Infrastructure
Logs
Applications
Security
Digital Experience
Software Delivery
Platform Capabilities
Industry
Technology
Use-case
Looking for Datadog logos?
You can find the logo assets on our press page.
We analyzed data from thousands of organizations to discover which vulnerabilities really matter, which ...
Our latest report examines more than 1.5 billion containers run by tens of thousands of Datadog customers to ...
We analyzed trends in the implementation of security best practices and took a closer look at various types of ...
Learn how the Confluence RCE vulnerability works, how to detect it, and how Datadog can help you secure your ...
Our latest report, which builds on our yearly research on the serverless ecosystem, examines thousands of ...
Learn how the Spring4Shell vulnerability works, how to detect it, and how Datadog can help you secure your ...
Learn how the Dirty Pipe vulnerability works, how to detect it, and how Datadog can help you secure your ...
Learn how the PwnKit vulnerability works, how to detect it, and how Datadog can help you secure your systems.
Learn how the Log4Shell vulnerability works, how to detect it, and how Datadog can help you secure your ...
Building on our yearly reports on how our customers are using containers, we are pleased to share our latest ...
Our latest research examines millions of functions to understand how serverless is being used in the real ...
As serverless technology increases in popularity, we examine how (and how much) serverless is being used in ...
Building on our yearly reports on how our customers are using Docker in the real world, we are pleased to ...
With thousands of companies using Datadog to track their infrastructure, we can see software trends emerging ...
Data from millions of cores monitored by Datadog shows widespread impacts of the security patches.
Our new research shows Amazon's ECS steadily gaining steam
Get Started with Datadog