How Datadog provides cloud-scale monitoring and security

Share
As security threats are increasingly focused on accessing data through an organisation’s applications, we take a look at how Datadog is preventing this

Founded in 2010, Datadog is a monitoring and security platform for cloud applications. 

The company’s SaaS platform integrates and automates infrastructure monitoring, application performance monitoring and log management to provide unified, real-time observability of its customers’ entire technology stack. 

Datadog is used by organisations of all sizes and across a wide range of industries to enable digital transformation and cloud migration, drive collaboration among development, operations, security and business teams, accelerate time to market for applications, reduce time to problem resolution, secure applications and infrastructure, understand user behaviour and track key business metrics.

Helping customers accurately detect attacks 

Datadog, recently announced the general availability of its Application Security Monitoring (ASM) product. ASM uses distributed tracing to help security, development and operations teams accurately detect attacks targeting code-level vulnerabilities, such as server-side-request forgeries (SSRFs), SQL injections, cross-site scripting (XSS) attacks and more.

Applications are a common source of data breaches today. According to Forrester’s The State of Application Security, 2021, “Applications remain a top cause of external breaches, and the prevalence of open source, API, and containers only adds complexity to the security team.”

Datadog ASM uses distributed tracing to provide end-to-end context to help organisations detect threats more accurately and respond quicker. 

“Applications are frequent sources of data breaches because security solutions have not kept pace with modern attacks, which focus on exploiting software code vulnerabilities,” said Pierre Betouin, VP of Product, Cloud Security Platform at Datadog. “Legacy, perimeter-based security solutions cannot adequately address the complexity of today’s advanced software architectures, which greatly increase the number of applications, APIs and services that must be monitored. We believe the answer is to use distributed tracing to more accurately detect attacks that expose organizations to risk. This approach helps teams get visibility on authenticated attacks and those that trigger code-level anomalies, ultimately helping them collaborate and respond to threats more quickly.”

Accelerating cloud journeys 

Datadog also recently become a Microsoft partner within the Azure Cloud Adoption Framework. Backed by the framework—which provides organisations migrating to Azure with recommended tools, practices and documentation—Azure customers can now leverage Datadog’s monitoring and security capabilities to accelerate their adoption of the cloud with confidence.

“The Azure Cloud Adoption Framework gives companies the roadmap they need to successfully migrate their applications to the cloud. I’m proud to welcome Datadog to this programme as a trusted partner in helping companies plan, monitor and accelerate their cloud journeys,” said Madhan Arumugam Ramakrishnan, Vice President of Microsoft Cloud for Industry, ISV Engineering and Architecture.

Datadog is already available natively within the Azure portal and integrates with all Azure services—more than 100 in total—in order to provide essential capabilities.



 

Share

Featured Articles

Why the UK’s Financial Authority Has Issued a Cyber Decree

The UK’s Financial Conduct Authority (FCA) has issued a cyber directive to financial firms following the CrowdStrike IT outage

Sustainability Secured: SolarEdge Devices Cyber Certified

SolarEdge has shown initiative to securing sustainability endeavours by getting certification for its products ahead of incoming mandatory requirements

Kyndryl and AWS: The Cyber Issues Facing the Energy Sector

Kyndryl and AWS survey highlights the cybersecurity readiness gap in energy enterprises, with oil & gas organisations among the top groups at risk

Customer Confidence: Hiscox Reveals Growing Cost of Attacks

Cyber Security

Supply Chain Security: Why Is It Key for the Energy Sector?

Cyber Security

Top 10 OT Platforms

Operational Security