Security | Datadog

Best practices for monitoring Microsoft Azure platform logs

Learn how to get the most out of your Microsoft Azure platform logs and use them to secure your applications.

Key Kubernetes audit logs for monitoring cluster security

Learn some of the key Kubernetes API server audit logs that can help you detect potential threats to your ...

Best practices for monitoring authentication logs

Learn how to monitor authentication logs across your entire environment to more easily identify security ...

Collect and monitor Microsoft 365 audit logs with Datadog

Learn how our integration gives you a deeper level of insight into the security and performance of your Microsoft 365 services.

Integrate Datadog Compliance Monitoring with your AWS Well-Architected workloads

Improve your compliance posture and speed up the Well-Architected review process with Datadog.

Accelerate security investigations with Datadog Threat Intelligence

Learn how to use Datadog's turn-key threat intelligence to surface potential threats and triage security ...

Automate vulnerability analysis with the Datadog GitHub Action

Install the action to enable easy integration between your application, Continuous Profiler, and Snyk's ...

Secure your infrastructure in real time with Datadog Runtime Security

Learn how you can use Datadog to secure your cloud infrastructure and workloads.

Monitor AWS Network Firewall with Datadog

Datadog gives you full visibility into traffic through AWS Network Firewall.

Track open source security exposure with Snyk and Datadog

Learn how Datadog's Continuous Profiler integrates the Snyk vulnerability database to track security ...

Monitor Auth0 with Datadog

Enable Datadog's Auth0 integration to monitor logs for potential security threats.

Best practices for monitoring AWS CloudTrail logs

Learn how to get the most out of your AWS CloudTrail audit logs.

Introducing Datadog Compliance Monitoring

Detect and analyze cloud asset misconfigurations and unify your security, developer, and operations teams with Datadog Compliance Monitoring.

Monitoring health information systems with HIPAA-compliant logs

Datadog's HIPAA-compliant log management solution enables healthcare organizations to securely capture audit ...

Monitor Carbon Black Defense logs with Datadog

Learn how Datadog can help you monitor your Carbon Black Defense logs and get full visibility into endpoint ...

Best practices for monitoring GCP audit logs

Learn how to monitor your Google Cloud audit logs for better visibility into GCP security with Datadog.

Monitor Cilium with Datadog

Integrate Cilium with Datadog to ensure your security policies are properly enforced across your containerized ...

Monitor AWS IAM Access Analyzer findings with Datadog

Deliver AWS IAM Access Analyzer findings to your Datadog account to ensure your AWS resources are secure.

Signal Sciences brings real-time web attack visibility to Datadog

Signal Sciences users can see, analyze, and receive alerts from web application activity directly in Datadog.

Monitor Twistlock with Datadog

Datadog's new integration with Twistlock allows you to monitor security and compliance alongside your ...

Datadog + SOC 2 Type II: Our constant commitment to security

We're pleased to announce the completion of our SOC 2, Type II, compliance audit.

Secure (and usable) multi-AWS account IAM setup

If you are part of the team managing the AWS infrastructure at your organization, you’ve likely had to wrestle ...

Datadog + SOC 2: Reaffirming our commitment to security

We're pleased to announce the availability of our SOC 2 compliance audit

Datadog teams with IMMUNIO for real-time app security threat monitoring

Integrate IMMUNIO's real-time security intelligence into the other operational data Datadog provides about ...

Signal Sciences + Datadog: improving web application security

The Signal Sciences integration with Datadog brings modern web application security and full-stack awareness ...