Datadog Security

Real-time threat detection

Cloud Security Management

Datadog Cloud Security Management uses an agentless technology within your cloud to scan your entire infrastructure in minutes for vulnerabilities, misconfigurations, identity risks, and compliance violations. In addition, Datadog’s lightweight, open-source agent gives Security and DevOps teams more granular and timely visibility into active risks and threats that can be fixed in a few clicks. Tightly integrated in a unified platform with observability context, Cloud Security Management allows you to detect, prioritize, and fix security issues faster and more effectively to continuously improve your security posture.

  • Secure your entire cloud in minutes with safe agentless security.
  • Confidently adhere to industry and custom compliance benchmarks.
  • Protect your cloud workloads against attacks as they happen.
  • Uncover and remediate excessive permissions to reduce identity risk.
  • Track and improve your cloud infrastructure and Kubernetes security posture.
  • Fix the most critical vulnerabilities across your cloud infrastructure.

Application Security Management

Datadog Application Security Management allows you to manage application security risk with continuous, real-time monitoring of vulnerabilities and threats against your web applications, serverless applications, and APIs in production. Automatically integrated with APM distributed traces and code-level context, Application Security Management empowers development, operations, and security teams to build and run secure applications in production.

  • Focus on open source vulnerabilities which present active risk.
  • Continuously monitor for code-level vulnerabilities in production.
  • Automatically discover your API attack surface.
  • Detect and defend against attacks.

Software Composition Analysis (SCA)

Datadog Software Composition Analysis (SCA) continuously monitors for vulnerable open source libraries in production. With real-time observability context, DevOps and Security teams can easily identify and prioritize the remediation of the highest-impact vulnerabilities before they become costly breaches and apply recommended fixes to resolve issues quickly.

  • Identify open-source security risks in your applications.
  • Prioritize vulnerabilities with active risk.
  • Fast-track resolution with guided remediation.
  • Integrate application security into existing workflows.

Code Security (IAST)

Datadog Code Security detects real code vulnerabilities in production environments by continuously monitoring your application at runtime. With a unique, production-ready Interactive Application Security Testing (IAST) approach, Code Security allows DevOps and Security teams to identify and prioritize the most critical vulnerabilities before they become costly breaches, all while providing actionable insights and recommended fixes.

  • Unify workstreams for code vulnerability management.
  • Accelerate Remediation with Source Code Integration.
  • Detect vulnerabilities in your production code.
  • Prioritize critical vulnerabilities with observability context.

Datadog Cloud SIEM

Datadog Cloud SIEM is built on top of the most advanced log management solution and enables rapid onboarding across teams with an intuitive user experience to elevate your organization’s threat detection and investigation for dynamic, cloud-scale environments. Legacy SIEM tools are unable to deliver effective threat detection and investigation for public cloud environments. With Cloud SIEM, you can analyze operational and security logs in real time—regardless of their volume—while utilizing out-of-the-box integrations and rules to detect threats and investigate them. Developers, security, and operations teams can collaborate faster with a shared view of threats and observability data for essential context to accelerate security investigations in a single, unified platform.

  • Visualize security insights from your logs.
  • Extensive library of out-of-the-box security integrations.
  • 400+ Detection Rules to protect against cloud threats.
  • Accelerate response with workflow automation and case management.
  • Rapid onboarding and operationalization with a cost-effective SIEM.
  • Process, enrich, and route security logs, control costs and simplify onboarding.