Overview
Product Information on Sweet
What is Sweet?
Sweet Pricing
Overall experience with Sweet
“Strong Runtime Security with Excellent AWS Integration, but Limited API and Reporting Flexibility”
“Solid base product with lots of room for improvement”
About Company
Company Description
Sweet Security is a Cloud-Native Application Protection Platform (CNAPP) designed to ensure full-stack security across your cloud environments. Utilizing lightweight eBPF-based sensors, Sweet specializes in real-time visibility, detection, and response capabilities that span cloud infrastructure, workloads, and applications. Built to minimize overhead, streamline investigations, and deliver high accuracy with low false positives, Sweet empowers security teams to respond to threats faster and more effectively.
Company Details
Do You Manage Peer Insights at Sweet Security?
Access Vendor Portal to update and manage your profile.
Key Insights
A Snapshot of What Matters - Based on Validated User Reviews
User Sentiment About Sweet
Reviewer Insights for: Sweet
Deciding Factors: Sweet Vs. Market Average
Performance of Sweet Across Market Features
Sweet Likes & Dislikes
The biggest advantage of Sweet Security is its ability to provide real-time runtime threat detection with high signal and low noise. This helps us quickly identify suspicious activity and prioritize real risks without overwhelming us with alerts. The solution integrates well with our cloud environment and has strengthened our overall cloud security posture.
Ease of deployment, combined presentation of information from multiple cloud providers, smart prioritization of vulnerabilities based on level of exposure.
- Very short SLA - Very good engagement - Clear setup guides for the Runtime sensor, and also integration with third-party solutions - Great observability over events in the environment - Great incident mechanism that supplies overall picture
1 - Reporting and dashboards are limited - While detections are strong, the reporting and visualization capabilities could be more flexible. Creating custom reports or executive-level dashboards requires additional effort and does not yet provide the level of customization we would like. 2 - User interface and workflows can be improved - Some UI workflows are not fully intuitive, especially when navigating between investigations, alerts and context views. Certain actions require multiple clicks and cloud be streamlined to improve analyst efficiency. 3 - No REST API available - Sweet Security currently does not provide a REST API, which limits automation, integration with other tools, and the ability to programmatically fetch data for reporting or workflow management.
Reporting capabilities are pretty lacking. It's very difficult to export compliance reports that show the status of both passing and failing controls.
Logical BI separation with RBAC permissions to narrow down the scope for each team in our organization (like team A will see only findings related to their infrastructure) - this is in the development stage on Sweet Security team
Top Sweet Alternatives
Peer Discussions
Sweet Reviews and Ratings
- IT Security & Risk Management Associate1B-10B USDEnergy and UtilitiesReview Source
Strong Runtime Security with Excellent AWS Integration, but Limited API and Reporting Flexibility
Overall, our experience with Sweet Security has been very positive. The platform provides strong visibility into cloud runtime activity and helps us detect suspicious behavior and potential threats in real time. Deployment and integration wit our AWS environment was straightforward and the product delivers valuable insights with low operational overhead. The support team has been responsive and knowledgeable, which has made onboarding and ongoing tuning much smoother. There is still room for improvement in areas such as reporting and alert customization, but overall the solution has met our expectations and added clear value to our cloud security posture. - Engineer1B-10B USDSoftwareReview Source
Positive Support and Runtime Sensor Integration, RBAC Permissions Await Improvement
From the start of the onboarding session, we felt we were in good hands. The goal is to primarily use runtime sensors across our organization's clusters. Both the overall quality of the product and the support were truly good, better than those of other products we use with their runtime sensor. The installations steps are both clear and efficient and the integration (our SIEM) with our systems was smooth - It Associate50M-1B USDConsumer GoodsReview Source
Precise runtime detection with low noise, string integration, and a team that wants you to succeed.
Sweet Security has been a strong addition to our security stack. The detection quality is genuinely impressive, and the platform is well thought-out -- it's clear the product has been built by people who understand how modern cloud workloads behave. - Group Product Manager50M-1B USDSoftwareReview Source
Early Impressions Highlight Dedication and Intuitive Features of Sweet Security
I have been in the cyber business for 26 years and will say Sweet Security has gone above and beyond working with the various teams, has been responsive and the Sweet Security knowledge is refreshing. It is very apparent that Sweet takes pride in every interaction with their customers and shows a level of dedication that is refreshing, and stands out in the crowded Security market. - Engineer<50M USDSoftwareReview Source
eBPF-Powered Runtime Detection Enhances Kubernetes Security With Minimal System Overhead
I've had a very positive experience with Sweet. One of the standout capabilities is its use of eBPF for runtime detection, which provides deep visibility into system behaviour with minimal overhead. This approach allows for high-fidelity detection at the workload level without requiring intrusive instrumentation, which is especially valuable in dynamic Kubernetes environments. Sweet also provides a solid, high-level overview of cloud activity by leveraging sources like AWS CloudTrail. The centralised visibility into cloud events, combined with runtime insights, gives a well-rounded security perspective across both infrastructure and workloads.



