I'm mostly using Sweet Security for real-time infrastructure security. If there is any threat, I want to detect it in real time. That's the main use case. Vulnerability management is one other benefit I am getting from Sweet Security as well.
Director of Security Operations at a tech vendor with 501-1,000 employees
Real User
Top 10
Sep 30, 2025
We are cloud native and are using Sweet Security for call runtime protection. It is much bigger than just runtime protection, but the main use case was bringing Sweet Security for runtime protection services and it grew into a platform that we can utilize for many different things. We are using it instead of a CSPM and for visualizing what we call code-to-cloud, our code-to-cloud vision, to better understand the different packages and different dependencies that we have within the cloud runtime. It helps us a lot in understanding which vulnerabilities we should tackle from the code perspective.
Cloud and compute team leader at a manufacturing company with 1,001-5,000 employees
Real User
Top 10
Sep 4, 2025
We use Sweet Security primarily for vulnerability management on all of our cloud assets, mainly AWS, but we also use it for SOC, with the SOC integration getting the events and responding to them.
Sweet Security offers advanced cybersecurity measures designed to protect enterprise-level networks from complex threats, providing efficient monitoring and robust protection capabilities.Focused on sophisticated threat detection and network security, Sweet Security provides an enterprise-grade solution for cybersecurity challenges. It integrates seamlessly with existing systems, offering real-time analytics and threat intelligence. Its comprehensive approach ensures high-level data...
I'm mostly using Sweet Security for real-time infrastructure security. If there is any threat, I want to detect it in real time. That's the main use case. Vulnerability management is one other benefit I am getting from Sweet Security as well.
We are cloud native and are using Sweet Security for call runtime protection. It is much bigger than just runtime protection, but the main use case was bringing Sweet Security for runtime protection services and it grew into a platform that we can utilize for many different things. We are using it instead of a CSPM and for visualizing what we call code-to-cloud, our code-to-cloud vision, to better understand the different packages and different dependencies that we have within the cloud runtime. It helps us a lot in understanding which vulnerabilities we should tackle from the code perspective.
We use Sweet Security primarily for vulnerability management on all of our cloud assets, mainly AWS, but we also use it for SOC, with the SOC integration getting the events and responding to them.