We performed a comparison between Red Hat Advanced Cluster Security for Kubernetes and Snyk based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Red Hat Advanced Cluster Security for Kubernetes is highly regarded for its exceptional resource-sharing and segmentation capabilities. Snyk earns praise for its developer-friendly approach and range of scanning features. Snyk also stands out for its software composition analysis and compatibility with containers. Red Hat Advanced Cluster Security reviewers stressed a need for better documentation. They would also like the solution to incorporate features like zero trust and access control. Users said Snyk should work on improving compatibility and enhancing their vulnerability database.
Service and Support: Red Hat has been praised for its efficient and effective technical support. Some Snyk customers said support could better organize and prioritize requests.
Ease of Deployment: Red Hat Advanced Cluster Security for Kubernetes requires users to create various customer resource files and deploy an image as a container, which is a time-consuming process that can take days or weeks to configure. Snyk's setup is simple and uncomplicated, with users reporting positive experiences and excellent support from the vendor team.
Pricing: Advanced Cluster Security for Kubernetes is moderately priced, and Red Hat offers affordable bundled pricing options. Snyk is considered expensive relative to other solutions. Users say it is better suited for larger companies or enterprises that can afford it.
ROI: Red Hat Advanced Cluster Security for Kubernetes provides extensive security features, while Snyk emphasizes cost-effective vulnerability identification.
Comparison Results: Red Hat Advanced Cluster Security for Kubernetes is preferred over Snyk. Users appreciate its comprehensive setup process, scalability, and ability to run multiple containers. It also offers a hybrid cloud approach and seamless integration with other solutions. Some users encountered difficulties integrating Snyk with existing tools.
"It is easy to install and manage."
"The benefit of working with the solution is the fact that it's very straightforward...It is a perfectly stable product since the details are very accurate."
"I am impressed with the tool's visibility."
"Segmentation is the most powerful feature."
"Scalability-wise, I rate the solution a nine out of ten."
"The most valuable feature is the ability to share resources."
"The most valuable feature of the solution is its monitoring feature."
"One of the most valuable features I found was the ability of this solution to map the network and show you the communication between your containers and your different nodes."
More Red Hat Advanced Cluster Security for Kubernetes Pros →
"Snyk is a good and scalable tool."
"The most valuable features include enriched information around the vulnerabilities for better triaging, in terms of the vulnerability layer origin and vulnerability tree."
"The advantage of Snyk is that Snyk automatically creates a pull request for all the findings that match or are classified according to the policy that we create. So, once we review the PR within Snyk and we approve the PR, Snyk auto-fixes the issue, which is quite interesting and which isn't there in any other product out there. So, Snyk is a step ahead in this particular area."
"Our customers find container scans most valuable. They are always talking about it."
"We're loving some of the Kubernetes integration as well. That's really quite cool. It's still in the early days of our use of it, but it looks really exciting. In the Kubernetes world, it's very good at reporting on the areas around the configuration of your platform, rather than the things that you've pulled in. There's some good advice there that allows you to prioritize whether something is important or just worrying. That's very helpful."
"Snyk categorizes the level of vulnerability into high, medium, and low, which helps organizations prioritize which issues to tackle first."
"The most valuable features of Snyk are vulnerability scanning and automation. The automation the solution brings around vulnerability scanning is useful."
"The most effective feature in securing project dependencies stems from its ability to highlight security vulnerabilities."
"The documentation about Red Hat Advanced Cluster Security available online is very limited... So it's very limited to the documentation."
"They're trying to convert it to the platform as a source. They are moving in the direction of Cloud Foundry so it can be easier for a developer to deploy it."
"The solution lacks features when compared to some of the competitors such as Prisma Cloud by Palo Alto Networks and has room for improvement."
"The tool's command line and configuration are hard for us to understand and make deployment complex. It should also include zero trust, access control features and database connectivity."
"The solution's visibility and vulnerability prevention should be improved."
"The testing process could be improved."
"Red Hat is somewhat expensive."
"The initial setup is pretty complex. There's a learning curve, and its cost varies across different environments. It's difficult."
More Red Hat Advanced Cluster Security for Kubernetes Cons →
"Scalability has some issues because we have a lot of code and its use is mandatory. Therefore, it can be slow at times, especially because there are a lot of projects and reporting. Some UI improvements could help with this."
"The documentation sometimes is not relevant. It does not cover the latest updates, scanning, and configurations. The documentation for some things is wrong and does not cover some configuration scannings for the multiple project settings."
"Basically the licensing costs are a little bit expensive."
"The reporting mechanism of Snyk could improve. The reporting mechanism is available only on the higher level of license. Adjusting the policy of the current setup of recording this report is something that can improve. For instance, if you have a certain license, you receive a rating, and the rating of this license remains the same for any use case. No matter if you are using it internally or using it externally, you cannot make the adjustment to your use case. It will always alert as a risky license. The areas of licenses in the reporting and adjustments can be improve"
"Could include other types of security scanning and statistical analysis"
"A feature we would like to see is the ability to archive and store historical data, without actually deleting it. It's a problem because it throws my numbers off. When I'm looking at the dashboard's current vulnerabilities, it's not accurate."
"Because Snyk has so many integrations and so many things it can do, it's hard to really understand all of them and to get that information to each team that needs it... If there were more self-service, perhaps tutorials or overviews for new teams or developers, so that they could click through and see things themselves, that would help."
"For the areas that they're new in, it's very early stages for them. For example, their expertise is in looking at third-party components and packages, which is their bread-and-butter and what they've been doing for ages, but for newer features such as static analysis I don't think they've got compatibility for all the languages and frameworks yet."
More Red Hat Advanced Cluster Security for Kubernetes Pricing and Cost Advice →
Red Hat Advanced Cluster Security for Kubernetes is ranked 16th in Container Security with 10 reviews while Snyk is ranked 5th in Container Security with 41 reviews. Red Hat Advanced Cluster Security for Kubernetes is rated 8.4, while Snyk is rated 8.2. The top reviewer of Red Hat Advanced Cluster Security for Kubernetes writes "Provides network mapping feature for visualizing container communication but complex setup ". On the other hand, the top reviewer of Snyk writes "Performs software composition analysis (SCA) similar to other expensive tools". Red Hat Advanced Cluster Security for Kubernetes is most compared with Prisma Cloud by Palo Alto Networks, Aqua Cloud Security Platform, SUSE NeuVector, CrowdStrike Falcon Cloud Security and Tenable.io Container Security, whereas Snyk is most compared with SonarQube, Black Duck, Fortify Static Code Analyzer, Veracode and GitHub Advanced Security. See our Red Hat Advanced Cluster Security for Kubernetes vs. Snyk report.
See our list of best Container Security vendors.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.