Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

March 2024

How to Improve Cybersecurity with Datadog's End-to-End Observability Tailored For the US Government

Watch this webinar to learn how: The Datadog platform helps agencies work across silos that separate development, operations, and security teams to foster collaboration and improve cybersecurity posture Datadog has committed to higher levels of security authorizations, including FedRAMP® High, and Impact Level 5 for DoD agencies Our end-to-end observability platform helps agencies address the unique challenges faced by IT leaders in government, including compliance with stringent security standards outlined in Executive Orders and other regulatory directives.

Datadog Security extends compliance and threat protection capabilities for Google Cloud

Organizations are adopting Google Cloud at a growing rate. This growth is partially influenced by both the rise of AI computing and a push towards multi-cloud usage. A recent report found that 85 percent of organizations deploy their applications on multi-cloud architecture. With the shift to AI computing and multi-cloud adoption, organizations are reconsidering their cloud security coverage now more than ever.

Detect malware in your containers with Datadog Cloud Security Management

Detecting malware in container environments can be a major challenge due to the rapid development of malicious code, the proliferation of insecure container images, and the multilayered complexity of container stacks. Staying ahead of attackers means tracking the constant evolution of malware and rooting out threats in your codebase at the expense of considerable compute.

Detect and stop unauthorized cryptomining in your cloud workloads with Datadog CSM Threats

Cloud environments are susceptible to a wide variety of cyberattacks, making them difficult to secure. Some cyberattacks are easier to detect than others, so a priority in cloud security is having adequate detection and response systems in place to mitigate them. Unauthorized cryptomining has become a prevalent threat in recent years, especially in cloud environments where it can be harder to detect.

Monitor your secure workloads on Kata Containers with Datadog

Kata Containers is an open source project that seeks to enhance security for containers by isolating them in lightweight VMs. Each Kata Container runs with the speed and flexibility of standard containers, and it easily integrates with common container management software—including Docker and Kubernetes.

Meet EO 14028 requirements with Datadog Log Management, Cloud Workload Security, and Cloud SIEM

As of August 2023, only 3 out of 23 US government agencies were compliant with Office of Management and Budget (OMB) requirements for log management and security observability. These requirements are outlined in M-21-31, a 2021 memorandum that was issued following Executive Order 14028 on improving national cybersecurity. Until all of these agencies implement the new requirements, the federal government’s ability to fully detect, investigate, and remediate cybersecurity threats will be constrained.