Security | Datadog

Prioritize vulnerability remediation with Datadog SCA

See the full context of each vulnerability and its impact on your running code.

State of DevSecOps

We analyzed data from thousands of applications and cloud environments to assess trends in application ...

Report on changes to your security posture with Cloud Security Management

Learn how the Misconfigurations Overview dashboard for Datadog CSM helps you monitor compliance posture trends ...

Secure your Windows workloads with Datadog Cloud Security Management

Learn how Datadog Cloud Security Management detects threats in real time to protect your Windows cloud-native ...

Mitigate the primary risks to API security

Learn about the different types of threat actors that target APIs, their motives, and which common ...

Monitor your Kubernetes security posture with Datadog Cloud Security Management

Kubernetes Security Posture Management helps you benchmark your Kubernetes environment against established ...

Datadog Security extends compliance and threat protection capabilities for Google Cloud

Learn how Datadog provides centralized security monitoring for your Google Cloud environment.

Detect and stop unauthorized cryptomining in your cloud workloads with Datadog CSM Threats

Learn how Datadog detects and stops threat actors who are taking advantage of cloud resources to mine for ...

Detect malware in your containers with Datadog Cloud Security Management

We now supplement our internal threat intelligence with third-party feeds to help you root out evolving ...

Reduce context switching while troubleshooting with Datadog's IDE plugins

Learn how Datadog's plugins for VS Code, Visual Studio, and JetBrains IDEs can help you investigate code ...

Meet EO 14028 requirements with Datadog Log Management, Cloud Workload Security, and Cloud SIEM

Learn how Datadog’s cloud security and logging solutions are fully compliant with US government requirements ...

Monitor network attacks with Google Cloud Armor and Datadog

Learn how visualizing your Google Cloud Armor data within Datadog can help you better protect your application ...

Mitigate vulnerabilities from third-party libraries with Datadog Software Composition Analysis

Learn how Datadog SCA enables teams to secure application services.

Datadog's approach to DevSecOps: An executive perspective

Our VP of Technical Community and Open Source shares his views on the importance of integrating security ...

How we detect and notify users about leaked Datadog credentials

Get details on how we detect and notify users about leaked Datadog keys—and learn about best practices for ...

Secure your web apps running on Azure App Service with Datadog Application Security Management

Learn how Datadog ASM enables you to detect, prioritize, and remediate attacks and vulnerabilities in your web ...

Changes to Datadog Cloud SIEM

Learn about our new offering, Datadog Cloud SIEM 15-Months Retention, and what customers can expect moving ...

Monitor GitHub with Datadog Cloud SIEM

Learn how to use Datadog Cloud SIEM to monitor your GitHub environment for suspicious activity.

Organize and analyze your Google Cloud security findings with Datadog

Learn how the Google Cloud Security Command Center integration enables you to quickly detect threats to your ...

Discover, triage, and remediate sensitive data issues at scale with Sensitive Data Scanner

Learn how Sensitive Data Scanner can help you manage sensitive data, plug leaks, and maintain compliance.

Easily identify and prioritize your top security risks with Datadog Security Inbox

Learn how Datadog Security Inbox equips engineering teams with actionable insights to meaningfully reduce ...

Find and remediate identity risks with Datadog CIEM

Learn how to secure your cloud infrastructure against IAM-based attacks with Datadog CIEM.

Mitigate infrastructure vulnerabilities with Datadog Cloud Security Management

Learn how Datadog CSM Vulnerability Management can help you identify, prioritize, and remediate infrastructure ...

Key learnings from the State of Cloud Security study

We highlight the key takeaways from our 2023 State of Cloud Security study and how Datadog CSM can help.

Enhance application security in production with Datadog Code Security

Learn how Datadog uses your application's existing instrumentation to detect vulnerabilities in production ...

State of Cloud Security

We analyzed data from thousands of organizations to understand the latest trends in cloud security posture.

Security-focused chaos engineering experiments for the cloud

Learn how to approach chaos engineering experiments with the security of your cloud resources in mind.

Build sufficient security coverage for your cloud environment

Learn about some of the challenges with and recommendations for building sufficient security coverage for your ...

Easily ingest and monitor security logs with Cloud SIEM Content Packs

Learn how Content Packs in Datadog Cloud SIEM help you quickly and easily obtain key insights into potential ...

Visualize activity in your Azure environment with Datadog Cloud SIEM Investigator

Learn how to use Datadog’s Cloud SIEM Investigator to understand user activity in Azure so you can triage ...

How we use Datadog CSM to improve security posture in our cloud infrastructure

Learn how Datadog CSM helps our internal security, risk, and engineering teams collaborate to continuously ...

Integrate Sigma detection rules with Datadog Cloud SIEM

Learn how Sigma's out-of-the-box rules can help your security teams quickly and easily detect threats in your ...

Run Atomic Red Team detection tests in container environments with Datadog’s Workload Security Evaluator

Learn how Datadog’s open source Workload Security Evaluator helps you quickly and easily set up a container ...

Changes to Datadog Cloud Security Management

Learn about Datadog's new CSM Pro and CSM Enterprise packages and what to expect moving forward.

Conduct historical security investigations with Datadog Cloud SIEM Investigator

Explore and visualize log data from long-running security breaches to understand and contain attacks.

Find vulnerabilities in your code with Datadog Code Security

Learn how Datadog helps you quickly fix critical vulnerabilities in your code with runtime monitoring, ...

Mitigate identity risks and infrastructure vulnerabilities with Datadog Cloud Security Management

Learn how you can use Datadog Cloud Security Management's latest features to protect your organization from ...

Monitor 1Password with Datadog Cloud SIEM

Learn how to use Datadog’s 1Password integration to monitor your 1Password logs for security issues in real ...

Monitor Cloudflare Zero Trust with Datadog Cloud SIEM

Learn how Datadog’s expanded Cloudflare integration can help you monitor your Cloudflare Zero Trust logs for ...

AWS threat emulation and detection validation with Stratus Red Team and Datadog Cloud SIEM

Learn how to use Stratus Red Team and Datadog Cloud SIEM to emulate AWS attacks and detect new threats.

Enhance SBOMs with runtime security context by using Datadog Software Composition Analysis

Learn how Datadog Software Composition Analysis can complement SBOMs with informative, queryable, and linkable ...

Monitor network access with Twingate’s offering in the Datadog Marketplace

Visualize resource access and alert on suspicious network activity with the Twingate integration.

Use CIDR notation queries to filter your network traffic logs

Learn how to use CIDR notation in Datadog Log Management to easily search and analyze network traffic.

Apply real-time updates to Datadog components with Remote Configuration

Learn how to use Remote Configuration to easily configure the behavior of Datadog components deployed in your ...

Monitor your firewall logs with Datadog

Learn how to maximize visibility into firewall activity with Datadog.

Threat modeling with Datadog Application Security Management

Learn how to develop effective threat models for your system with Datadog Application Security Management.

Enhance corporate application security with AWS Verified Access and Datadog

Learn how Datadog's Verified Access integration enables you to monitor access attempts across your ...

State of Application Security

We analyzed data from thousands of organizations to discover which vulnerabilities really matter, which ...

Search your logs efficiently with Datadog Log Management

Learn how saved recent searches, keyboard shortcuts, syntax highlighting, and other features help you build ...

Automate common security tasks and stay ahead of threats with Datadog Workflows and Cloud SIEM

Datadog Workflows enable you to automate tasks necessary to remediate issues, triage security signals, and ...

Centralize, triage, and track tickets with Datadog Case Management

Learn how you can create tickets to handle issues of any size or scope with Datadog Case Management.

Best practices for identity and access management in cloud-native infrastructure

Learn how you can start developing effective identity and access management controls for your cloud-native ...

Customize rules for detecting cloud misconfigurations with Datadog Cloud Security Management

Learn how Datadog enables you to write custom rules for detecting misconfigurations in your AWS, Azure, and ...

Best practices for detecting and evaluating emerging vulnerabilities

Learn how to assess emerging vulnerabilities and develop an emergency-response playbook.

Gain visibility into open source vulnerabilities with Datadog Application Vulnerability Management

Learn how Datadog Application Vulnerability Management automatically identifies vulnerabilities in open source libraries and custom code.

Ship high-quality, secure code faster with Datadog Code Analysis

Proactively fix and adress code issues and security vulnerabilities before they reach your production ...

Block attackers in your apps with Datadog Application Security Management

Datadog Application Security Management now includes Protection capabilities that enable you to block attack ...

Best practices for data security in cloud-native infrastructure

Learn best practices for securing application data and getting better visibility into data activity.

Monitor Boundary on the HashiCorp Cloud Platform with Datadog

Learn how to monitor and alert on key performance metrics for your HCP Boundary instances with Datadog.

Gain visibility into risks, vulnerabilities, and attacks with APM Security View

APM Security View surfaces security data within the Service Catalog, Service Page, and distributed tracing to ...

Improve the compliance and security posture of your Google Cloud environment with Datadog

Learn how Datadog Cloud Security Management enables you to catch misconfigurations in any Google Cloud ...

Best practices for application security in cloud-native environments

Learn how to implement an effective strategy for keeping cloud-native applications secure.

Secure serverless applications with Datadog ASM

Learn how Datadog ASM can help secure your serverless environments.

Fix common cloud security risks with the Essential Cloud Security Controls Ruleset

Learn how the Essential Cloud Security Controls Ruleset for CSM helps DevOps and security teams manage high ...

Analyze security logs from Amazon Security Lake with Datadog

Learn how Datadog analyzes security logs and events from Amazon Security Lake to help you detect and remediate ...

Visualize activity in your AWS environment with Datadog Cloud SIEM Investigator

Learn how Datadog Cloud SIEM provides shared context for security teams and DevOps to monitor activity in ...

Best practices for endpoint security in cloud-native environments

Learn best practices for securing all the resources and devices connected to either an organization's network ...

Best practices for network perimeter security in cloud-native environments

Learn best practices for securing the boundaries of your cloud network.

Add security context to observability data with Datadog Cloud Security Management

Learn how Datadog Cloud Security Management can help you bridge the gap between security teams and DevOps.

Identify and redact sensitive data in APM, RUM, and Events stream with Sensitive Data Scanner

Learn how the Datadog Sensitive Data Scanner enables you to identify and manage sensitive data leaks across ...

State of AWS Security

We analyzed trends in the implementation of security best practices and took a closer look at various types of ...

Monitor flow logs to ensure VPC security with Datadog

Learn how to use flow logs to identify and troubleshoot VPC security threats.

Analyze VPC Flow Logs for AWS Transit Gateway in Datadog

Integrating VPC Flow Logs for AWS Transit Gateway with Datadog boosts insight into network performance and ...

Catch attacks at the network layer with DNS-based threat detection

Learn how Datadog's DNS-based threat detection rules can help you secure your applications and infrastructure.

The Confluence RCE vulnerability (CVE-2022-26134): Overview, detection, and remediation

Learn how the Confluence RCE vulnerability works, how to detect it, and how Datadog can help you secure your ...

Monitor Content Security Policy violations with Datadog

Get full visibility into CSP reports so you can detect and address misconfigurations that may be affecting ...

How Datadog's IT Team Automated Account Inactivity and SaaS Spend Management

Employees at all modern software companies use a ton of outside pieces of software to do their jobs. Learn how ...

Detect cryptocurrency mining in your environment with Datadog Cloud SIEM

Learn how Datadog can help you identify when an attacker is using your system resources to mine ...

Best practices for reducing sensitive data blindspots and risk

Learn some best practices for implementing an effective data compliance strategy for your environment.

The Spring4Shell vulnerability: Overview, detection, and remediation

Learn how the Spring4Shell vulnerability works, how to detect it, and how Datadog can help you secure your ...

The Dirty Pipe vulnerability: Overview, detection, and remediation

Learn how the Dirty Pipe vulnerability works, how to detect it, and how Datadog can help you secure your ...

How to manage log files using logrotate

Learn best practices for customizing the logrotate utility for your applications.

Detect suspicious login activity with impossible travel detection rules

Learn how Datadog Cloud SIEM's impossible travel detection rule type can help improve your organization's ...

Monitor the security and compliance posture of your Azure environment with Datadog

Learn how Datadog Cloud Security Posture Management enables you to catch misconfigurations in any of your ...

Use Log Analytics to gain application performance, security, and business insights

Learn how to apply formulas and functions to your log data to answer 10 common questions about your ...

Best practices for securing Kubernetes applications

Learn how to improve Kubernetes security and mitigate legitimate threats to your applications.

Introducing Datadog Application Security Management

Datadog Application Security Management empowers security, operations, and development teams to build and run ...

The PwnKit vulnerability: Overview, detection, and remediation

Learn how the PwnKit vulnerability works, how to detect it, and how Datadog can help you secure your systems.

Elevate AWS threat detection with Stratus Red Team

Learn how you can emulate common attack techniques directly in your cloud environment with our new open source ...

Best practices for creating custom detection rules with Datadog Cloud SIEM

Learn how to create detection rules that enable you to efficiently identify and respond to security threats in ...

The Log4j Log4Shell vulnerability: Overview, detection, and remediation

Learn how the Log4Shell vulnerability works, how to detect it, and how Datadog can help you secure your ...

Secure HashiCorp Vault with Datadog Cloud SIEM

Learn about HashiCorp Vault security threats and how to detect them with Datadog.

Monitor your HCP Vault cluster with Datadog

Learn how Datadog can help you monitor key security and usage metrics for HCP Vault.

Build a modern data compliance strategy with Datadog's Sensitive Data Scanner

Learn how the Sensitive Data Scanner helps you discover, classify, and protect sensitive data in your logs, so ...

How to detect security threats in Linux processes

Learn how to spot signs of security threats in Linux processes.

Detect security threats with anomaly detection rules

Datadog's anomaly detection security rules can help you quickly spot anomalous activity indicating potential ...

Highlights from Black Hat USA 2021

Check out highlights from this hybrid conference, including notes from the show floor and our picks for ...

Monitor AWS FSx audit logs with Datadog

Learn how Datadog helps you analyze your Amazon FSx for Windows File Server audit event logs for file access ...

Key takeaways from the U.S. executive order on cybersecurity

Read this post to see how the executive order establishes a new baseline for agencies' cybersecurity ...

Resilience, DevSecOps, and other key takeaways from RSAC 2021

Read our breakdown of key security trends and highlights from the 2021 RSA Conference.

Automate remediation of threats detected by Datadog Cloud SIEM

Learn how to use webhooks to automate security operations based on your Datadog monitoring data.

Monitor Salesforce logs with Datadog

Learn how Datadog collects Salesforce events to help you monitor your environment's security and performance.

Detect application abuse and fraud with Datadog Cloud SIEM

Learn how Datadog helps you detect abuse of functionality tactics and techniques that are mapped to the MITRE ...

How Datadog's IT Team Automated Monitoring Third Party Accounts

Employees at all modern software companies use a ton of outside pieces of software to do their jobs. Learn how ...

Detect unauthorized third parties in your AWS account

Learn how to use Datadog Cloud SIEM's new term detection method to secure your AWS environment against ...

Monitor HashiCorp Vault metrics and logs

A deep dive into the key metrics and logs for monitoring the health and performance of HashiCorp Vault.

Detect anomalous activity in your environment with new value–based Detection Rules

Learn how to use Datadog Cloud SIEM's new value detection method to monitor baseline activity across your ...

Datadog acquires Sqreen to strengthen application security

Datadog has acquired Sqreen, an application security platform for the modern enterprise.

Best practices for monitoring Microsoft Azure platform logs

Learn how to get the most out of your Microsoft Azure platform logs and use them to secure your applications.

Key Kubernetes audit logs for monitoring cluster security

Learn some of the key Kubernetes API server audit logs that can help you detect potential threats to your ...

Best practices for monitoring authentication logs

Learn how to monitor authentication logs across your entire environment to more easily identify security ...

Collect and monitor Microsoft 365 audit logs with Datadog

Learn how our integration gives you a deeper level of insight into the security and performance of your Microsoft 365 services.

Integrate the AWS Well-Architected Tool with Datadog CSPM

Develop secure, reliable applications by integrating the Well-Architected Tool with Datadog.

Accelerate security investigations with Datadog Threat Intelligence

Learn how to use Datadog's turn-key threat intelligence to surface potential threats and triage security ...

Secure your infrastructure in real time with Datadog Cloud Workload Security

Learn how you can use Datadog to secure your cloud infrastructure and production workloads.

Monitor AWS Network Firewall with Datadog

Datadog gives you full visibility into traffic through AWS Network Firewall.

Monitor Oracle Cloud logs with Datadog

Collect and analyze Oracle Cloud logs with Datadog for more insight into your Oracle Cloud Infrastructure.

Datadog monitors Amazon Route 53

Get insights into your Amazon network’s Route 53 DNS traffic with Datadog.

Monitor Auth0 with Datadog

Enable Datadog's Auth0 integration to monitor logs for potential security threats.

Best practices for monitoring AWS CloudTrail logs

Learn how to get the most out of your AWS CloudTrail audit logs.

Monitor Alcide kAudit logs with Datadog

Learn how Datadog's integration with Alcide kAudit gives you more visibility into your Kubernetes environment.

Introducing Datadog Cloud Security Posture Management

Detect and analyze cloud asset misconfigurations and unify your security, developer, and operations teams with Datadog Cloud Security Posture Management.

Monitor Carbon Black Defense logs with Datadog

Learn how Datadog can help you monitor your Carbon Black Defense logs and get full visibility into endpoint ...

Best practices for monitoring GCP audit logs

Learn how to monitor your Google Cloud audit logs for better visibility into GCP security with Datadog.

Monitor Cilium with Datadog

Integrate Cilium with Datadog to ensure your security policies are properly enforced across your containerized ...

Monitor AWS IAM Access Analyzer findings with Datadog

Deliver AWS IAM Access Analyzer findings to your Datadog account to ensure your AWS resources are secure.

Monitor Google Workspace with Datadog

Proactively monitor Google Workspace user and administrative activity by analyzing and alerting on audit logs ...

Announcing Datadog Security Monitoring

Monitor possible threats and unify your security, developer, and operations teams.

Signal Sciences brings real-time web attack visibility to Datadog

Signal Sciences users can see, analyze, and receive alerts from web application activity directly in Datadog.

Secure Publication of Datadog Agent Integrations with TUF and in-toto

How to guarantee end-to-end security when using automation to package and publish Datadog Agent integrations

Secure (and usable) multi-AWS account IAM setup

If you are part of the team managing the AWS infrastructure at your organization, you’ve likely had to wrestle ...

Improving Cloud Security Visibility with ChatOps

Highlights of our recent work to improve our cloud-based monitoring and alerting pipeline.

Datadog teams with IMMUNIO for real-time app security threat monitoring

Integrate IMMUNIO's real-time security intelligence into the other operational data Datadog provides about ...

Build compliance, governance, and transparency across your teams with Datadog Audit Trail

Learn how you can monitor user activity throughout the Datadog platform to ensure compliance, optimize best ...

...
...