How Datadog provides cloud-scale monitoring and security

As security threats are increasingly focused on accessing data through an organisation’s applications, we take a look at how Datadog is preventing this

Founded in 2010, Datadog is a monitoring and security platform for cloud applications. 

The company’s SaaS platform integrates and automates infrastructure monitoring, application performance monitoring and log management to provide unified, real-time observability of its customers’ entire technology stack. 

Datadog is used by organisations of all sizes and across a wide range of industries to enable digital transformation and cloud migration, drive collaboration among development, operations, security and business teams, accelerate time to market for applications, reduce time to problem resolution, secure applications and infrastructure, understand user behaviour and track key business metrics.

Helping customers accurately detect attacks 

Datadog, recently announced the general availability of its Application Security Monitoring (ASM) product. ASM uses distributed tracing to help security, development and operations teams accurately detect attacks targeting code-level vulnerabilities, such as server-side-request forgeries (SSRFs), SQL injections, cross-site scripting (XSS) attacks and more.

Applications are a common source of data breaches today. According to Forrester’s The State of Application Security, 2021, “Applications remain a top cause of external breaches, and the prevalence of open source, API, and containers only adds complexity to the security team.”

Datadog ASM uses distributed tracing to provide end-to-end context to help organisations detect threats more accurately and respond quicker. 

“Applications are frequent sources of data breaches because security solutions have not kept pace with modern attacks, which focus on exploiting software code vulnerabilities,” said Pierre Betouin, VP of Product, Cloud Security Platform at Datadog. “Legacy, perimeter-based security solutions cannot adequately address the complexity of today’s advanced software architectures, which greatly increase the number of applications, APIs and services that must be monitored. We believe the answer is to use distributed tracing to more accurately detect attacks that expose organizations to risk. This approach helps teams get visibility on authenticated attacks and those that trigger code-level anomalies, ultimately helping them collaborate and respond to threats more quickly.”

Accelerating cloud journeys 

Datadog also recently become a Microsoft partner within the Azure Cloud Adoption Framework. Backed by the framework—which provides organisations migrating to Azure with recommended tools, practices and documentation—Azure customers can now leverage Datadog’s monitoring and security capabilities to accelerate their adoption of the cloud with confidence.

“The Azure Cloud Adoption Framework gives companies the roadmap they need to successfully migrate their applications to the cloud. I’m proud to welcome Datadog to this programme as a trusted partner in helping companies plan, monitor and accelerate their cloud journeys,” said Madhan Arumugam Ramakrishnan, Vice President of Microsoft Cloud for Industry, ISV Engineering and Architecture.

Datadog is already available natively within the Azure portal and integrates with all Azure services—more than 100 in total—in order to provide essential capabilities.



 

Share

Featured Articles

How Microsoft Is Helping Rural Hospitals Get Cyber Secure

Microsoft is giving rural hospitals a hand to help them get their cybersecurity up to snuff to keep them running amid the rising attacks on healthcare

SpiceRAT: Cisco Talo Sound Alarm Over New Trojan

Remote Access Trojans are resurfacing, and Cisco Talo shows they are doing so with increased sophistication

CrowdStrike & HPE: Unifying IT and Security for Secure AI

CrowdStrike and HPE are joining to integrate their Falcon platform and GreenLake cloud and OpsRamp AIOps to give an overview of AI infrastructure

Zscaler and NVIDIA Join to Upskill Zero Trust with Gen AI

Network Security

Gigamon Sound Alarm on Cloud Security as Unseen Attacks Soar

Cloud Security

Helping APAC Curb the Threat of Cyber Attacks

Hacking & Malware