Listing Thumbnail

    Enso Application Security Posture Management

     Info
    Sold by: CloudZone 
    Enso Application Security Posture Management
    4

    Overview

    Enso is an application security posture management (ASPM) platform, allowing software security groups to scale and gain control over application security programs to systematically protect applications. The Enso ASPM platform easily deploys into enterprise environments to create an actionable, unified inventory of all application assets, their owners, security posture and associated risk. It helps security teams easily build and enforce security policies and transform AppSec into an automated, systematic discipline.

    Highlights

    • ASPM
    • AppSec
    • Application Security

    Details

    Categories

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Enso Application Security Posture Management

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (3)

     Info
    Dimension
    Cost/12 months
    Basic
    $50,000.00
    Professional
    $100,000.00
    Enterprise
    $200,000.00

    Vendor refund policy

    no refunds

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Vendor resources

    Support

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    50
    In Agile Lifecycle Management
    Top
    25
    In Continuous Integration and Continuous Delivery

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    4 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Unified Application Asset Inventory
    Creates a centralized inventory of all application assets with ownership and security posture information across enterprise environments
    Security Policy Enforcement
    Enables security teams to build and enforce security policies systematically across applications
    Risk Assessment and Posture Evaluation
    Provides actionable assessment of application security posture and associated risk identification
    Enterprise Deployment Capability
    Deploys into enterprise environments to scale application security programs across organizations
    Automated Security Discipline
    Transforms application security into an automated and systematic discipline through platform automation
    Risk Contextualization Engine
    Proprietary Risk Graph that contextualizes security findings from third-party tools and native solutions based on likelihood and impact of risk to minimize backlogs and triage time.
    Multi-Tool Security Integration
    Aggregates and enriches security findings from SAST, SCA, CSPM, runtime API security tools, and manual processes including bug bounty programs and penetration testing.
    Supply Chain Security Monitoring
    Monitors commits to flag anomalous developer behavior and surfaces risky material code changes for integrated software supply chain security assessment.
    Source Control Integration
    API-based integration with source control managers to create complete inventory of applications, supply chain components, their risks, and changes over time.
    LLM-Enriched Remediation Guidance
    Provides large language model-enriched remediation guidance tied to code owners and root causes to improve remediation cycles and reduce developer friction.
    Software Supply Chain Visibility
    Continuous end-to-end visibility and traceability across source control, CI/CD, registry, and cloud environments through API integrations and proprietary Pipeline Bill of Materials (PBOM) tracking
    Vulnerability Prioritization Engine
    Context-based threat prioritization that assesses vulnerability exploitability, reachability, business impact, and risk normalization to identify critical issues requiring immediate attention
    Automated Remediation Workflows
    No-code workflow automation that automatically blocks vulnerabilities, risky code, and configuration changes while enabling pull request and ticket creation from a unified console
    Real-time Security Scanning
    Real-time monitoring and scanning across the software development lifecycle from code to cloud with build integrity verification and production application security from inception to release
    Unified Application Security Platform
    Consolidated platform integrating application security posture management, application security testing, and supply chain security across the complete software development lifecycle

    Contract

     Info
    Standard contract
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4
    18 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    17%
    78%
    6%
    0%
    0%
    4 AWS reviews
    |
    14 external reviews
    External reviews are from PeerSpot .
    KannanPadmanabhan

    Automated security checks have blocked critical code issues and protect daily banking releases

    Reviewed on Feb 26, 2026
    Review provided by PeerSpot

    What is our primary use case?

    We are a customer of Snyk , which is a SaaS solution. We are one of the tenants using Snyk  services but are not doing any enhancement development. We are purely a customer availing Snyk services.

    We are also using a separate DAST tool, though I am not aware of the tool name as it is managed by a different team.

    We utilize two main capabilities: application vulnerability detection and SCA  capabilities. The primary reason we use Snyk is for SAST , as we want to scan our applications for any security vulnerabilities and address them.

    What is most valuable?

    Snyk is finding all the issues we have. It suggests solutions for every vulnerability, and we are getting patches frequently. As someone from an enterprise, I want to share feedback that might help others. There are multiple teams involved in our organization. We have a separate cyber team that works with Snyk and keeps on updating, though I am not fully aware of all the details in that area.

    What needs improvement?

    I have not explored from that perspective. Being from an application perspective, I cannot say anything that needs real improvement. I have not explored from that angle. Till now, we did not face any scaling issues and I did not hear of any. I would rate this at 9 because I always keep one number in reserve, as there is always scope for improvement for any tool.

    For how long have I used the solution?

    We have been using Snyk for more than a year.

    What do I think about the scalability of the solution?

    Till now, we did not face any scaling issues and I did not hear of any. I would rate this at 9 because I always keep one number in reserve, as there is always scope for improvement for any tool.

    How are customer service and support?

    We do not raise issues directly with Snyk. We have a common team that liaises with Snyk. Whenever we have issues, we raise them with the cybersecurity team within our company who supports Snyk, and they in turn interact with Snyk.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    Earlier, I used Checkmarx, which is another SAST  tool. By default, any company and any SAST tool like Checkmarx or Snyk provides a plugin.

    What about the implementation team?

    Snyk is integrated. I have not used it directly, though I may have used it indirectly.

    What other advice do I have?

    I am from an enterprise and want to share feedback that might help others. There are multiple teams involved in our organization. I am from the application team, so I know the vulnerabilities and how to fix them. However, there is a platform team that takes care of giving permission for Snyk and access levels, which I am not fully aware of. At a high level, we have a Snyk admin team in our company that gives permissions, though I do not know all the details of what they do. I cannot share feedback on the admin area, but I can share that vulnerability-wise, I am happy with what Snyk provides and the solutions it gives.

    When Snyk identifies issues, our pull request process will not allow us to merge them in the first place. Snyk helps us by blocking critical issues and vulnerabilities. If someone bypassed the pull request check, we have another check in place before production release where we validate everything and block the code if it violates our standards. Based on Snyk categorization, we block issues from our end while raising a pull request and also before releasing to production.

    We need Snyk because we are in the banking industry with thousands of applications. Every day, we deploy code to production, releasing almost every day except weekends, though we sometimes release on weekends for very large deployments. Anything that goes to production should not have any security vulnerabilities. Being in the banking industry and having applications used by end customers, we are dealing with end customer data. No one should steal data in any format, and with authentication, one user cannot see another user's data. Snyk is paramount and extremely important for us. Every application that goes into production must pass Snyk vulnerability scanning before it can be deployed. If you ask whether it is important, it is absolutely critical. I would rate it 10 out of 10.

    Internally, whenever a Snyk scan runs, we have created GitHub Actions . Our target state is GitHub Actions  everywhere. When we run the GitHub Actions, it will connect to the latest Snyk scanning through API and automatically gets all open issues, then creates a GitHub  issue. First, our internal tool pulls out all Snyk security issues through the API and creates GitHub  issues. We manually open a GitHub issue and give a command prompt to our AI agent. That prompt internally might work with Snyk autofix capability and gets the fixes correctly and creates a pull request. We review and check in the pull request, which is reviewed by experienced team members. This is the process we follow: create an issue based on a Snyk scan and for every issue, run a prompt so that it creates a pull request automatically with the fixes.

    We do use Snyk documentation. We internally do not have many resources because we do not want to duplicate. Snyk guide is purely open and not logged in, so we use it.

    Snyk documentation is extremely useful. Vulnerability-wise, I do not go to Snyk documentation frequently because in the current world, with my 25 plus years of experience, I used to fix many things manually before these tools existed. I need to know the intricacies of how to fix code. If you take 10 years back, there were tools and libraries which you could integrate with one or two lines, which solved the problem. With the current AI world, I do not even need that. If I get some issues, I do not even need to go to the Snyk website and read how to fix. I have an AI tool that can fix it if I ask it to. From an engineer's perspective, I still read the documentation. As a person who came from the manual world 25 years back, I still read the fix documentation. The documentation is very good, and being a general one, I understand the SAST world, so I did not find much problem with the documentation.

    We are using Snyk, which is a SAST tool. There is a team in our organization who developed some AI agent on top of Snyk capabilities. I do not know exactly how they integrated Snyk, but our organization provides an AI agent which, if we run, automatically fixes issues and raises a pull request. In that case, we are indirectly using Snyk.

    My overall rating for Snyk is 10 out of 10.

    Abhishek-Goyal

    Improves security posture by actively reducing critical vulnerabilities and guiding remediation

    Reviewed on Nov 15, 2025
    Review provided by PeerSpot

    What is our primary use case?

    I typically use Snyk  for checking the security and vulnerabilities in my repositories.

    Recently, I have used Snyk  in one of my repositories for security and vulnerability checks, providing comprehensive knowledge about the repository, including what it does and where the security vulnerabilities are located.

    I am using Snyk for the first time and did not use any vulnerability scanning solution before this. I was previously doing Red Hat vulnerability scanning locally for dependency checks, which was not what I wanted.

    What is most valuable?

    Snyk's main features include open-source vulnerability scanning, code security, container security, infrastructure as code security, risk-based prioritization, development-first integration, continuous monitoring and alerting, automation, and remediation. The best features I appreciate are the vulnerability checking, vulnerability scanning, and code security capabilities, as Snyk scans all open-source dependencies for known vulnerabilities and helps with license compliance for open-source components.

    Snyk integrates into IDEs, allowing issues to be caught as they appear in the code dynamically and prioritizes risk while providing remediation advice.

    Snyk provides actionable remediation advice on where vulnerabilities can exist and where code security is compromised, automatically scanning everything and providing timely alerts.

    Snyk has positively impacted my organization by improving the security posture across all software repositories, resulting in fewer critical vulnerabilities, more confidence in overall product security, and faster security compliance for project clients.

    Snyk has helped reduce vulnerabilities significantly. Initially, the repository had 17 to 31 critical and high vulnerabilities, but Snyk has helped manage them down to just five vulnerabilities, which are now lower and not high or critical.

    What needs improvement?

    Although Snyk is strong, sometimes it flags vulnerabilities that are not reachable, not exploitable, and not relevant to a project. Better reachability analysis and context-aware scanning could improve this.

    Snyk could benefit from a more optimized scanning engine and incremental scan caching.

    For how long have I used the solution?

    I have been using Snyk for the previous one year.

    What do I think about the stability of the solution?

    I have no issues with Snyk's reliability; it is stable.

    What do I think about the scalability of the solution?

    Snyk is very scalable and can handle my organization's growth and changing needs, allowing us to scale up to many stages and reduce developer costs, especially when we have fewer developers.

    How are customer service and support?

    I never reached out to customer support because I never encountered any issues.

    How would you rate customer service and support?

    Negative

    Which solution did I use previously and why did I switch?

    I considered SonarQube  in detail before choosing Snyk.

    How was the initial setup?

    My experience with pricing, setup cost, and licensing is good, as the overall setup experience is smooth with easy onboarding for connection with GitHub  and GitLab . I primarily use it with GitHub , requiring just a few clicks to set up Snyk.

    What was our ROI?

    I can see that Snyk saves the costs of hiring security developers for vulnerability scanning and security checks, as that responsibility is now managed by Snyk.

    What's my experience with pricing, setup cost, and licensing?

    Pricing is good for small teams, with a free tier or low-usage pricing available, and the licensing experience is straightforward but not very flexible.

    What other advice do I have?

    My advice for others looking into using Snyk is that if you are starting a repository that is free from vulnerabilities and security checks, Snyk is a good option. It automatically provides advice on how to improve for reducing vulnerabilities and security issues, allowing for easy removal of vulnerabilities. You can use it for a free trial, and if it impacts your organization positively, you can consider further usage.

    Snyk is a very good product for vulnerability code scanning and can be used effectively. I would rate this product a nine point five out of ten.

    ANDRESANTOS

    Has improved development workflows through early vulnerability detection and accurate insights

    Reviewed on Sep 23, 2025
    Review from a verified AWS customer

    What is our primary use case?

    The most recent client had experience with other products that did not have some features Snyk  provides, such as Fortify in the old version before OpenText  acquisition. They gave feedback about the precision in discovering vulnerabilities. They found that Snyk  can provide more insights about vulnerabilities than older applications in SAST  and SCA .

    We have integration with GitHub Actions  to analyze the code and we use a double check in the pipeline. Our strategy is about shift left. The developers connect with Snyk, Git , and use this with the pipeline.

    How has it helped my organization?

    They evolved their maturity because they could find the vulnerabilities before the pipeline runs. They can find and correct these vulnerabilities in a step before the pushes and PRs to GitHub . They think it is a very positive feature.

    What is most valuable?

    I appreciate the UI. It is simple, fast, and I value the precision in the tests. The responses are positive.

    Regarding the vulnerability database and AI, we have good experience with that. I cannot compare with other providers or vendors such as Veracode , Checkmarx, and others. All the tests are positive in my analysis.

    What needs improvement?

    Technically, we have better vulnerabilities detection in Checkmarx and Veracode . Both of them are more precise about vulnerabilities detection. Snyk is slightly less effective, but this is something they can improve on in the future.

    For how long have I used the solution?

    We have been using the solution for one and a half years. Not much time.

    What do I think about the stability of the solution?

    We did not need support during the proof of concept.

    How are customer service and support?

    The documentation is good. It is one of the reasons we did not need support. We could understand the implementation of the product and other features without the need for human interaction.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I made a proof of concept for a client with Checkmarx for about one month. I provided them a review about my experience. Now they are analyzing my results and considerations about other products too. I do not know if they already have a response about which product they will buy.

    What's my experience with pricing, setup cost, and licensing?

    Snyk is less expensive.

    Which other solutions did I evaluate?

    It is simpler than other vendors. We have some difficulties with other license models. They are more complex and involve an acquisition of more products such as Synopsys and Checkmarx used a complex license model. Snyk has a license model simpler than most of the other vendors.

    What other advice do I have?

    It was one of my three recommendations for my client. I am satisfied with the product. I rate Snyk 8.5 out of 10.

    reviewer2731785

    Seamless integration and affordable pricing ensure efficient deployment while AI enhancements can further elevate feature set

    Reviewed on Jun 30, 2025
    Review from a verified AWS customer

    What is most valuable?

    The best feature of Snyk  is the integration with our ticketing system, which is Jira . That integration was one we were specifically looking for. The deep integration with our IDE  and repository is another valuable feature. In terms of deploying these features, it's seamless.

    What needs improvement?

    Snyk  should improve the scanning capabilities for other languages. For example, Veracode  is strong with different languages such as Java, C#, and others. However, Snyk performs better at mobile source code scanning compared to Veracode . If both capabilities were combined, that would be exceptional.

    As we are moving toward GenAI, we expect Snyk to leverage AI features to improve code scanning findings. One key feature we are currently examining with Veracode is AIVSS (Artificial Intelligence VSS), which is an extension of CVSS to cover use cases or top 10 LLM findings during code scanning. Since this is relatively new, we expect upcoming features to cover AI scoring. We have AI projects currently deploying in our organization, and we want to cover not only normal CVSS but also receive an AI assessment score. Both Veracode and Snyk should implement this new scoring system for CVSS and AIVSS.

    For how long have I used the solution?

    We are a customer of Snyk, not a partner.

    How are customer service and support?

    We have contacted Snyk's technical support regarding several issues, and they have resolved them successfully.

    Snyk's technical support deserves a rating of seven or eight out of ten. Their response time aligns with their SLA commitments.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    My previous company continues to use Snyk.

    How was the initial setup?

    The initial setup of Snyk was straightforward.

    What's my experience with pricing, setup cost, and licensing?

    We discussed pricing with their account manager and secured a favorable deal. Initially, we planned to subscribe through AWS Marketplace  at standard rates. After negotiations, we received a special package with a good price point. We signed a two-year contract, and they provided special links for subscription. The payment structure operates on a monthly prepaid basis.

    What other advice do I have?

    While Snyk may not be the absolute best option in the market, it offers the most seamless experience currently available. Based on their price point and features, it's both affordable and fair considering the license package offered.

    During our implementation, we conducted a pilot test with Snyk for approximately two weeks during our UAT session. We spent an additional two to three weeks obtaining management approvals for production repository access. The testing was performed on development repositories before moving to production. While the actual implementation took about a week, the complete process duration was extended due to internal organizational approval processes.

    I rate Snyk 8 out of 10.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    PawanSingh2

    Identifies vulnerabilities early and integrates smoothly with DevOps pipeline

    Reviewed on Mar 17, 2025
    Review provided by PeerSpot

    What is our primary use case?

    I use Snyk  in the DevOps pipeline to identify vulnerabilities before deploying the application. It integrates with Jenkins .

    What is most valuable?

    Snyk  provides a lot of information on vulnerabilities, the packages being used, and their dependencies. It gives good insight into the security of those packages. Snyk helps detect vulnerabilities before code moves to production, allowing for integration with DevOps and providing a shift-left advantage by identifying and fixing bugs before deployment.

    What needs improvement?

    There are a lot of false positives that need to be identified and separated. The inclusion of AI to remove false positives would be beneficial. So far, I've not seen any AI features to enhance vulnerability detection or to address the issues I mentioned.

    For how long have I used the solution?

    I've been working with Snyk for almost two years now.

    What do I think about the stability of the solution?

    Stability-wise, it is okay. I've not seen any issues with stability.

    What do I think about the scalability of the solution?

    Scalability meets my needs. I would rate it nine out of ten.

    Which solution did I use previously and why did I switch?

    I used another tool before Snyk but I'm not recalling its name. AppScan  was used in the very early days.

    How was the initial setup?

    Setup is not a big problem. It's easy. If I had to rate it from one to ten, I'd say nine.

    What other advice do I have?

    They should do their research and see if it definitely adds value to their DevOps pipeline. Overall, I rate the solution eight out of ten.
    View all reviews