CIO Influence
CIO Influence News Cloud Security

Sweet Security Launches Cloud Native Detection & Response Platform on AWS Marketplace

Sweet Security Launches Cloud Native Detection & Response Platform on AWS Marketplace

photo_2024-11-11_17-22-10.jpg

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS environments

Sweet Security announced the availability of its cloud-native detection and response platform on the Amazon Web Services (AWS) marketplace. Sweet’s solution unifies threat detection across cloud infrastructure, network, workloads, and applications. It provides deep runtime context that enables security teams to quickly extract actual attack narratives from a sea of isolated incidents. Using Sweet, AWS Marketplace customers can detect active threats in real time and respond to them within minutes, enabling them to resolve threats with unprecedented speed – 2-5 minute MTTR – and maintain an agile and resilient environment.

Also Read: Logitech Expands Availability of Refurbished Devices, Offering High-Quality, Affordable Tech for Work and Play

AWS customers visiting AWS re:Invent 2024 in Las Vegas can book a meeting to learn more here.

“Cloud environments are noisy and complex, making them fertile grounds for attackers — deterring them requires detection and response capabilities that, to date, have been aspirational, but we’ve made them table stakes,” said Eyal Fisher, Co-Founder and Chief Product Officer of Sweet Security and former head of the Cyber Operation Center, Unit 8200 (Col., retired). “We’re delighted that our solution is now available to AWS Marketplace customers and look forward to helping them simplify the burden of cloud security and do their jobs faster and better.”

What Makes Sweet so Sweet?

Sweet Security offers detection and response for cloud native environments. Its approach is unique in how it unifies detection across cloud infrastructure, network, workloads, and applications, providing deep runtime context that cuts through the noise and delivers actual attack narratives.

Key Features include:

  • Advanced threat detection and incident response (IR) across infrastructure, network, application, and workload levels.
  • Vulnerability management enriched with runtime insights, reducing CVEs by 99% and putting only the critical risks in front of security personnel.
  • Lean sensor technology that requires minimal resources (50 MB RAM, 0.20% CPU per node) and take only minutes to deploy
  • 30+ out-of-the-box integrations with SIEM, SOAR, notification and ticketing systems, and mor

Sweet empowers security teams to achieve a Mean Time to Detect of 30 seconds (MTTD) and a 2-5 minute Mean Time to Resolve (MTTR), transforming cloud security into a more proactive and effective discipline.

Also Read: CIO Influence Interview with Eric Olden, CEO and Co-founder of Strata Identity

Related posts

Cato Networks Revolutionizes Network Security with Real-Time, Machine Learning-Powered Protection

PR Newswire

Westwin Launches New Simplified Social Media Solution for WeChat and Weibo

CIO Influence News Desk

90% of Security Leaders Believe Their Organization is Falling Short in Addressing Cybersecurity Risk

CIO Influence News Desk