Organizations worldwide are accelerating their shift to the cloud—some are even “born in the cloud,” with no physical servers or on-premises infrastructure. But along with the convenience and efficiency that cloud technology offers comes heightened risk: More systems, more connections, more potential vulnerabilities. Those who assumed the cloud was inherently safe are discovering that some of the most sophisticated attacks actually happen there.

To tackle this challenge, Israeli cybersecurity firm Sweet Security has raised $75 million with the goal of leading cloud protection and making operations safer. The funding round was led by Evolution Equity Partners, with participation from Munich Re Ventures, Glilot Capital Partners, and Key1 Partners, bringing the company’s total funding to $120 million.

The investment comes after a year of rapid growth, during which the company reported a sixfold increase in annual revenue and a tenfold expansion among large enterprises, including Fortune 1000 organizations. The newly raised capital will accelerate global expansion and strengthen technological development, particularly in real-time protection for cloud and AI environments.

Sweet Security.
Sweet Security. (credit: Ben Yitzhaki)

Sweet Security was founded by three veterans of Israeli intelligence cyber units: Brig. Gen. (Res.) Dror Kashti, former head of the Spectrum and Cyber Defense Division and recipient of the Israel Defense Prize in 2011; Col. (Res.) Eyal Fisher, former head of 8200’s Cyber Center; and Orel Ben-Ishi, former head of R&D at Unit 81. The company employs around 80 staff in Israel and the U.S. and is currently recruiting additional developers and product specialists.

According to Brig. Gen. (Res.) Dror Kashti, founder and CEO of the company: “We approach cloud and AI protection differently than existing market solutions. Cloud attacks no longer follow predictable patterns—they evolve dynamically, just like the AI systems organizations are building today. Protecting these environments requires understanding in real time how models, agents, and workloads behave, rather than relying on static snapshots of configurations.”