needs a valid CA certificate."
  • "In the beginning, we sometimes struggle to access the customer environment."

What is our primary use case?

Most software innovation happens in an open-source environment, and developers generate only a small amount of code. The customers we encounter generally perform static code analysis immediately before they move code into production. If the security guys detect issues, they will send the code back into development. 

Lifecycle integrates everything from IDE down to production. It's a unique solution that helps customers embrace open-source development because that's where the innovation is happening. At the same time, I know the code coming into my environment is clean. A lot of our customers have adopted Azure DevOps, especially on the banking side. Some parts of the solution are in the cloud, while others are on-prem.

What is most valuable?

Lifecycle lets developers see any vulnerabilities or AGPL license issues associated with code in the early stages of development. The nice thing is that it's built into the ID so that they can see all versions of a specific code. 

They can see the associated risk and which version has the lowest risk. Developers can effortlessly migrate the entire project by dragging and dropping the version of the code with the lowest risk.

What needs improvement?

I'm not using the technology directly, and I haven't heard anything from our customer base. As far as I know, Sonatype has a unique customer engagement framework with a regular customer meet-up to go through deployment issues. They take feedback directly from the customer.

For how long have I used the solution?

We provide consulting, and one of our partners is the Sonatype distributor in Africa. We've been working with them for about three years.

Buyer's Guide
Sonatype Lifecycle
March 2026
Learn what your peers think about Sonatype Lifecycle. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,837 professionals have used our research since 2012.

What do I think about the scalability of the solution?

Our customers include some of the biggest banks in Africa. The number of Lifecycle users ranges from about 25 to 250, depending on the size of the environment.

How was the initial setup?

Deploying Nexus Lifecycle is straightforward. It normally takes two weeks to remotely install everything and hand it over to the customer. In the beginning, we sometimes struggle to access the customer environment. The customer must issue the required certificates because many customers use cell phone certificates, and Sonatype needs a valid CA certificate. From the partner's perspective, we only need one person to set it up, but the customers might need a few techs to provision VPN access, a server for the environment, etc.

What's my experience with pricing, setup cost, and licensing?

Nexus Lifecycle manager has a license for each server you deploy. You also pay a charge per user, including developers, release managers, and anybody else involved in the software development lifecycle. The price is fair for the value you get, but customers always want it cheaper.

What other advice do I have?

Based on my experience and feedback from the customers, I rate Sonatype Nexus Lifecycle nine out of 10.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Software Engineer at a manufacturing company with 10,001+ employees
Real User
Jan 10, 2022
Automated process for downloading open source libraries has significantly decreased developer workload
Pros and Cons
  • "The integrations into developer tooling are quite nice. I have the integration for Eclipse and for Visual Studio. Colleagues are using the Javascript IDE from JetBrains called WebStorm and there is an integration for that from Nexus Lifecycle. I have not heard about anything that is not working. It's also quite easy to integrate it. You just need to set up a project or an app and then you just make the connection in all the tools you're using."
  • "Now, we have an automatic process for downloading open source libraries, and this has removed a huge effort for all of our software developers."
  • "We got a lot of annotations for certain libraries when it comes to Java, but my feeling, and the feeling of a colleague as well, is that we don't get as many for critical libraries when it comes to .NET, as if most of them are really fine... It would be good if Sonatype would check the status of annotations for .NET packages."
  • "We got a lot of annotations for certain libraries when it comes to Java, but my feeling, and the feeling of a colleague as well, is that we don't get as many for critical libraries when it comes to .NET, as if most of them are really fine."

What is our primary use case?

We use it for checking our open source libraries for Java and .NET. I think they also have Python and R that some of my colleagues are using. And on the other side, of course, we also have the proxy to only download the open source libraries for our internet software development that are free of vulnerabilities and security issues.

It's deployed on-prem. We have internal servers.

How has it helped my organization?

Before we had Nexus Lifecycle, our software developers needed to clear each download from open source libraries. That meant they needed to scan the library on a separate PC, and then they would integrate it into their solutions, but it would be local and not available for the other developers. Now, we have an automatic process for downloading open source libraries, and this has removed a huge effort for all of our software developers. That is the big advantage, that we have an automated software development pipeline, which is something we did not have before. All of our developers are happy to have the solution.

Another benefit is connected to the fact that we also have applications we host for external users and those users can obtain a very good report about which external, open source libraries we are using, and their security status. 

What is most valuable?

We get email notifications if a certain library has a security issue, like Log4j. We are informed very early and we can check into it and act on it. This is the most valuable feature.

Also, the integrations into developer tooling are quite nice. I have the integration for Eclipse and for Visual Studio. Colleagues are using the Javascript IDE from JetBrains called WebStorm and there is an integration for that from Nexus Lifecycle as well. I have not heard about anything that is not working. It's also quite easy to integrate it. You just need to set up a project or an app and then you just make the connection in all the tools you're using.

We have also set up certain organizations for our company, within the Nexus tool, such as groups or departments. Within these groups, we have the different applications they're working with. This is a structure that Sonatype recommended we implement.

What needs improvement?

We got a lot of annotations for certain libraries when it comes to Java, but my feeling, and the feeling of a colleague as well, is that we don't get as many for critical libraries when it comes to .NET, as if most of them are really fine. It's true that we have more Java applications than .NET, but the number of our applications in the .NET area will increase. Again, it's just an impression, but it seems that the annotations for .NET are not the same as for Java. It would be good if Sonatype would check the status of annotations for .NET packages.

Again, I note that we are just starting to use an open source library from NuGet for the .NET area, while we have been using it for Java for several years and we are using more packages. For .NET, it's evolving. But my impression is that annotations are more focused on Java, and that in .NET we just do not see as many security issues as in Java. It could be fine, but maybe Sopatype started with Java and then expanded the portfolio to .NET and to other languages. This is something which could be further checked.

It could also be the fact that we have had Java applications for around 20 years, using open source libraries. When you go to the newer versions, you need to check and test. Whereas the .NET applications are evolving and are using open source libraries, and the .NET side is really new for our organization.

For how long have I used the solution?

I have been using Sonatype Nexus Lifecycle for around one year.

What do I think about the stability of the solution?

The stability is fine. I have not struggled with it. The solution is working, it's available. But this is something I can't tell you much about it because the server infrastructure and installation are done by our infrastructure team. I'm not sure if they are struggling with availability of the services.

What do I think about the scalability of the solution?

The scalability, currently, is fine, because the performance is fine. It was important to have a structure at the beginning, a way to set up different departments and groups. Now, if we have a new group that will use IQ Server or Nexus Lifecycle, we can just add it and it will be managed by the department. That makes it really good and scalable.

Nexus was a pilot, where some of my colleagues were using it but now it has spread to our whole organization and more colleagues are using it.

How are customer service and support?

An evaluation of Sonatype's technical support is more a question for our infrastructure team.

We did have some workshops with Sonatype about using Nexus Lifecycle and IQ Server, and they were quite nice. They made presentations and we could ask our questions. There is also the offer to have workshops about new topics, but I can't say much about the really technical questions.

However, from my point of view, the communication with Sonatype is really good. They take care of our requests and issues and answer them.

Which solution did I use previously and why did I switch?

This is the first solution we're using. We had a Nexus repository for several years, and we added Nexus Lifecycle on top in the last one to two years. Before, we would just manually download libraries and clear them by checking the download status. It was a manual task and now it's automated.

How was the initial setup?

I wasn't involved in the server installation. From my point of view, the deployment was quite easy. The servers were set up—a test instance and a production instance. In the test instance, we can play around and see if everything is working.

The IDE integration was quite easy because you just have to download the plugins and then set up the URL and the user and password. With Jenkins, we had to play around a little bit, but it was not that tricky. The integration is really nice because the plugins work quite well.

What was our ROI?

Because we have only had Lifecycle in production for around one year, it's too early to know if it has improved the time it takes us to release secure apps to market.

But it has definitely increased developer productivity. If you manually download a package, you're not sure if it is the right package because you cannot test it. But now, we can automatically download packages. It's much more effective and more productive for each software developer using it. I would estimate we have seen a 20 percent increase in productivity.

It's also helping our security because that is an aspect we did not check before. That is new for us and very valuable.

What other advice do I have?

We have internal help pages for new software developers with explanations about how they can get access to Nexus Lifecycle and how they can set up new organizations, new applications, and how the IDE integration is done.

Which deployment model are you using for this solution?

On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Buyer's Guide
Sonatype Lifecycle
March 2026
Learn what your peers think about Sonatype Lifecycle. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,837 professionals have used our research since 2012.
it_user1663581 - PeerSpot reviewer
Product Owner Secure Coding at a financial services firm with 10,001+ employees
Real User
Sep 27, 2021
Improves the overall hygiene of the source code and is helpful for code security and remediation of issues
Pros and Cons
  • "The quality or the profiles that you can set are most valuable. The remediation of issues that you can do and how the information is offered is also valuable."
  • "It improves the overall hygiene of the source code."
  • "The user interface needs to be improved. It is slow for us. We use Nexus IQ mostly via APIs. We don't use the interface that much, but when we use it, certain areas are just unresponsive or very slow to load. So, performance-wise, the UI is not fast enough for us, but we don't use it that much anyway."
  • "The user interface needs to be improved. It is slow for us."

What is our primary use case?

We use it in the pipeline. So, software development is done in a pipeline in automated steps. One of those steps is Quality Assurance for which we use, amongst others, Sonatype, and this is done automatically. Based upon the outcome of this scan, the software product can proceed to the next step, or its blocks need to be rebuilt with updates.

We are using Nexus IQ Server 114, and we're about to upgrade to 122.

How has it helped my organization?

It improves the overall hygiene of the source code. We have a lot of scans going on every day. They are in the thousands. If high critical vulnerabilities are detected, of course, that is good. It is already proving its value to us down the line because these vulnerabilities do not reach production.

Data quality helps us solve problems faster. We get the info on what's vulnerable, and most of the time, we get advice for an upgraded version that can be implemented right away. That's very valuable.

It brought open-source intelligence and policy enforcement across our SDLC. It is the tool that we use for open-source scanning and third-party dependency scanning. So, it brings a lot of value to us from that perspective. 50% of the code that we use is open-source. So, it is important to scan it for all kinds of vulnerabilities. It is very powerful, and it brings a lot of security to us. It can block undesirable open-source components from entering our development life-cycle.

It secures the software supply chain because it scans the packages that we get from our vendors, but we don't use it to secure our pipelines or steps in the build process. The build process itself is not secured by Nexus IQ.

It improves the overall health and security of the software supply chain. Anything that is detected can be blocked.

What is most valuable?

The quality or the profiles that you can set are most valuable. The remediation of issues that you can do and how the information is offered is also valuable.

Its integration with our tool landscape is very valuable. It is the interaction with account management and technical consultants.

The default policies and the policy engine are very good. Most of what we have is the default. It is also possible to create your own policies and custom rules, but we only do that for a handful of exceptions. We are very pleased with the default policies and settings. It provides us the flexibility we need because we can use it in our own customized settings. It is flexible enough for us to work with.

What needs improvement?

The user interface needs to be improved. It is slow for us. We use Nexus IQ mostly via APIs. We don't use the interface that much, but when we use it, certain areas are just unresponsive or very slow to load. So, performance-wise, the UI is not fast enough for us, but we don't use it that much anyway.

For how long have I used the solution?

I have been using this solution for about five years. It was being used prior to me engaging with it. So, it was already there.

What do I think about the stability of the solution?

It is very stable. There are no complaints. It is good in terms of availability.

What do I think about the scalability of the solution?

We don't need to scale it. At this moment, it is right-sized for us. So, I don't see any scalability going on right now. We do self-hosting on our own internal platform. The resources that are available are not scalable, so to say. They are right-sized.

We have between 750 and 1,250 users. The developers are the biggest part. We also have our operations support team that deals with upgrades, patch management, installation, and the Infra stuff. There are about 10 people. They don't only work on Nexus IQ, of course, but that's part of their job. There is also the security team, which is my team. It has about 10 people. We use Nexus IQ for all kinds of security review activities. We also have five metrics people who use these tools to gather metrics. They also use Nexus IQ.

How are customer service and technical support?

I have contacted them, and I would rate them a seven out of 10. Like every big company that you contact for support, you can get people who are well aware of your situation or less aware. Depending on who you get at the support desk, you might get immediate feedback or the right answer, or you might be going back and forth to get the right information. You don't have a single contact person for all your support, so the quality can change based on who you talk to.

Which solution did I use previously and why did I switch?

Our company didn't use any other solution.

How was the initial setup?

We have a team of about 10 people for upgrading the tool, patching the tool, migrating XIQ from our own platform to a public cloud platform, and creating system rules and policies.

What was our ROI?

For Nexus IQ, I have not seen any research that has been done for ROI. I am aware of other tools but not Nexus IQ.

What's my experience with pricing, setup cost, and licensing?

There are additional costs in commercial offerings for add-ons such as Nexus Container or IDE Advanced Toolkit. They come with additional fees or licenses. 

Which other solutions did I evaluate?

We always explore other tools. For every tool that we have, we constantly look at what's available. Every couple of years, we do an evaluation to see if there are replacements that are better suited to our needs. Our requirements might change over time. Our entire circumstance might also change from being on-premise to a fully-cloud company, where we might need to fulfill different types of needs. So, of course, we explore what are the best options for us. We stayed with Nexus IQ because they're a pleasant company to work with, and they offer a good product. 

What other advice do I have?

I would advise making sure that your developers are aware of why you are going to scan the source codes for vulnerabilities. An awareness training or awareness program on open-source vulnerabilities goes hand in hand with implementing such a tool because the tool is there to enforce policies, etc. If your community developer knows how to build secure software and how to look at open-source, it will drastically reduce the findings in the tool and create a healthy software landscape. So, awareness of secure coding principles should accompany the installation of such a tool.

Although we are very familiar with the concepts and the topics, we don't make use of integration with IDEs. We do not support automated pull requests yet. It would take time for us to implement, and there are other things that we are busy with. It would depend on how things proceed. We also don't use Nexus Container. 

It has not improved the time to release secure apps to market. It has also not increased developer productivity. In the short term, it decreases developer productivity because they have to fix stuff that otherwise would go undetected. So, productivity is hampered if you are confronted with vulnerabilities that you need to fix. Therefore, being more secure in the short term doesn't make you more productive. If you are aware of why you need to look at certain things, it can bring productivity in the long term.

The biggest lesson that we have learned from using Nexus IQ is that with open-source, so many things can go wrong. Most of the vulnerabilities that you have in your software are due to the bad usage of open-source components.

I would rate this solution an eight out of 10.

Which deployment model are you using for this solution?

On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
reviewer2329698 - PeerSpot reviewer
Security Consultant at a financial services firm with 1,001-5,000 employees
Consultant
Jan 19, 2024
Offers excellent technical support but lacks integration with deployment tools
Pros and Cons
  • "The most valuable function of Sonatype Lifecycle is its code analysis capability, especially within the specific sub-product focusing on static analysis."
  • "There is room for improvement in the code analysis aspect of Sonatype Lifecycle, specifically in the area of deployment security."

What is our primary use case?

Our primary use cases involve monitoring and securing our software supply chain. We use it to proactively identify and block any potentially insecure components from being downloaded, ensuring our firewall remains robust. Additionally, we use the platform to analyze both deployed and developing code throughout the development lifecycle.

What is most valuable?

The most valuable function of Sonatype Lifecycle is its code analysis capability, especially within the specific sub-product focusing on static analysis. This feature, particularly tailored for Java code, has been crucial in identifying and addressing vulnerabilities in our software.

What needs improvement?

There is room for improvement in the code analysis aspect of Sonatype Lifecycle, specifically in the area of deployment security. While the product effectively scans components and provides threat intelligence, it requires additional manual effort to ensure that the configuration of the product during deployment is done securely.

When it comes to new features, I would find it incredibly beneficial if Sonatype Lifecycle could integrate with deployment tools, enabling real-time identification of any vulnerabilities as developers push code to production.

For how long have I used the solution?


What do I think about the stability of the solution?

It is a quite stable solution. I would rate the stability as a seven out of ten.

What do I think about the scalability of the solution?

I would rate the scalability of the solution as a ten out of ten. It is suitable for any business size.

How are customer service and support?

I would rate Sonatype's technical support a solid ten out of ten. They are highly engaged, conduct weekly meetings to discuss the product roadmap and competition, and even bring in engineers to provide hands-on guidance on using the product.

How would you rate customer service and support?

Positive

How was the initial setup?

Setting up Sonatype Lifecycle can be complex, possibly influenced by deployment choices. While I haven't explored the latest architecture, there is potential for a simpler SaaS deployment. It is available both as an on-premises and cloud-based hybrid solution to suit different preferences and needs.

What's my experience with pricing, setup cost, and licensing?

I would rate the affordability of the solution as an eight out of ten.

What other advice do I have?

Overall, I would rate Sonatype Lifecycle as a six out of ten. It is a solid product with some room for improvement.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Hisham Shoukathali - PeerSpot reviewer
Automation Technical Lead at a tech vendor with 10,001+ employees
Real User
Aug 26, 2022
Useful duplicate code discovery, effective vulnerability scanning, and reliable
Pros and Cons
  • "The most valuable features of the Sonatype Nexus Lifecycle are the evaluation of the unit test coverage, vulnerability scanning, duplicate code lines, code smells, and unnecessary loops."
  • "The most valuable features of the Sonatype Nexus Lifecycle are the evaluation of the unit test coverage, vulnerability scanning, duplicate code lines, code smells, and unnecessary loops."
  • "Sonatype Nexus Lifecycle can improve by having a feature to automatically detect vulnerabilities. Additionally, if it could automatically push the dependencies or create notifications it would be beneficial."
  • "Sonatype Nexus Lifecycle can improve by having a feature to automatically detect vulnerabilities."

What is our primary use case?

Sonatype Nexus Lifecycle is mainly used for checking vulnerabilities. For example, the unit test coverage and code quality, including vulnerability code smells.

What is most valuable?

The most valuable features of the Sonatype Nexus Lifecycle are the evaluation of the unit test coverage, vulnerability scanning, duplicate code lines, code smells, and unnecessary loops. 

What needs improvement?

Sonatype Nexus Lifecycle can improve by having a feature to automatically detect vulnerabilities. Additionally, if it could automatically push the dependencies or create notifications it would be beneficial.

For how long have I used the solution?

I have been using Sonatype Nexus Lifecycle for approximately three years.

What do I think about the stability of the solution?

Sonatype Nexus Lifecycle is a stable solution.

What do I think about the scalability of the solution?

The scalability of the Sonatype Nexus Lifecycle is good. We have not had any issues.

We have 2,000 engineering people using this solution, such as developers, SRE, and QE.

What about the implementation team?

The amount of maintenance Sonatype Nexus Lifecycle needs depends on the competency of the people doing it. It is not very complex to do but it is difficult to find competent work in the area. If the person is competent then the maintenance is not a problem and is straightforward.

What other advice do I have?

I rate Sonatype Nexus Lifecycle an eight out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Hisham Shoukathali - PeerSpot reviewer
Automation Technical Lead at a tech vendor with 10,001+ employees
Real User
Aug 26, 2022
Beneficial security, reliable, and scalable
Pros and Cons
  • "The most valuable features of the Sonatype Nexus Container are the safe repository it provides, we do not have a lot of risk from security flaws. Security scanning and other security feature are helpful to reduce vulnerabilities. For example, if I'm receiving something from a public repository, such as Maven Deposit, I don't know if it is will open me up to vulnerabilities, but if you have the Sonatype Nexus Container, it's safer in terms of security."
  • "The most valuable features of the Sonatype Nexus Container are the safe repository it provides, we do not have a lot of risk from security flaws."
  • "Sonatype Nexus Container you could improve the search functionality. Whenever I try to search a specific version of the library from the Sonatype Nexus Container console, I don't think the first referral that the user is receiving is very informative. They cannot see which one is the most updated library inside the Sonatype Nexus Container when I'm searching for a specific library."
  • "Sonatype Nexus Container could improve the search functionality. Whenever I try to search a specific version of the library from the Sonatype Nexus Container console, I don't think the first referral that the user is receiving is very informative."

What is our primary use case?

Sonatype Nexus Container is used mainly for storing your dependencies and the libraries that the applications are using. Additionally, it is used when the applications are downloading the dependencies from the containers.

What is most valuable?

The most valuable features of the Sonatype Nexus Container are the safe repository it provides, we do not have a lot of risk from security flaws. Security scanning and other security feature are helpful to reduce vulnerabilities. For example, if I'm receiving something from a public repository, such as Maven Deposit, I don't know if it is will open me up to vulnerabilities, but if you have the Sonatype Nexus Container, it's safer in terms of security.

What needs improvement?

Sonatype Nexus Container you could improve the search functionality. Whenever I try to search a specific version of the library from the Sonatype Nexus Container console, I don't think the first referral that the user is receiving is very informative. They cannot see which one is the most updated library inside the Sonatype Nexus Container when I'm searching for a specific library.

For how long have I used the solution?

I have used Sonatype Nexus Container within the past 12 months.

What do I think about the stability of the solution?

Sonatype Nexus Container is stable in my experience.

What do I think about the scalability of the solution?

The scalability of Sonatype Nexus Container is very good.

What other advice do I have?

I rate Sonatype Nexus Container an eight out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1418712 - PeerSpot reviewer
Lead Member Of Technical Staff at a tech vendor with 10,001+ employees
Real User
Jul 22, 2022
Lacks an SaaS version and remediation accuracy is not good; good vulnerability detection accuracy
Pros and Cons
  • "Vulnerability detection accuracy is good."
  • "The most valuable feature for me is vulnerability detection accuracy."
  • "The solution is not an SaaS product."
  • "The main drawback of this product is that it's not an SaaS solution and they really need to build a complete SaaS product."

What is our primary use case?

We use this product for scanning containers and binary artifacts, and to scan for vulnerabilities. It's provides a software composition analysis mainly for application security. I'm the lead member of technical staff and we are customers of Sonatype. 

What is most valuable?

The most valuable feature for me is vulnerability detection accuracy.

What needs improvement?

The main drawback of this product is that it's not an SaaS solution and they really need to build a complete SaaS product. Although the vulnerability detection accuracy is good, the solution is quite weak when it comes to remediation accuracy which is not good. They are currently sorting by component versions and the sorting algorithm is not correct, it requires a proper tool. 

For how long have I used the solution?

I've been using this solution for four years. 

What do I think about the scalability of the solution?

We are unable to scale sufficiently because everything needs to be installed on our local premises. This is really a solution for small to medium-sized organizations. Every new server requires the installation of a new database. We currently have around 400 users doing a variety of jobs and scalability is the biggest issue we have.

How are customer service and support?

The customer support could be improved. Their response time is quite slow and it can take a long time to deploy new features. 

How would you rate customer service and support?

Neutral

How was the initial setup?

The initial setup is too complex because it's not a cloud service.

Which other solutions did I evaluate?

Compared to other solutions I've seen, the main issue with Lifecycle is that it doesn't have an on-cloud option.

What other advice do I have?

I can recommend this solution but they need to do some work at their end, particularly with regard to cluster maintenance, scalability, and the fact that it's only available on-prem.

I rate this solution five out of 10. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1224042 - PeerSpot reviewer
Technical Manager at a financial services firm with 1,001-5,000 employees
Real User
Apr 1, 2022
Their customer service is more responsive and hands-on than competitors
Pros and Cons
  • "Sonatype support is quite responsive. When we needed something, we could reach out and set up a meeting. They provide the best support possible."
  • "Sonatype support is quite responsive; when we needed something, we could reach out and set up a meeting, and they provide the best support possible."
  • "The team managing Nexus Lifecycle reported that their internal libraries were not being identified, so they have asked Sonatype's technical team to include that in the upcoming version."
  • "The team managing Nexus Lifecycle reported that their internal libraries were not being identified, so they have asked Sonatype's technical team to include that in the upcoming version."

What is our primary use case?

We use Nexus Lifecycle to check our third-party libraries for vulnerabilities. 
There are also different application teams that use Nexus Lifecycle to configure our product. I'm one of those product users, so I can only talk about it from the perspective of my product. 

What needs improvement?

The team managing Nexus Lifecycle reported that their internal libraries were not being identified, so they have asked Sonatype's technical team to include that in the upcoming version.

For how long have I used the solution?

We have been using Nexus Lifecycle for about a year and a half.

What do I think about the stability of the solution?

Nexus Lifecycle is stable. 

What do I think about the scalability of the solution?

Nexus Lifecycle scales to the level we need. It's working fine.

How are customer service and support?

Sonatype support is quite responsive. When we needed something, we could reach out and set up a meeting. They provide the best support possible.

How was the initial setup?

Setting up Nexus Lifecycle is simple.

Which other solutions did I evaluate?

We evaluated Veracode, and we evaluated Black Duck, as well. The marketing team from Sonatype was more responsive and followed up on the progress during the proof of concept, so that was one reason we chose Lifecycle, but the features are almost exactly the same across products.

What other advice do I have?

I rate Nexus Lifecycle eight out of 10. 

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Sonatype Lifecycle Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2026
Buyer's Guide
Download our free Sonatype Lifecycle Report and get advice and tips from experienced pros sharing their opinions.