We are cloud native and are using Sweet Security for call runtime protection. It is much bigger than just runtime protection, but the main use case was bringing Sweet Security for runtime protection services and it grew into a platform that we can utilize for many different things. We are using it instead of a CSPM and for visualizing what we call code-to-cloud, our code-to-cloud vision, to better understand the different packages and different dependencies that we have within the cloud runtime. It helps us a lot in understanding which vulnerabilities we should tackle from the code perspective.
Cloud and compute team leader at a manufacturing company with 1,001-5,000 employees
Real User
Top 20
2025-09-04T10:03:29Z
Sep 4, 2025
We use Sweet Security primarily for vulnerability management on all of our cloud assets, mainly AWS, but we also use it for SOC, with the SOC integration getting the events and responding to them.
Sweet Security offers a robust cybersecurity solution designed to safeguard sensitive data with advanced monitoring features, enhancing organization-wide security protocols.
The comprehensive features of Sweet Security include real-time threat intelligence, automated incident response, and seamless integration with existing IT infrastructures. Engineered for flexibility and scalability, it effectively adapts to evolving cybersecurity landscapes, delivering actionable insights for proactive...
We are cloud native and are using Sweet Security for call runtime protection. It is much bigger than just runtime protection, but the main use case was bringing Sweet Security for runtime protection services and it grew into a platform that we can utilize for many different things. We are using it instead of a CSPM and for visualizing what we call code-to-cloud, our code-to-cloud vision, to better understand the different packages and different dependencies that we have within the cloud runtime. It helps us a lot in understanding which vulnerabilities we should tackle from the code perspective.
We use Sweet Security primarily for vulnerability management on all of our cloud assets, mainly AWS, but we also use it for SOC, with the SOC integration getting the events and responding to them.