Threat Detection | Datadog

State of Application Security

We analyzed data from thousands of organizations to discover which vulnerabilities really matter, which ...

Best practices for identity and access management in cloud-native infrastructure

Learn how you can start developing effective identity and access management controls for your cloud-native ...

Visualize activity in your Google Cloud environment with Datadog Cloud SIEM Investigator

Learn how Datadog Cloud SIEM provides shared context for security teams and DevOps to monitor activity in ...

Best practices for detecting and evaluating emerging vulnerabilities

Learn how to assess emerging vulnerabilities and develop an emergency-response playbook.

Block attackers in your apps with Datadog Application Security Management

Datadog Application Security Management now includes Protection capabilities that enable you to block attack ...

Best practices for data security in cloud-native infrastructure

Learn best practices for securing application data and getting better visibility into data activity.

Gain visibility into risks, vulnerabilities, and attacks with APM Security View

APM Security View surfaces security data within the Service Catalog, Service Page, and distributed tracing to ...

Best practices for application security in cloud-native environments

Learn how to implement an effective strategy for keeping cloud-native applications secure.

Fix common cloud security risks with the Essential Cloud Security Controls Ruleset

Learn how the Essential Cloud Security Controls Ruleset for CSM helps DevOps and security teams manage high ...

Visualize activity in your AWS environment with Datadog Cloud SIEM Investigator

Learn how Datadog Cloud SIEM provides shared context for security teams and DevOps to monitor activity in ...

Best practices for endpoint security in cloud-native environments

Learn best practices for securing all the resources and devices connected to either an organization's network ...

Best practices for network perimeter security in cloud-native environments

Learn best practices for securing the boundaries of your cloud network.