Sunday, April 6, 2025
HomePress ReleaseSweet Security Introduces Patent-Pending LLM-Powered Detection Engine, Reducing Cloud Detection Noise to...

Sweet Security Introduces Patent-Pending LLM-Powered Detection Engine, Reducing Cloud Detection Noise to 0.04%

Published on

SIEM as a Service

Follow Us on Google News

Sweet Security, a leader in cloud runtime detection and response, today announced the launch of its groundbreaking patent-pending Large Language Model (LLM)-powered cloud detection engine. This innovation enhances Sweet’s unified detection and response solution, enabling it to reduce cloud detection noise to an unprecedented 0.04%. Sweet uses advanced AI to help security teams navigate complex and dynamic environments with improved precision and confidence.

Detection of Unknown Unknowns

The introduction of Sweet’s patent-pending LLM technology transforms its ability to identify previously undetectable threats. By evaluating cloud variables and anomalies in real-time – and adapting the findings to the nuances of the particular cloud environment – Sweet’s cloud detection engine is capable of uncovering zero-day attacks and “unknown unknowns” — threats that have not been introduced or published to the world. This eliminates the need to predefine what constitutes abnormal or malicious behavior and streamlines the differentiation between unusual activity and actual attacks.

Fast Validation/Vindication of Findings Through Incident Labels

Sweet’s patent-pending LLM-powered cloud detection engine excels at distinguishing between “weird” but benign anomalous activity and genuine threats. Each incident is labeled as either “malicious,” “suspicious,” or “bad practice,” indicating whether the anomaly is indicative of an attack and requires further attention from SecOps or is an unusual but legitimate activity that needs to be reviewed by DevOps. Security teams can eliminate false positives, streamline workflows, and focus their attention where it matters most. The result is unparalleled operational efficiency and reduced alert fatigue.

- Advertisement - Google News

Actionability at Scale

To ensure maximum usability, the new capability delivers actionable insights through:

●       Immediate mapping of “danger zones” in the environment through an intuitive heat map

●       Clear incident labeling, providing context and clarity for security analysts

●       Identification of relevant problem owners within the organization, streamlining incident response

This approach improves response times while promoting collaboration and accountability across teams.

Scaling Application Detection and Response (ADR)

In dynamic cloud environments, Sweet’s patent-pending LLM-powered cloud detection engine enables scalable Application Detection and Response (ADR). It does so by cross-correlating potential attack patterns with extensive application data to identify the ‘smoking gun’—those elusive signals in the data that are indicative of an attack. This capability brings clarity and precision to applications where the sheer volume of data would overwhelm rule-based approaches.

Increased Certainty for Security Teams

With the introduction of this capability, Sweet continues to deliver on its mission to provide clarity and control for cloud environments. By reducing noise, enhancing detection accuracy, and empowering actionable insights, Sweet increases certainty within security teams, enabling them to operate with confidence in even the most complex cloud landscapes.

“This new capability is a game-changer for cloud security,” said Dror Kashti, CEO of Sweet Security. “By harnessing the power of LLMs, we’re not only reducing detection noise to near-zero levels but also providing security teams with the tools they need to act swiftly and decisively. This is a major leap forward in our commitment to delivering unparalleled detection and response for the cloud.”

Sweet Security is dedicated to protecting customer privacy and adheres to strict privacy standards by processing data securely and responsibly.

About Sweet Security

Sweet Security is the leading provider of Cloud Native Detection and Response solutions. Powered by comprehensive runtime insights and behavioral analytics, Sweet’s unified platform correlates data across application, workload, and cloud infrastructure to deliver best-of-breed real-time detections, as well as vulnerability management, identity threat management, and runtime CSPM. By analyzing baseline behaviors across different entities and utilizing its LLM-powered detection engine, Sweet reduces cloud detection noise to 0.04%, helping organizations hit a benchmark of 2-5 min MTTR for all incidents. Privately funded, Sweet is backed by Evolution Equity Partners, Munich Re Ventures, Glilot Capital Partners, CyberArk Ventures, and an elite group of angel investors.

For more information, users can visit http://sweet.security.

Contact

VP of Marketing
Noa Glumcher
Sweet Security
noa@sweet.security

Kaaviya
Kaaviya
Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Latest articles

Hack The box “Ghost” Challenge Cracked – A Detailed Technical Exploit

Cybersecurity researcher "0xdf" has cracked the "Ghost" challenge on Hack The Box (HTB), a...

Sec-Gemini v1 – Google’s New AI Model for Cybersecurity Threat Intelligence

Google has unveiled Sec-Gemini v1, an AI model designed to redefine cybersecurity operations by...

U.S. Secures Extradition of Rydox Cybercrime Marketplace Admins from Kosovo in Major International Operation

The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir...

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Secure Ideas Achieves CREST Accreditation and CMMC Level 1 Compliance

Secure Ideas, a premier provider of penetration testing and security consulting services, proudly announces...

Brinker Named Among “10 Most Promising Defense Tech Startups of 2025”

Brinker, an innovative narrative intelligence platform dedicated to combating disinformation and influence campaigns, has...

SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk

From WannaCry to the MGM Resorts Hack, ransomware remains one of the most damaging...