New York City, NY, USA
Feb 23, 2023 | By Aaron Kaplan
Identifying and evaluating security vulnerabilities is essential at every stage of software development and system management. New vulnerabilities surface all the time, demanding ongoing vigilance as well as effective methods of assessment and response. And recent data shows that this is increasingly the case.
Feb 16, 2023 | By Mallory Mooney
Open source libraries have become an indispensable part of modern applications. Approximately 90% of organizations use open source software to support their services, but monitoring these dependencies can be difficult when environments run thousands of ephemeral services. The complex nature of modern applications, in combination with the challenge of keeping a competitive edge in a fast-moving market, can make it difficult for organizations to identify and remediate threats in a timely manner.
Feb 14, 2023 | By Thomas Sobolik
Securing modern-day production systems is complex and requires a variety of measures—from secure coding practices and security testing to network protection and vulnerability scanning. Scaling these solutions to keep pace with the speed of development teams can be difficult, resulting in sprawling workflows and disparate sets of tooling.
Feb 6, 2023 | By Mallory Mooney
So far in this series, we’ve looked at the importance of securing an organization’s network, application components, and the endpoints that support them. In this post, we’ll look at the following best practices for protecting the different types of data that flow through these components. But first, we’ll look at how modern applications process and manage data, as well as common weaknesses and security threats to these systems.
Jan 18, 2023 | By Karishma Asthana
As your business grows and your services scale in number and complexity, it’s difficult to maintain a rapid pace of innovation while keeping your applications secure. It’s particularly challenging to respond to attacks, as DevOps and security teams need to collaborate to understand each attack’s root cause and remediate the vulnerabilities that enabled it.
Jan 9, 2023 | By Pronoy Chaudhuri
Organizations are scaling their environments at a rapid pace, deploying thousands of cloud resources, services, and accounts. Because of their size and complexity, these environments are more susceptible to compliance issues—a misconfiguration in a single cloud resource can lead to costly data breaches. For that reason, organizations are prioritizing governance, risk, and compliance (GRC) management to ensure that their environments are configured appropriately.
Dec 16, 2022 | By Mallory Mooney
Editor’s note: This is Part 3 of a five-part cloud security series that covers protecting an organization’s network perimeter, endpoints, application code, sensitive data, and service and user accounts from threats. In Parts 1 and 2 of this series, we discussed the importance of protecting the boundaries of networks in cloud environments and best practices for applying efficient security controls to endpoints.
Dec 12, 2022 | By Jordan Obey
The popularity of serverless architectures continues to grow as organizations seek ease of scalability and to eliminate the need to provision and manage infrastructure. In fact, in our most recent State of Serverless report, we found that more than half of our customers have adopted serverless technologies offered by Azure, Google Cloud, and AWS.
Dec 6, 2022 | By Jason Yee
Just like shopping on Black Friday, AWS re:Invent has become a post-Thanksgiving tradition for some of us at Datadog. We were excited to join tens of thousands of fellow AWS users and partners for this annual gathering that features new product announcements, technical sessions, networking, and fun. This year, we saw three themes emerge from the conference announcements and sessions.
Nov 30, 2022 | By Darwin Salazar
With the continual increase of attacks, vulnerabilities, and misconfigurations, today’s security organizations face an uphill battle in securing their cloud environments. These risks often materialize into unaddressed alerts, incidents, and findings in their security products. However, part of the issue is that many security teams are often stretched too thin and overburdened by alert fatigue.
Jan 27, 2023 | By Datadog
The security industry is full of complex terminology like threat, vulnerability, and mitigations. Definitions matter as we design processes that scale. At Datadog, the Security Research functions are focused on detection and response to specific types of threats and vulnerabilities. Workload vulnerabilities, cloud control plane vulnerabilities, and even cloud service provider vulnerabilities. Each security finding based on specific risk indicators needs to be addressed differently at Datadog and in our communications to the broader community.
Jan 26, 2023 | By Datadog
Datadog is constantly elevating the approach to cloud monitoring and security. This Month in Datadog updates you on our newest product features, announcements, resources, and events. To learn more about Datadog and start a free 14-day trial, visit Cloud Monitoring as a Service | Datadog. This month, we put the Spotlight on Cloud Cost Management.
Dec 14, 2022 | By Datadog
Datadog is constantly elevating the approach to cloud monitoring and security. This Month in Datadog updates you on our newest product features, announcements, resources, and events. This month, we put the Spotlight on Universal Service Monitoring..
Dec 8, 2022 | By Datadog
n this video, learn how Datadog’s integrated solutions can increase visibility and improve collaboration between DevOps and security teams in real time. In this session, you will learn how Chad Upton, Vice President of Infrastructure at Firstup, uses Datadog Cloud Security Management to bring together cloud security and observability to enable their engineers to continuously maintain security and compliance best practices across their AWS assets. You’ll also get the chance to hear from Ray Zaman, Solutions Architect at AWS, on how to easily surface and remediate misconfigurations of your AWS environment with Cloud Security Management.
Nov 23, 2022 | By Datadog
Datadog Application Security Management allows you to quickly detect and remediate meaningful attacks targeting your application. This demo shows you how Application Security Management can help you identify at-risk services, block authenticated bad actors, and view code-level vulnerabilities to take action fast.
Nov 21, 2022 | By Datadog
Datadog Cloud Security Management provides security context for your observability data to help you quickly identify threats and misconfigurations across your infrastructure. In this demo, we show you how Cloud Security Management allows you to remediate threats, collaborate with other teams, and declare incidents for further investigation, giving you complete cloud-native application protection.
Nov 15, 2022 | By Datadog
As businesses have modernized and migrated their tech stacks from on-prem to the cloud and broken down monoliths into microservices, security teams have had to evolve. This evolution has led to new tools and new practices to avoid incidents. In this panel moderated by Datadog’s Andrew Krug, we chat with security engineering leaders about the processes they’ve adopted or created to keep modern, distributed systems safe. We also discuss what organizations can do to keep ahead of threats as our systems keep advancing.
Jul 25, 2022 | By Datadog
May 9, 2022 | By Datadog
At Datadog’s scale, with over 18,000 customers sending trillions of data points per day, analyzing the volume of data coming in can be challenging. One of the largest log sources internally at Datadog are networking logs. Being able to analyze and make sense of them is critical to keep Datadog secure. To help with the task, we have built a flow analysis pipeline that alerts against network level Indicators of Compromise (IOCs) like IP address, port combinations, and data exchanged.
May 3, 2022 | By Datadog
Security vulnerabilities can show up anywhere in production. In this talk, Nick Davis from Datadog describes an approach to improve the response to new security vulnerabilities, with specifics around the DirtyPipe vulnerability.
Oct 29, 2018 | By Datadog
As Docker adoption continues to rise, many organizations have turned to orchestration platforms like ECS and Kubernetes to manage large numbers of ephemeral containers. Thousands of companies use Datadog to monitor millions of containers, which enables us to identify trends in real-world orchestration usage. We're excited to share 8 key findings of our research.
Oct 29, 2018 | By Datadog
The elasticity and nearly infinite scalability of the cloud have transformed IT infrastructure. Modern infrastructure is now made up of constantly changing, often short-lived VMs or containers. This has elevated the need for new methods and new tools for monitoring. In this eBook, we outline an effective framework for monitoring modern infrastructure and applications, however large or dynamic they may be.
Oct 1, 2018 | By Datadog
Where does Docker adoption currently stand and how has it changed? With thousands of companies using Datadog to track their infrastructure, we can see software trends emerging in real time. We're excited to share what we can see about true Docker adoption.
Oct 1, 2018 | By Datadog
Build an effective framework for monitoring AWS infrastructure and applications, however large or dynamic they may be. The elasticity and nearly infinite scalability of the AWS cloud have transformed IT infrastructure. Modern infrastructure is now made up of constantly changing, often short-lived components. This has elevated the need for new methods and new tools for monitoring.
Sep 1, 2018 | By Datadog
Like a car, Elasticsearch was designed to allow you to get up and running quickly, without having to understand all of its inner workings. However, it's only a matter of time before you run into engine trouble here or there. This guide explains how to address five common Elasticsearch challenges.
Aug 1, 2018 | By Datadog
Monitoring Kubernetes requires you to rethink your monitoring strategies, especially if you are used to monitoring traditional hosts such as VMs or physical machines. This guide prepares you to effectively approach Kubernetes monitoring in light of its significant operational differences.
- February 2023 (4)
- January 2023 (4)
- December 2022 (5)
- November 2022 (9)
- October 2022 (2)
- September 2022 (2)
- July 2022 (2)
- June 2022 (2)
- May 2022 (4)
- April 2022 (4)
- March 2022 (3)
- February 2022 (4)
- January 2022 (3)
- December 2021 (3)
- November 2021 (4)
- October 2021 (1)
- August 2021 (3)
- July 2021 (6)
- June 2021 (1)
- May 2021 (2)
- April 2021 (7)
- March 2021 (1)
- January 2021 (2)
- December 2020 (7)
- November 2020 (1)
- October 2020 (1)
- September 2020 (2)
- August 2020 (1)
- July 2020 (1)
- June 2020 (1)
- May 2020 (2)
- April 2020 (1)
- November 2019 (1)
- September 2019 (1)
- October 2018 (4)
- September 2018 (1)
- August 2018 (1)
Quotes by TradingView
Datadog is the essential monitoring platform for cloud applications. We bring together data from servers, containers, databases, and third-party services to make your stack entirely observable. These capabilities help DevOps teams avoid downtime, resolve performance issues, and ensure customers are getting the best user experience.
See it all in one place:
- See across systems, apps, and services: With turn-key integrations, Datadog seamlessly aggregates metrics and events across the full devops stack.
- Get full visibility into modern applications: Monitor, troubleshoot, and optimize application performance.
- Analyze and explore log data in context: Quickly search, filter, and analyze your logs for troubleshooting and open-ended exploration of your data.
- Build real-time interactive dashboards: More than summary dashboards, Datadog offers all high-resolution metrics and events for manipulation and graphing.
- Get alerted on critical issues: Datadog notifies you of performance problems, whether they affect a single host or a massive cluster.
Modern monitoring & analytics. See inside any stack, any app, at any scale, anywhere.
- Application Security
- Cloud Monitoring
- Container Monitoring
- Database Monitoring
- Distributed Tracing
- Incident Response
- Infrastructure Monitoring
- Log Analytics
- Performance Monitoring
- Server Monitoring
- Serverless Monitoring
- Synthetic Monitoring
- Threat Detection
- Website Monitoring
- Alternatives to Datadog