This site uses cookies to ensure the best viewing experience for our readers.
Former Israeli military cyber chiefs net $33 million Series A for cloud security startup

Former Israeli military cyber chiefs net $33 million Series A for cloud security startup

Sweet Security leverages deep runtime analysis to identify and address cloud risks

Meir Orbach | 14:00, 06.03.24

Six months after coming out of stealth, Sweet Security announced on Wednesday that it has raised a $33 million Series A funding round. The round was led by Evolution Equity Partners, joined by Munich Re Ventures and Glilot Capital Partners. The Israeli startup took its total funding to date to $45 million after raising a $12 million Seed round last August.

Full list of Israeli high-tech funding rounds in 2024

Sweet, which leverages deep runtime analysis to better identify and address cloud risks, will use the funding to scale up its operations in the U.S. and expand its platform.

Sweet Security founders. Sweet Security founders. Sweet Security founders.

Sweet’s offering was the brainchild of co-founder and CEO, retired Brigadier General Dror Kashti, former CISO of the Israel Defense Forces (IDF); retired Colonel Eyal Fisher, former head of the Cyber Department at Unit 8200; and Orel Ben-Ishay, former R&D Cybersecurity Group Leader at the Special Operations Division.

Related articles:

“At first, our broad vision for cloud runtime security was met with skepticism, but we trusted our experience because we have lived the pain our customers experience every day and we knew we could build something they’d love,” said Dror Kashti, co-founder and CEO of Sweet Security. “This round is an incredible validation of our approach; it will enable us to expand our U.S. presence and make cloud runtime insights actionable across a wider set of practitioners.”

In August 2023, Sweet launched its unified runtime security platform for the cloud. Its patent-pending eBPF-based technology identifies critical anomalies across application, network, and non-human identities, generating vital insights on: incidents, vulnerabilities, posture, and secrets.

share on facebook share on twitter share on linkedin share on whatsapp share on mail

TAGS