Skip to Navigation
Skip to Navigation
G2 - Business Software Reviews
Search software
Software
Expand/Collapse Software
AI Agents
Services
Expand/Collapse Services
G2 for Business
Expand/Collapse vendor
For Marketers
Enhance your G2 profile and reach in-market buyers
For Sales
Find, engage, and convert in-market buyers
For Services
Reach companies that need you, when they’re ready to buy
For Investments
Gain access to real-time software trends
For Developers
Use our Developer Portal to test API data
Deals
Leave a Review
Join or Log In
Search
Search Software and Services
Expand/Collapse
Home
...
Cloud Workload Protection Platforms
rezilion
Snyk
rezilion-vs-Snyk
Compare Snyk and rezilion
Social Share Options
All Categories
Software Composition Analysis
Software Bill of Materials (SBOM)
All Reviewers
Small-Business Reviewers
Mid-Market Reviewers
Large Enterprise Reviewers
Save to Research Board
Featured Products
Sponsored
Intruder
4.8/5
(206)
Visit Website
Sponsored
FossID
Visit Website
Sponsored
Aikido Security
4.6/5
(139)
Visit Website
At a Glance
Pricing
Ratings
Features
Reviews
Alternatives
Discussions
Add Product
Snyk
(127)
4.5
out of
5
Snyk
By
Snyk
rezilion
(11)
4.4
out of
5
rezilion
By
rezilion
At a Glance
Star Rating
(127)
4.5
out of
5
(11)
4.4
out of
5
Market Segments
Mid-Market (43.2% of reviews)
Information
Mid-Market (45.5% of reviews)
Information
Pros & Cons
Vulnerability Detection
(3)
Vulnerability Identification
(3)
False Positives
(2)
Poor Interface Design
(2)
Not enough data
Entry-Level Pricing
Free
No pricing available
Snyk
Star Rating
(127)
4.5
out of
5
Market Segments
Mid-Market (43.2% of reviews)
Information
Pros & Cons
Vulnerability Detection
(3)
Vulnerability Identification
(3)
False Positives
(2)
Poor Interface Design
(2)
Entry-Level Pricing
Free
Browse all 3 pricing plans
rezilion
Star Rating
(11)
4.4
out of
5
Market Segments
Mid-Market (45.5% of reviews)
Information
Pros & Cons
Not enough data
Entry-Level Pricing
No pricing available
Learn more about rezilion
Snyk vs rezilion
Reviewers felt that rezilion meets the needs of their business better than Snyk.
When comparing quality of ongoing product support, reviewers felt that rezilion is the preferred option.
For feature updates and roadmaps, our reviewers preferred the direction of rezilion over Snyk.
Pricing
Entry-Level Pricing
Snyk
FREE - Limited Tests, Unlimited Developers
Free
For individual developers and small teams looking to secure while they build. Unlimited Developers.
200 Open Source tests per month
100 Container tests per month
300 IaC tests per month
Browse all 3 pricing plans
rezilion
No pricing available
Free Trial
Snyk
No trial information available
rezilion
No trial information available
Ratings
Meets Requirements
8.7
89
8.9
9
Ease of Use
8.8
90
9.1
9
Ease of Setup
9.1
53
Not enough data
Ease of Admin
8.9
51
Not enough data
Quality of Support
8.6
74
9.3
9
Has the product been a good partner in doing business?
8.8
48
Not enough data
Product Direction (% positive)
8.8
79
10.0
9
Features by Category
Cloud Workload Protection Platforms
Hide 10 Features
Show 10 Features
Not enough data
Not enough data
Management
Dashboards and Reports
Not enough data
Not enough data
Workflow Management
Not enough data
Not enough data
Administration Console
Not enough data
Not enough data
Operations
Governance
Not enough data
Not enough data
Logging and Reporting
Not enough data
Not enough data
API / Integrations
Not enough data
Not enough data
Security Controls
Anomaly Detection
Not enough data
Not enough data
Data Loss Prevention
Not enough data
Not enough data
Security Auditing
Not enough data
Not enough data
Cloud Gap Analytics
Not enough data
Not enough data
Static Application Security Testing (SAST)
Hide 14 Features
Show 14 Features
7.8
24
Not enough data
Administration
API / Integrations
8.6
(won by default)
21
Not enough data
Extensibility
8.1
(won by default)
18
Not enough data
Analysis
Reporting and Analytics
8.4
(won by default)
22
Not enough data
Issue Tracking
8.2
(won by default)
21
Not enough data
Static Code Analysis
8.6
(won by default)
23
Not enough data
Code Analysis
8.8
(won by default)
20
Not enough data
Testing
Command-Line Tools
7.8
(won by default)
18
Not enough data
Manual Testing
6.5
(won by default)
14
Not enough data
Test Automation
7.8
(won by default)
19
Not enough data
Compliance Testing
8.1
(won by default)
15
Not enough data
Black-Box Scanning
6.2
(won by default)
13
Not enough data
Detection Rate
7.5
(won by default)
19
Not enough data
False Positives
6.4
(won by default)
17
Not enough data
Agentic AI - Static Application Security Testing (SAST)
Autonomous Task Execution
Not enough data
Not enough data
Dynamic Application Security Testing (DAST)
Hide 13 Features
Show 13 Features
Not enough data
Not enough data
Administration
API / Integrations
Not enough data
Not enough data
Extensibility
Not enough data
Not enough data
Analysis
Reporting and Analytics
Not enough data
Not enough data
Issue Tracking
Not enough data
Not enough data
Static Code Analysis
Not enough data
Not enough data
Vulnerability Scan
Not enough data
Not enough data
Code Analysis
Not enough data
Not enough data
Testing
Manual Testing
Not enough data
Not enough data
Test Automation
Not enough data
Not enough data
Compliance Testing
Not enough data
Not enough data
Black-Box Scanning
Not enough data
Not enough data
Detection Rate
Not enough data
Not enough data
False Positives
Not enough data
Not enough data
Container Security
Hide 11 Features
Show 11 Features
7.5
32
Not enough data
Administration
Risk Scoring
8.4
(won by default)
29
Not enough data
Secrets Management
Feature Not Available
Not enough data
Security Auditing
7.9
(won by default)
26
Not enough data
Configuration Management
7.5
(won by default)
19
Not enough data
Monitoring
Continuous Image Assurance
8.0
(won by default)
17
Not enough data
Behavior Monitoring
6.5
(won by default)
13
Not enough data
Observability
7.1
(won by default)
15
Not enough data
Protection
Dynamic Image Scanning
7.4
(won by default)
16
Not enough data
Runtime Protection
7.5
(won by default)
17
Not enough data
Workload Protection
7.4
(won by default)
14
Not enough data
Network Segmentation
6.9
(won by default)
12
Not enough data
Vulnerability Scanner
Hide 12 Features
Show 12 Features
8.1
43
Not enough data
Performance
Issue Tracking
8.5
(won by default)
36
Not enough data
Detection Rate
8.5
(won by default)
40
Not enough data
False Positives
6.7
(won by default)
32
Not enough data
Automated Scans
9.1
(won by default)
41
Not enough data
Network
Compliance Testing
8.1
(won by default)
25
Not enough data
Perimeter Scanning
7.9
(won by default)
19
Not enough data
Configuration Monitoring
8.2
(won by default)
20
Not enough data
Application
Manual Application Testing
7.8
(won by default)
17
Not enough data
Static Code Analysis
8.5
(won by default)
34
Not enough data
Black Box Testing
7.4
(won by default)
13
Not enough data
Agentic AI - Vulnerability Scanner
Autonomous Task Execution
Not enough data
Not enough data
Proactive Assistance
Not enough data
Not enough data
Software Composition Analysis
Hide 6 Features
Show 6 Features
8.3
32
Not enough data
Functionality - Software Composition Analysis
Language Support
8.1
(won by default)
24
Not enough data
Integration
8.6
(won by default)
28
Not enough data
Transparency
8.1
(won by default)
27
Not enough data
Effectiveness - Software Composition Analysis
Remediation Suggestions
8.1
(won by default)
29
Not enough data
Continuous Monitoring
8.5
(won by default)
27
Not enough data
Thorough Detection
8.3
(won by default)
28
Not enough data
Secure Code Review
Hide 6 Features
Show 6 Features
Not enough data
Not enough data
Documentation
Feedback
Not enough data
Not enough data
Prioritization
Not enough data
Not enough data
Remediation Suggestions
Not enough data
Not enough data
Security
False Positives
Not enough data
Not enough data
Custom Compliance
Not enough data
Not enough data
Agility
Not enough data
Not enough data
Cloud Security Posture Management (CSPM)
Hide 11 Features
Show 11 Features
Not enough data
Not enough data
Configuration
DLP Configuration
Not enough data
Not enough data
Configuration Monitoring
Not enough data
Not enough data
Unified Policy Management
Not enough data
Not enough data
Adaptive Access Control
Not enough data
Not enough data
API / Integrations
Not enough data
Not enough data
Visibility
Multicloud Visibility
Not enough data
Not enough data
Asset Discovery
Not enough data
Not enough data
Vulnerability Management
Threat Hunting
Not enough data
Not enough data
Vulnerability Scanning
Not enough data
Not enough data
Vulnerability Intelligence
Not enough data
Not enough data
Risk-Prioritization
Not enough data
Not enough data
Software Supply Chain Security Tools
Hide 7 Features
Show 7 Features
Not enough data
Not enough data
Security
Tampering
Not enough data
Not enough data
Malicious Code
Not enough data
Not enough data
Verification
Not enough data
Not enough data
Security Risks
Not enough data
Not enough data
Tracking
Bill of Materials
Not enough data
Not enough data
Audit Trails
Not enough data
Not enough data
Monitoring
Not enough data
Not enough data
Software Bill of Materials (SBOM)
Hide 6 Features
Show 6 Features
Not enough data
Not enough data
Functionality - Software Bill of Materials (SBOM)
Format Support
Not enough data
Not enough data
Annotations
Not enough data
Not enough data
Attestation
Not enough data
Not enough data
Management - Software Bill of Materials (SBOM)
Monitoring
Not enough data
Not enough data
Dashboards
Not enough data
Not enough data
User Provisioning
Not enough data
Not enough data
AI AppSec Assistants
Hide 6 Features
Show 6 Features
Not enough data
Not enough data
Performance - AI AppSec Assistants
Remediation
Not enough data
Not enough data
Real-time Vulnerability Detection
Not enough data
Not enough data
Accuracy
Not enough data
Not enough data
Integration - AI AppSec Assistants
Stack Integration
Not enough data
Not enough data
Workflow Integration
Not enough data
Not enough data
Codebase Contextual Awareness
Not enough data
Not enough data
Cloud Security
Hide 9 Features
Show 9 Features
Not enough data
Not enough data
Cloud Visibility
Data Discovery
Not enough data
Not enough data
Cloud Registry
Not enough data
Not enough data
Cloud Gap Analytics
Not enough data
Not enough data
Security
Data Security
Not enough data
Not enough data
Data loss Prevention
Not enough data
Not enough data
Security Auditing
Not enough data
Not enough data
Identity
SSO
Not enough data
Not enough data
Governance
Not enough data
Not enough data
User Analytics
Not enough data
Not enough data
Categories
Categories
Shared Categories
Snyk
rezilion
Snyk and rezilion are categorized as
Software Composition Analysis
and
Software Bill of Materials (SBOM)
Unique Categories
Snyk is categorized as
Software Supply Chain Security Tools
,
AI AppSec Assistants
,
Container Security
,
Static Application Security Testing (SAST)
, and
Vulnerability Scanner
rezilion is categorized as
Secure Code Review
,
Cloud Workload Protection Platforms
,
Dynamic Application Security Testing (DAST)
, and
Cloud Security Posture Management (CSPM)
Reviews
Reviewers' Company Size
Snyk
Small-Business
(50 or fewer emp.)
36.8%
Mid-Market
(51-1000 emp.)
43.2%
Enterprise
(> 1000 emp.)
20.0%
rezilion
Small-Business
(50 or fewer emp.)
18.2%
Mid-Market
(51-1000 emp.)
45.5%
Enterprise
(> 1000 emp.)
36.4%
Small-Business
(50 or fewer emp.)
36.8%
18.2%
Mid-Market
(51-1000 emp.)
43.2%
45.5%
Enterprise
(> 1000 emp.)
20.0%
36.4%
Reviewers' Industry
Snyk
Computer Software
21.6%
Information Technology and Services
20.8%
Computer & Network Security
9.6%
Hospital & Health Care
5.6%
Financial Services
4.8%
Other
37.6%
rezilion
Computer Software
27.3%
Information Technology and Services
18.2%
Medical Devices
9.1%
Mechanical or Industrial Engineering
9.1%
Internet
9.1%
Other
27.3%
Alternatives
Snyk Alternatives
Aikido Security
Add Aikido Security
Mend.io
Add Mend.io
Wiz
Add Wiz
SonarQube
Add SonarQube
See all alternatives
rezilion Alternatives
Wiz
Add Wiz
GitLab
Add GitLab
GitHub
Add GitHub
FortiCNAPP
Add FortiCNAPP
See all alternatives
Discussions
Snyk Discussions
What is Snyk scanning?
2 Comments
AM
Snyk scanning is a security tool that helps developers find and fix vulnerabilities in their code, containers, and infrastructure
Read more
How good is Snyk?
2 Comments
RA
very. it's basically like dependabot, but more fleshed out
Read more
Is Snyk a SaaS?
2 Comments
AM
maybe
Read more
See all discussions
rezilion Discussions
rezilion has no discussions with answers
See all discussions
Ask Snyk a Question
Contact Snyk
Ask rezilion a Question
Contact rezilion
Spotlight Categories
Sales Engagement Software
Live Chat Software
Contract Management Software
Applicant Tracking Systems (ATS)
At a Glance
Pricing
Ratings
Features
Reviews
Alternatives
Discussions
Add Product
Snyk
rezilion
Hunting for software
insights
?
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.
G2 - Business Software Reviews
Create an account
Already have an account?
Log in
G2 - Business Software Reviews
Create an account
Already have an account?
Log in
or continue with
LinkedIn
Google
Google
By proceeding, you agree to our
Terms of Use
and
Privacy Policy
Add more products
Search for Software and Services
Suggested Products
Mend.io
(112)
4.3
out of
5
Add
Checkmarx
(36)
4.2
out of
5
Add
Black Duck
(27)
4.0
out of
5
Add
Veracode Application Security Platform
(25)
3.8
out of
5
Add
Wiz
(772)
4.7
out of
5
Add