• Skip to main content
  • Skip to secondary menu
  • Skip to footer

Cybersecurity Market

Cybersecurity Technologies & Markets

  • Cybersecurity Events 2026-2027
  • Sponsored Post
  • Market Reports
  • About
    • GDPR
  • Contact

Sweet Security Brings Runtime-CNAPP Power to Windows

October 29, 2025 By CyberNewswire Leave a Comment

Tel Aviv, Israel, October 29th, 2025, CyberNewsWire

Sweet Security Brings Runtime-CNAPP Power to Windows

Sweet Security, a leader in Runtime Cloud and AI security solutions, today announced an extension of its Runtime CNAPP sensor to include Windows environments. With this launch, organizations can secure Windows workloads and applications in the cloud. The new capability brings the same deep visibility, real-time detection, risk prioritization, and automated investigation that power Sweet’s Runtime CNAPP for Linux to one of the most complex and widely used operating systems in the enterprise cloud.

Protecting cloud workloads running on the Windows operating system has long been a challenge due to the complexity and the wide range of attack vectors that adversaries can exploit. Many existing solutions rely on an EDR agent that’s been repurposed for the cloud, but was ultimately designed for totally different attack scenarios than the ones present in the cloud. 

Sweet’s Windows sensor was developed specifically for the cloud using Rust, which allows for minimal resource footprint. Sweet’s Windows sensor covers all the usual attack vectors, such as DLL injection, registry manipulation, PowerShell scripting, etc., in addition to covering application-level requests and responses (Layer 7 data), peering into applications’ behavior.

Like all of Sweet’s runtime signals, the Windows sensor relies on Sweet’s renowned behavioral baselining technology, which allows it to detect not just known attack techniques or binary signatures, but also the abuse of legitimate tools for malicious purposes. The signals are also cross-correlated with cloud audit logs and cloud identities (CDR and ITDR) for maximum context and observability.

In a recent customer evaluation, Sweet’s Windows sensor identified a credential-dumping attempt within seconds. The sensor correlated PowerShell execution, registry export, and file creation anomalies that traditional sensors failed to detect. From detection to full investigation, the entire process took under two minutes, demonstrating how Sweet’s behavioral and AI-powered detection capabilities accelerate response times and reduce investigation noise.

With Sweet’s Windows runtime sensor, customers now have a clear view of activity across all workloads. They are now able to detect and address potential threats faster and with greater confidence, protecting critical workloads and maintaining business continuity.

With the extension to Windows, Sweet Security now leverages its patented LLM-powered correlation and investigation, behavioral baseline, and L7 capabilities to provide full-stack protection for the cloud with its runtime CNAPP, including:

  • Cloud Application Detection and Response (CADR) 
  • Cloud Security Posture Management (CSPM)
  • Kubernetes Security Posture Management (KSPM)
  • Cloud Infrastructure Entitlements Management (CIEM) 
  • Compliance & Governance 
  • Vulnerability Management 
  • CI/CD Pipeline Hardening 
  • Identities Security (ITDR)
  • API Security 
  • Dynamic Application Security Testing (DAST)
  • Data Security (DSPM)

“This launch marks a major step forward for the entire cloud security industry,” said Orel Ben Ishay, co-founder and VP of R&D, Sweet Security. “Windows has historically been a blind spot for runtime protection. By bringing the same depth of behavioral insight, AI-powered detection, and real-time investigation that we deliver for Linux to Windows environments, we are eliminating one of the most significant visibility gaps in cloud security. Detection and full investigation can now take less than two minutes, providing teams with actionable insights faster than ever. This is a foundational step toward our vision of universal runtime protection across all cloud workloads.”

With this launch, Sweet Security continues to redefine runtime-native CNAPP, helping organizations detect and stop sophisticated attacks before they impact critical cloud workloads.

For more information on Sweet’s Windows sensor or Runtime CNAPP, users can book a demo today or contact their customer support representative. 

About Sweet Security

Sweet Security is redefining enterprise cloud protection. As the leading provider of Runtime CNAPP solutions and a pioneer in AI Security, Sweet unifies runtime context with advanced AI intelligence to protect the modern enterprise across applications, workloads, and infrastructure. Its platform delivers real-time detection and response, vulnerability and posture management, identity threat protection, and API security—powered by patent-pending, LLM-driven detection, reducing alert noise to just 0.04%. By bridging cloud and AI security, Sweet enables organizations to accelerate innovation, reduce operational risk, and achieve industry-leading MTTR times.

Privately funded, Sweet is backed by Evolution Equity Partners, Munich Re Ventures, Glilot Capital Partners, CyberArk Ventures, and an elite group of angel investors. For more information, users can visit sweet.security.

Contact

Chloe Amante
Montner Tech PR
[email protected]

Filed Under: News

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Footer

Recent Posts

  • International Cybersecurity Challenge 2026, May 18–21, Gold Coast, Australia
  • Bitdefender Expands GravityZone With Extended Email Security to Close the Inbox Gap
  • The Security Blind Spot Inside the Arduino-Powered IoT Boom
  • Altum Strategy Group: Cybersecurity in 2026 Is No Longer a Technology Problem
  • Trent AI and the Security Layer the Agentic Stack Has Been Missing
  • Gartner Security & Risk Management Summit, June 1–3, 2026, National Harbor, MD
  • Ashdod Port Has Blocked 134,000 Cyberattacks—and Kept Israel’s Trade Moving
  • Black Hat Asia 2026, April 23–24, Singapore
  • World Backup Day 2026: Why Recovery Has Become the Real Test of Cyber Resilience
  • Cyberhaven Launches Agentic AI Security as Shadow Agents Move Onto the Enterprise Endpoint

Media Partners

  • Defense Market
  • Technologies.org
  • Technology Conferences
ATARS Meets the M-346: Why Leonardo and Red 6 May Be Rewriting the Logic of Fighter Training
Dark Eagle: The U.S. Army’s Long-Range Hypersonic Weapon, Brief Overview
The Army Just Launched a Solicitation for a Heavier ISV — Here’s What We Know
The ISV’s $308 Million Budget Request — and Why Congress Is Pushing Back
From Prototype to Full-Rate Production: The ISV’s Development Timeline
ISV Specs and Deployment: How the Army Gets This Vehicle Into a Fight
Meet the ISV: The Army’s Lightweight Vehicle Built for Speed Over Armor
Affordable Mass: DARPA’s Push for Cheap Missiles Signals a Doctrinal Reset in Modern Warfare
Cheap Wins Wars: America’s Late Turn Toward Cost-Asymmetric Weapons
From Scrap to Supremacy: 6K Additive’s $1.95M Bet on Rebuilding the U.S. Defense Material Base
Expo Raises $45 Million to Push Agentic Mobile App Development Into Production Reality
What are the reasons technology companies get acquired?
Resolve AI Raises $40 Million to Build the Missing Layer Between AI Models and Production Reality
Wayve’s $60 Million Extension Matters Because the Intelligence Stays on the Machine
Accenture Bets on Physical AI with General Robotics Investment
NanoTech Materials Raises $29.4 Million to Scale Energy-Saving and Fire-Resistant Coatings
Top 10 Emerging Technologies for 2026
The Machine That Thinks in Two Languages: Quantum Meets Supercomputing in Japan
Lightcast Raises $27 Million to Push Functional Single-Cell Analysis Toward the Lab Bench
TeraLink at 400 Gbps: X-lumin Pushes Free-Space Optics Into Core Infrastructure Territory
COMPUTEX 2026, June 2–5, Taipei Nangang Exhibition Center & Taipei World Trade Center
ENGAGE 2026, April 27–28, New York
NAB Show 2026, April 18–22, Las Vegas
VivaTech 2026, June 17–20, Porte de Versailles, Paris
Accelerate 2026, May 21–22, 2026, Salt Palace Convention Center
JSNation 2026, June 11 & June 15, Amsterdam and Remote
ICMC 2026, July 30–31, Long Beach
Elevate 2026, April 22–24, 2026, Atlanta
WWDC 2026, June 8–12, Cupertino & Online
Zip Forward Europe 2026, April 16, 2026, London

Media Partners

  • Market Analysis
  • Market Research Media
  • Analysis.org
Synera’s $40M Series B: What the Press Release Isn’t Saying
Amazon’s Globalstar Acquisition Is a Spectrum War Dressed as a Satellite Deal
The End of Manual Audits: Why AI-Native Accounting Is Not Optional Anymore
Raspberry Pi’s Earnings Beat Signals a Shift From Hobbyist Hardware to Embedded Infrastructure
Betting the Backbone: A Multi-Year Positioning on AMD, Broadcom, and Nvidia
Nvidia’s Groq 3 LPX: The $20B Bet That Could Define the Inference Era
Why Arm’s New AI Chip Changes the Rules of the Game
A Map Without Hormuz: Rewiring Global Oil Flows Through Fragmented Corridors
RoboForce’s $52 Million Raise Signals That Physical AI Is Moving From Demo Stage to Industrial Scale
The Hormuz Crisis: Winners and Losers in the Global Energy Shock
Canva Acquires Simtheory and Ortto to Build End-to-End Work Platform
Netflix Price Hikes, The Economics of Dominance in a Saturated Streaming Market
America’s Brands Keep Winning Even as America Itself Slips
Kioxia’s Storage Gambit: Flash Steps Into the AI Memory Hierarchy
Mamdani Strangling New York
The Rise of Faceless Creators: Picsart Launches Persona and Storyline for AI Character-Driven Content
Apple TV Arrives on The Roku Channel, Expanding the Streaming Platform Wars
Why Attraction-Grabbing Stations Win at Tech Events
Why Nvidia Let Go of Arm, and Why It Matters Now
When the Market Wants a Story, Not Numbers: Rethinking AMD’s Q4 Selloff
Cloudflare Shares Are Poised for a Jump — Here Is Why the Setup Is Compelling
Nvidia, AMD, and Broadcom Are Rising Again — and the Market Is Telling You Something
OPEC+ in a Blocked Market: Why 200,000 Barrels Don’t Matter
Oil Shock 2026: Hormuz Risk Premium Rewrites the Curve
Why ServiceNow, Salesforce, and Atlassian Fell on the Anthropic Mythos Announcement
Broadcom’s Quiet Power Play: Strong AI Tailwinds, Yet a Stock Caught Between Cycles
Nvidia’s AI Dominance Is Real—So Why Doesn’t the Stock Feel Untouchable?
The Cost of Winning AI: Why Microsoft’s Stock Is Stuck Between Growth and Doubt
Memory Market Reality Check: Micron’s Drop Ripples Across the Sector
The Rise of China’s Hottest New Commodity: AI Tokens

Copyright © 2022 CybersecurityMarket.com

Technologies, Market Analysis & Market Research, Photography