Try our new research platform with insights from 80,000+ expert users

Prevasio vs Snyk comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 9, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Prevasio
Ranking in Cloud Security Posture Management (CSPM)
40th
Average Rating
8.8
Reviews Sentiment
7.2
Number of Reviews
10
Ranking in other categories
Container Monitoring (10th), Cloud-Native Application Protection Platforms (CNAPP) (27th)
Snyk
Ranking in Cloud Security Posture Management (CSPM)
15th
Average Rating
8.0
Reviews Sentiment
7.3
Number of Reviews
49
Ranking in other categories
Application Performance Monitoring (APM) and Observability (18th), Application Security Tools (6th), Static Application Security Testing (SAST) (8th), GRC (5th), Cloud Management (14th), Vulnerability Management (14th), Container Security (6th), Software Composition Analysis (SCA) (1st), Software Development Analytics (2nd), DevSecOps (2nd), Application Security Posture Management (ASPM) (2nd)
 

Mindshare comparison

As of October 2025, in the Cloud Security Posture Management (CSPM) category, the mindshare of Prevasio is 0.2%, up from 0.1% compared to the previous year. The mindshare of Snyk is 3.2%, down from 3.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Cloud Security Posture Management (CSPM) Market Share Distribution
ProductMarket Share (%)
Snyk3.2%
Prevasio0.2%
Other96.6%
Cloud Security Posture Management (CSPM)
 

Featured Reviews

Juan Tolosa - PeerSpot reviewer
Automation helps reduce human error, and platform suggests the best configuration to apply
The optimizations are the most useful aspect because most customers have a very unmanaged network with a lot of rules. We use a lot of the optimizations in our reports for improving firewall rules. It also provides our clients with full visibility into the risks involved in firewall change requests and that is very important because our clients are often banks that must be in compliance with PCI. And when it comes to preparing for audits and ensuring that firewalls are in compliance, the solution is very useful. We are able to do it very fast. We can do a lot of iterations and get better policy rules all the time. Although not many of our clients are migrating to the cloud, for those that are, AlgoSec is useful. The part of the process that takes a long time is the human part. We must have gap committees and approvals that take a long time. But the integration itself is very easy with AlgoSec. We have all the information in our hands about the traffic we must enable on the cloud and for making new rules. All that is automated.
meetharoon - PeerSpot reviewer
Affordable tool boosts code scanning efficiency but faces integration hurdles
I lead a code security practice for our organization. We integrated Snyk into our GitHub, using CLI to automatically scan codebases and identify issues. We are a large organization with three independent entities, consolidating Snyk across all entities.  We also provide access through numerous…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The workflow and the fact that I can follow up on a request that I've created and clearly see the status it is in are the most valuable features of this solution. When I need things to move on, for example, if the security guys didn't look at the request or the implementation is not going as it should, then I can contact people. There is a mechanism in there that clearly indicates the service level agreement we have for implementation. We can see if it is being attained."
"Because we get about 60 to 70 rules to deploy a week during the firewall maintenance window, we might create some duplicate rules or open duplicate ports. AlgoSec has become very helpful whenever we need to find out the nodes or subnets that have already been created, then we don't need to create the duplicate subnet of that particular IP address."
"The optimizations are the most useful aspect because most customers have a very unmanaged network with a lot of rules. We use a lot of the optimizations in our reports for improving firewall rules."
"The most valuable feature is the automation that can be accomplished by using scripts. If we didn't have AlgoSec, I would have to do everything manually."
"The firewall policy summarization is the most valuable feature. It helps us to cross-check the firewall ruleset. That's the main purpose of it. And of course, it monitors changes of the firewall policy. It provides full visibility into the risk involved in firewall change requests. It helps us to check for any integrity issues and conflicts with other rulesets, and of course the compliance."
"We have used the solution to implement and manage microsegmentation initiatives. That is the whole point of modeling towards, "Hey, how will this work for a specific situation in the end?" I think it's a great solution because a lot of companies are not just going to the cloud, but microsegmentation and service-delivered products. So, I feel like it is very capable and comparatively better than its peers, if not equal."
"AlgoSec has good tools to manage policies and devices. Many administrators like how it helps you monitor and clean up the policy for the on-premise firewall."
"AlgoBot is a Slack chatbot that they've designed to help people identify if the firewalls are going to allow or block specific network traffic. We leveraged this to allow our staff to check themselves if the firewalls are going to be blocking traffic or not. That saves us logging into the firewalls and running the query off the host. We give them the power to use it and it saves us time."
"It's very easy for developers to use. Onboarding was an easy process for all of the developers within the company. After a quick, half-an-hour to an hour session, they were fully using it on their own. It's very straightforward. Usability is definitely a 10 out of 10."
"Snyk allows for scaling across large organizations, accommodating tens of thousands of applications and over 60,000 repositories, making it suitable for wide-scale deployment."
"It has improved our vulnerability rating and reduced our vulnerabilities through the tool during the time that we've had it. It's definitely made us more aware, as we have removed scoping for existing vulnerabilities and platforms since we rolled it out up until now."
"A main feature of Snyk is that when you go with SCA, you do get properly done security composition, also from the licensing and open-source parameters perspective. A lot of companies often use open-source libraries or frameworks in their code, which is a big security concern. Snyk deals with all the things and provides you with a proper report about whether any open-source code or framework that you are using is vulnerable. In that way, Snyk is very good as compared to other tools."
"The CLI feature is quite useful because it gives us a lot of flexibility in what we want to do. If you use the UI, all the information is there and you can see what Snyk is showing you, but there is nothing else that you can change. However, when you use the CLI, then you can use commands and can get the output or response back from Snyk. You can also take advantage of that output in a different way. For the same reason, we have been using the CLI for the hard gate in the pipeline: Obtain a particular CDSS score for vulnerability. Based on that information, we can then decide if we want to block or allow the build. We have more flexibility if we use the CLI."
"The product's most valuable features are an open-source platform, remote functionality, and good pricing."
"Snyk is a developer-friendly product."
"The code scans on the source code itself were valuable."
 

Cons

"We work with multiple security vendors. It's rather difficult to integrate the vendors. AlgoSec is a platform that hasn't really been developed as much as we would like to just because of its complexity to set up. If it was easy to set up and easy to get integrations with other companies, then we would be doing it. But the thought is that we are relatively stretched thin in our team as it is and the complexity of configuring AlgoSec doesn't make it any easier."
"Integration with Oracle on the cloud is not supported. I would also like to see integrations with network devices in Layer 2."
"When we send multiple requests across at once, sometimes it causes errors and FireFlow gets stuck. In cases like this, we have to go back in and fix it."
"In the new version H32, there are many, many bugs."
"The API integration could potentially improve. I didn't get a chance to look and see how well this solution can integrate with ServiceNow or our GRC environment."
"The analysis part can be improved when I make a flow request. There should be a clear analysis of which metric part needs to be opened and which firewalls will be opened. It should give you a bit more graphical visibility about these."
"Now that we've moved to the VM it is more stable and independent of hardware."
"The technical support response time is low. This might be due to the coronavirus pandemic situation, but I am not getting full support when working with them."
"The tool's initial use is complex."
"We have to integrate with their database, which means we need to send our entire code to them to scan, and they send us the report. A company working in the financial domain usually won't like to share its code or any information outside its network with any third-party provider."
"The product is very expensive."
"I think Snyk should add more of a vulnerability protection feature in the tool since it is an area where it lacks."
"It lists projects. So, if you have a number of microservices in an enterprise, then you could have pages of findings. Developers will then spend zero time going through the pages of reports to figure out, "Is there something I need to fix?" While it may make sense to list all the projects and issues in these very long lists for completeness, Snyk could do a better job of bubbling up and grouping items, e.g., a higher level dashboard that draws attention to things that are new, the highest priority things, or things trending in the wrong direction. That would make it a lot easier. They don't quite have that yet in container security."
"For the areas that they're new in, it's very early stages for them. For example, their expertise is in looking at third-party components and packages, which is their bread-and-butter and what they've been doing for ages, but for newer features such as static analysis I don't think they've got compatibility for all the languages and frameworks yet."
"I would like to give further ability to grouping code repositories, in such a way that you could group them by the teams that own them, then produce alerting to those teams. The way that we are seeing it right now, the alerting only goes to a couple of places. I wish we could configure the code to go to different places."
"The solution's reporting and storage could be improved."
 

Pricing and Cost Advice

"For the South American market, the prices are very high."
"I heard that the licensing was around $100,000 a year."
"It's inexpensive and easy to license. It comes in standard package sizing, which is straightforward. This information is publicly found on their website."
"The pricing is acceptable, especially for enterprises. I don't think it's too much of a concern for our customers. Something like $99 per user is reasonable when the stakes are high."
"The license model is based on the number of contributing developers. Snyk is expensive, for a startup company will most likely use the community edition, while larger companies will buy the licensed version. The price of Snyk is more than other SLA tools."
"The solution is less expensive than Black Duck."
"The pricing is reasonable."
"Snyk is an expensive solution."
"You can get a good deal with Snyk for pricing. It's a little expensive, but it is worth it."
"Their licensing model is fairly robust and scalable for our needs. I believe we have reached a reasonable agreement on the licensing to enable hundreds of developers to participate in this product offering. The solution is very tailored towards developers and its licensing model works well for us."
report
Use our free recommendation engine to learn which Cloud Security Posture Management (CSPM) solutions are best for your needs.
869,566 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Financial Services Firm
15%
Computer Software Company
13%
Manufacturing Company
9%
Insurance Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business3
Midsize Enterprise1
Large Enterprise6
By reviewers
Company SizeCount
Small Business20
Midsize Enterprise9
Large Enterprise21
 

Questions from the Community

Ask a question
Earn 20 points
How does Snyk compare with SonarQube?
Snyk does a great job identifying and reducing vulnerabilities. This solution is fully automated and monitors 24/7 to find any issues reported on the internet. It will store dependencies that you a...
What do you like most about Snyk?
The most effective feature in securing project dependencies stems from its ability to highlight security vulnerabilities.
What needs improvement with Snyk?
There are a lot of false positives that need to be identified and separated. The inclusion of AI to remove false positives would be beneficial. So far, I've not seen any AI features to enhance vuln...
 

Comparisons

No data available
 

Also Known As

No data available
Fugue, Snyk AppRisk
 

Overview

 

Sample Customers

Information Not Available
StartApp, Segment, Skyscanner, DigitalOcean, Comic Relief
Find out what your peers are saying about Prevasio vs. Snyk and other solutions. Updated: September 2025.
869,566 professionals have used our research since 2012.