Sweet Security Lands $33M for Cloud Threat Mitigation, Plans U.S. Expansion

 

Sweet Security - NasdaqThe Israeli cybersecurity company Sweet Security has secured a $33 million Series A fundraising round six months after emerging from stealth. Munich Re Ventures, Glilot Capital Partners, and Evolution Equity Partners led the financing. Sweet Security, which uses deep runtime analysis to better detect and handle cloud risks, will utilize the money to grow its platform and scale up operations in the United States.

Additionally, Sweet Security is introducing “first-to-market features” for runtime non-human identity management and runtime posture augmentation to its unified runtime platform.

In the absence of runtime visibility and analytics, businesses are left without a practical approach to managing cloud risks, stated Sweet Security. The RunC vulnerabilities that were recently found would highlight how quickly businesses may be taken aback by new cloud threats and wind up needing to spend days, if not weeks, attempting to figure out what went wrong and how to solve it, the company added.

Sweet Security introduced its cloud-based unified runtime security platform in August 2023. Its eBPF-based technology, which is awaiting patent, finds crucial irregularities in non-human identities, networks, and applications. Regarding who, where, and what is occurring, it would offer profound and practical insights. Instead of generating a backlog of unimportant alarms from passive API scans, Sweet Security’s cutting-edge technology detects risks that matter, from detection and response to vulnerability management, posture augmentation, and non-human identity management (NHI). Security teams can break through the clutter and tackle serious cloud issues as they emerge thanks to Sweet’s ‘boots on the cloud’ methodology.

There are several obstacles associated with non-human identities in the cloud, stated Sweet Security. Consequently, the company is adding runtime posture augmentation and runtime NHI management – two “first-to-market” features – to its runtime security package. Through its innovative sensor-based technology and Layer 7 capabilities, Sweet Security’s behavioral analysis identifies the machine that started a series of events and its intended use. With runtime insights, Sweet Security’s innovative solution would totally improve an organization’s posture and advances their NHI management.

Innovation: Cloud Runtime Security

Dror Kashti, co-founder and CEO of Sweet Security
“At first, our broad vision for cloud runtime security was met with skepticism, but we trusted our experience because we have lived the pain our customers experience every day,” said Dror Kashti, co-founder and CEO of Sweet Security.

The idea behind Sweet Security’s offering came from its co-founder and CEO, retired Brigadier General Dror Kashti, a former CISO of the Israel Defense Forces (IDF); retired Colonel Eyal Fisher, a former head of Unit 8200’s Cyber Department; and Orel Ben-Ishay, a former Special Operations Division R&D Cybersecurity Group Leader. Sweet Security’s innovative strategy has been acknowledged by CSO Online, CRN, and Gartner. Since its start, Sweet has closed dozens of new clients and doubled its headcount.

“Sweet’s solution shifts cloud security right. Owing to its innovative behavior-based security technology that factors in applications, networks, and identities, the Sweet platform unifies risk reduction across cloud use-cases” said Yuval Ben-Itzhak, General Partner, Evolution Equity Partners. “The outstanding team, technology, and timing – it’s as Sweet as it gets. We’re excited to join and support the journey.”

“At first, our broad vision for cloud runtime security was met with skepticism, but we trusted our experience because we have lived the pain our customers experience every day and we knew we could build something they’d love,” said Dror Kashti, co-founder and CEO of Sweet Security. “This round is an incredible validation of our approach It will enable us to expand our U.S. presence and make cloud runtime insights actionable across a wider set of practitioners.”

Total
0
Shares
Share 0
Tweet 0
Pin it 0
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

HPE’s New Riyadh ProLiant Server Manufacturing Plant Empowers Saudi Women

Next Post

We asked Googlers which cloud services they use most frequently

Related Posts