I assess the effectiveness of the machine learning algorithms in reducing threat response time as pretty good. At first, when we started with Sweet Security, the first month or so was pretty noisy with lots of different alerts being raised, but that's understandable. However, as time passed, we don't see any false positives, which is amazing. The machine learning works extremely well. We use the customizable dashboards and they are excellent in allowing us to create one dashboard for the CISO view. The CISO view is mainly for the CISO and the directors who are operating on the cloud, infrastructure and application security. They want to see things from a high-level, cross-company-wide perspective. We have that dashboard, but we also created a dedicated dashboard per specific analyst team. We still don't really use the reporting tools much, unfortunately. This is our next step. The next step for us would be to connect the reporting mechanism with our internally developed system that knows how to take off those reports and then do whatever we need with them. The threat detection capabilities influence our decision-making processes. Whenever we need to make a decision about what should be fixed first or what we should focus on, the team will first go to the threat detection page and learn about the system or the environment that we need to take a decision for. On a day-to-day basis, around 10 users are logging into the platform. Overall, there might be around 30 or 40 people. The solution requires maintenance, but it is minimal. Once in a while, when Sweet Security releases a new agent, we need to conduct the installation ourselves, as we chose not to allow them to reinstall it remotely. Overall rating: 10/10.
Cloud and compute team leader at a manufacturing company with 1,001-5,000 employees
Real User
Top 20
2025-09-04T10:03:29Z
Sep 4, 2025
I haven't used the customizable dashboards feature yet. I cannot assess the effectiveness of the machine learning algorithms in reducing threat response time; I don't remember using a feature like that in Sweet Security. Regarding how Sweet Security has helped me prioritize risks and threats more effectively, I don't know how to say if it helped or not, but it is definitely needed, as the tool is our eyes and ears with everything cloud-related. We purchased Sweet Security through a direct purchase. We are not a small company; we have 7,500 users, but our IT team is indeed very small with just two users of this product. I would recommend Sweet Security to other users for the price and functionality. I rate Sweet Security eight out of ten.
Sweet Security offers a robust cybersecurity solution designed to safeguard sensitive data with advanced monitoring features, enhancing organization-wide security protocols.
The comprehensive features of Sweet Security include real-time threat intelligence, automated incident response, and seamless integration with existing IT infrastructures. Engineered for flexibility and scalability, it effectively adapts to evolving cybersecurity landscapes, delivering actionable insights for proactive...
I assess the effectiveness of the machine learning algorithms in reducing threat response time as pretty good. At first, when we started with Sweet Security, the first month or so was pretty noisy with lots of different alerts being raised, but that's understandable. However, as time passed, we don't see any false positives, which is amazing. The machine learning works extremely well. We use the customizable dashboards and they are excellent in allowing us to create one dashboard for the CISO view. The CISO view is mainly for the CISO and the directors who are operating on the cloud, infrastructure and application security. They want to see things from a high-level, cross-company-wide perspective. We have that dashboard, but we also created a dedicated dashboard per specific analyst team. We still don't really use the reporting tools much, unfortunately. This is our next step. The next step for us would be to connect the reporting mechanism with our internally developed system that knows how to take off those reports and then do whatever we need with them. The threat detection capabilities influence our decision-making processes. Whenever we need to make a decision about what should be fixed first or what we should focus on, the team will first go to the threat detection page and learn about the system or the environment that we need to take a decision for. On a day-to-day basis, around 10 users are logging into the platform. Overall, there might be around 30 or 40 people. The solution requires maintenance, but it is minimal. Once in a while, when Sweet Security releases a new agent, we need to conduct the installation ourselves, as we chose not to allow them to reinstall it remotely. Overall rating: 10/10.
I haven't used the customizable dashboards feature yet. I cannot assess the effectiveness of the machine learning algorithms in reducing threat response time; I don't remember using a feature like that in Sweet Security. Regarding how Sweet Security has helped me prioritize risks and threats more effectively, I don't know how to say if it helped or not, but it is definitely needed, as the tool is our eyes and ears with everything cloud-related. We purchased Sweet Security through a direct purchase. We are not a small company; we have 7,500 users, but our IT team is indeed very small with just two users of this product. I would recommend Sweet Security to other users for the price and functionality. I rate Sweet Security eight out of ten.