

Snyk and SentinelOne Singularity Identity are key competitors in the security solutions category. SentinelOne seems to have the upper hand due to its advanced AI-focused threat detection and dynamic behavioral detection tools.
Features: Snyk is praised for its simplicity, self-service model, and integration capabilities that enhance developer productivity, particularly with platforms like Slack. It provides precise integration with development tools and a comprehensive vulnerability database. SentinelOne Singularity Identity excels in its dynamic behavior-based detection, providing an effective incident response with a unified threat view. Its strength lies in XDR capabilities and AI-focused threat detection, making it suitable for real-time attack management.
Room for Improvement: Snyk could expand its security scanning capabilities by incorporating SAST and DAST to provide a more comprehensive security platform. Improved language support and dashboard clarity, along with enhanced auto-fix tools, have been suggested. SentinelOne Singularity Identity might benefit from more precise policy controls in endpoint management and improved reporting tools. Adopting a more transparent pricing model and better web filtering would also add value.
Ease of Deployment and Customer Service: Snyk offers flexibility across private, public, hybrid clouds, and on-premises setups and is praised for proactive and engaging technical support. In contrast, SentinelOne is primarily focused on public cloud deployments, also supported by strong partnerships. While its technical support is highly rated for quick resolutions, some users note the need for more training and user engagement improvements.
Pricing and ROI: Snyk's pricing is perceived as premium, considered worthwhile for its comprehensive support and integration capabilities, although some cost elements like SSO integration are noted. Users find it challenging to assess direct ROI but recognize its role in preventing breaches. SentinelOne Singularity Identity is seen as cost-effective, although some users are wary of annual pricing adjustments. The ROI for some is evident quickly, while others require longer to assess value, balancing cost versus benefits of both solutions.
I can see that Snyk saves the costs of hiring security developers for vulnerability scanning and security checks, as that responsibility is now managed by Snyk.
They have been responsive to our needs as integrators and those of the client.
Our long-standing association has ensured smooth communication, resulting in favorable support experiences and satisfactory issue resolution.
Their response time aligns with their SLA commitments.
We could understand the implementation of the product and other features without the need for human interaction.
Snyk allows for scaling across large organizations, accommodating tens of thousands of applications and over 60,000 repositories.
Snyk is very scalable and can handle my organization's growth and changing needs.
Till now, we did not face any scaling issues and I did not hear of any.
There is a clear roadmap for improvements, including enhancing capabilities with AI and seamless functionality in an MSP model for deeper visibility across multiple agencies.
It lacks the ability to select branches on its Web UI, forcing users to rely on CLI or CI/CD for that functionality.
The inclusion of AI to remove false positives would be beneficial.
As we are moving toward GenAI, we expect Snyk to leverage AI features to improve code scanning findings.
Snyk is recognized as the cheapest option we have evaluated.
After negotiations, we received a special package with a good price point.
Snyk is less expensive.
With visibility into endpoint telemetry, SentinelOne does provide useful information to find threat actors and empowers those who are in the business of threat hunting.
Our integration of Snyk into GitHub allows us to automatically scan codebases and identify issues, which has improved efficiency.
Snyk helps detect vulnerabilities before code moves to production, allowing for integration with DevOps and providing a shift-left advantage by identifying and fixing bugs before deployment.
Snyk has positively impacted my organization by improving the security posture across all software repositories, resulting in fewer critical vulnerabilities, more confidence in overall product security, and faster security compliance for project clients.
| Product | Mindshare (%) |
|---|---|
| Snyk | 2.3% |
| SentinelOne Singularity Identity | 0.9% |
| Other | 96.8% |


| Company Size | Count |
|---|---|
| Small Business | 4 |
| Midsize Enterprise | 5 |
| Large Enterprise | 13 |
| Company Size | Count |
|---|---|
| Small Business | 21 |
| Midsize Enterprise | 9 |
| Large Enterprise | 22 |
Singularity Identity, a component of the Singularity platform, provides threat detection & response (ITDR) capabilities to defend Active Directory and domain-joined endpoints in real-time from adversaries aiming to gain persistent, elevated privilege and move covertly. Singularity Identity provides actionable, high-fidelity insight as attacks emerge from managed and unmanaged devices. It detects identity misuse and reconnaissance activity happening within endpoint processes targeting critical domain servers, service accounts, local credentials, local data, network data, and cloud data. On-agent cloaking and deception techniques slow the adversary down while providing situational awareness and halting adversarial attempts at lateral movement. Singularity Identity helps you detect and respond to identity-based attacks, providing early warning while misdirecting them away from production assets.
Singularity Identity’s primary use case is to protect credential data and disrupt identity-based attacks. The most valuable function of Singularity Identity is its ability to misdirect attackers by providing deceptive data to identity-based recon attacks. Additionally, it can hide and deny access to locally stored credentials or identity data on Active Directory domain controllers.
Singularity Identity also provides rapid detection and respond to identity attacks, capturing attack activity and feeding it directly to the Singularity platform’s Security DataLake for enterprise-wide analysis and response.
By implementing Singularity Identity, organizations benefit from enhanced security, reduced credential-related risks, and improved user productivity. It detects and responds to identity-based attacks, ensuring only authorized individuals can access critical identity data. With its cloaking capabilities to hide identity stored locally on endpoints or in the identity infrastructure and it’s ability to provide decoy results to identity-based attacks, organizations can effectively secure their sensitive or privileged identities, resulting in improved overall identity security.
Snyk excels in integrating security within the development lifecycle, providing teams with an AI Trust Platform that combines speed with security efficiency, ensuring robust AI application development.
Snyk empowers developers with AI-ready engines offering broad coverage, accuracy, and speed essential for modern development. With AI-powered visibility and security, Snyk allows proactive threat prevention and swift threat remediation. The platform supports shifts toward LLM engineering and AI code analysis, enhancing security and development productivity. Snyk collaborates with GenAI coding assistants for improved productivity and AI application threat management. Platform extensibility supports evolving standards with API access and native integrations, ensuring comprehensive and seamless security embedding in development tools.
What are Snyk's standout features?
What benefits can users expect?
Industries leverage Snyk for security in CI/CD pipelines by automating checks for dependency vulnerabilities and managing open-source licenses. Its Docker and Kubernetes scanning capabilities enhance container security, supporting a proactive security approach. Integrations with platforms like GitHub and Azure DevOps optimize implementation across diverse software environments.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.