Introducing G2.ai, the future of software buying.Try now
Aikido Security
Sponsored
Aikido Security
Visit Website
Product Avatar Image
Snyk Apprisk

By Snyk

Unclaimed Profile

Claim your company’s G2 profile

Claiming this profile confirms that you work at Snyk Apprisk and allows you to manage how it appears on G2.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Claim Now
4.3 out of 5 stars
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Snyk Apprisk?

Aikido Security
Sponsored
Aikido Security
Visit Website
It's been two months since this profile received a new review
Leave a Review

Snyk Apprisk Reviews & Product Details

Product Avatar Image

Have you used Snyk Apprisk before?

Answer a few questions to help the Snyk Apprisk community

Snyk Apprisk Reviews (2)

Reviews

Snyk Apprisk Reviews (2)

4.3
2 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Danwand N.
DN
Software Engineer
Mid-Market (51-1000 emp.)
"It was a great experience using Snyk Apprisk, I was able to pritotize what, when"
What do you like best about Snyk Apprisk?

Priorittion and the report generation which I can show to team leads made my life lot better, I love the whole insight. Very easy to setup and integrate with my applicaiton ecosystem Review collected by and hosted on G2.com.

What do you dislike about Snyk Apprisk?

I do not like the false positives it makes, there are places where my interupption is required, My company is running a scan every 15 days, but having to check into the results is hard. Review collected by and hosted on G2.com.

DQ
Compensation and Benefits Manager
Oil & Energy
Mid-Market (51-1000 emp.)
"Prioritize vulnerabilities based on their actual impact"
What do you like best about Snyk Apprisk?

Snyk AppRisk has actually been quite helpful for me in the capacity as an application security engineer. As such, its ability to scan for possible vulnerabilities means that I am able to examine the degree of security threat any of the code we have written poses to the entire system. Review collected by and hosted on G2.com.

What do you dislike about Snyk Apprisk?

Bordering the threats as genuine and the vulnerabilities that are not severe can take some time to differentiate. Currently the options to handle the false positives look quite limited or somewhat lacking. Review collected by and hosted on G2.com.

There are not enough reviews of Snyk Apprisk for G2 to provide buying insight. Below are some alternatives with more reviews:

1
SonarQube Logo
SonarQube
4.5
(125)
SonarQube is a code quality and vulnerability solution for development teams that integrates with CI/CD pipelines to ensure the software you produce is secure, reliable, and maintainable.
2
Aikido Security Logo
Aikido Security
4.6
(104)
Aikido Security is a developer-first software security platform. We scan your source code & cloud to show you which vulnerabilities are actually important to solve. Triaging is sped up by massively reducing false-positives and making CVEs human-readable. Aikido makes it simple to keep your product secure and gives you back time to do what youdo best: writing code.
3
Invicti (formerly Netsparker) Logo
Invicti (formerly Netsparker)
4.6
(68)
Invicti (formerly Netsparker) is an automatic and easy-to-use web application security scanner to automatically find security flaws in websites, web applications and web services.
4
APPCHECK Logo
APPCHECK
4.7
(66)
APPCHECK offers a leading security scanning platform that automates the discovery of security flaws within organisations websites, applications, network, and cloud infrastructure.
5
OX Security Logo
OX Security
4.8
(51)
OX Security helps teams focus on the 5% of issues that really matter, ensuring developers fix the most critical problems first. By consolidating all your security data into one clear view and seamlessly integrating into existing workflows, OX provides actionable insights to improve app security, reduce complexity, and resolve issues faster—all without slowing down development.
6
Jit Logo
Jit
4.5
(43)
Jit empowers developers to secure everything they code with an all-in-one platform for product security that makes ten code and cloud scanners feel like one. With Jit, developers never need to leave their environment for immediate feedback on the security of every code change and contextual information describing the impact of each security finding.
7
ActiveState Platform Logo
ActiveState Platform
4.1
(34)
ActiveState delivers Intelligent Remediation for vulnerability management, which enables DevSecOps teams to not only identify vulnerabilities in open source packages, but also to automatically prioritize, remediate, and deploy fixes into production without breaking changes, ensuring that applications are truly secured. The ActiveState platform centers on open source languages packaged as runtimes that can be deployed in various form factors. Low-to-no CVE container images are also available for plug-in and play needs. Existing tools overwhelm DevSecOps teams with excessive vulnerability data, false positives, and a lack of prioritization, often leading to inaction and increased exposure to exploits. ActiveState’s solution provides your DevSecOps with a comprehensive view of open source vulnerability status across your application portfolio, enabling them to prioritize the vulnerabilities that matter, assess the risk of updates, and choose recommended remediation paths based on corporate policies and avoiding breaking changes. We do this by helping you: - Understand your vulnerability blast radius so you can see every vulnerabilities’ true impact across your organization. This is driven by our proprietary catalog of 40M+ open source components that’s been built and tested for over 25 years. -Intelligently prioritize remediations so you can turn risks into action. We help teams move away from alert overload with AI-powered analysis that detects breaking changes, streamlines remediation workflows, and accelerates security processes. -Precisely remediate what matters - unlike other solutions, ActiveState doesn’t just suggest what you should do, we enable you to deploy fixed artifacts or document exceptions so you can truly drive down vulnerabilities and secure your software supply chain.
8
Edgescan Logo
Edgescan
4.8
(33)
Edgescan delivers a unique service combining fullstack vulnerability management, asset profiling, alerting and risk metrics.
9
AccuKnox Logo
AccuKnox
4.4
(13)
AccuKnox is a cybersecurity company specializing in Zero Trust security solutions for cloud-native applications and AI workloads. Founded in 2020 in partnership with SRI International, AccuKnox offers a comprehensive Cloud-Native Application Protection Platform that integrates Cloud Security Posture Management , Cloud Workload Protection Platform , Application Security Posture Management , and Kubernetes Security Posture Management . Leveraging open-source technologies like eBPF, SPIFFE/SPIRE, and OPA/Kyverno, AccuKnox provides runtime security with minimal overhead. Their platform supports multi-cloud and hybrid environments, including AWS, Azure, GCP, OpenStack, and VMware Tanzu, and is designed to protect sensitive data and AI models across various compliance frameworks such as SOC2, HIPAA, GDPR, and PCI-DSS. Key Features and Functionality: - Cloud Security Posture Management : Identifies vulnerabilities and misconfigurations in cloud infrastructure based on security best practices and benchmarks. - Cloud Workload Protection Platform : Provides runtime security using KubeArmor for observability of application behavior and Linux Security Modules for enforcement against unknown Zero Day attacks. - Application Security Posture Management : Integrates open-source and commercial security scanning tools for comprehensive protection from code to cloud. - Kubernetes Security Posture Management : Offers security for managed Kubernetes distributions, supporting both modern workloads like APIs and Large Language Models , as well as legacy applications. - Governance, Risk, and Compliance : Supports over 33 compliance reports and frameworks, enabling organizations to meet regulatory requirements across different regions. - Infrastructure as Code Security: Provides comprehensive support for IaC security scanning, analyzing files for misconfigurations, vulnerabilities, and compliance issues across various frameworks such as Terraform, Kubernetes YAML, Helm Charts, and more. Primary Value and Problem Solved: AccuKnox addresses the critical need for robust security in cloud-native environments by offering a Zero Trust CNAPP that secures applications from development through deployment. By integrating multiple security modules, AccuKnox enables organizations to detect, prioritize, and remediate vulnerabilities early in the software development lifecycle, reducing the risk of breaches and ensuring compliance with industry standards. Its support for multi-cloud and hybrid environments ensures that businesses can maintain a strong security posture across diverse infrastructures.
10
Strobes Security Logo
Strobes Security
4.7
(21)
Strobes PTaaS, a continuous and on-demand pentesting platform combines the human expertise of pentesting with the efficiency of a SaaS delivery platform that allows for real-time collaboration and faster remediation. Experience faster collaborations and better results with platform enabled pentesting provided by the best white hats.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Snyk Apprisk
View Alternatives