Datadog CIEM | Datadog

Datadog CIEM

Identify and address identity risks in your IAM configurations before a threat actor can exploit them.

Request a Demo

Loved & Trusted by Thousands

Washington Post logo 21st Century Fox Home Entertainment logo Peloton logo Samsung logo Comcast logo Nginx logo

Product Features

Surface Identity Risks Based on Best Practices and Research

  • Automatically detect and prioritize identity risks for users, roles, groups, policies, EC2 instances, and Lambda functions
  • Remain proactive in your defense as new risks are identified by Datadog’s Security Research team who curates the list of identity risks that Datadog CIEM detects
  • Review individual at-risk resources or address one identity risk at a time by grouping all resources (e.g., users, roles, groups, policies) that carry that risk
dg/ciem1.png

Gain Deeper Insights to Efficiently Mitigate Identity Risks

  • Get a detailed description of the issue and suggested remediation steps for every identified risk
  • Detect several IAM roles with unused permissions before a threat actor can leverage these to gain access to your services and resources
  • Receive additional context for understanding the scope of each risk, such as a list of all provisioned permissions for an IAM role that has been identified as unused
dg/ciem2.png

Streamline Collaboration During Investigations

  • Unite Dev, Sec, and Ops teams by seamlessly implementing robust threat detection and incident response processes into existing workflows
  • Declare an incident in a single click to start the remediation process
  • Remediate threats in minutes by automatically identifying the exact owner of the asset, environment variables, and the attack flow gathered from full observability data
dg/csm2.png

Unparalleled Visibility of Your Cloud Infrastructure

  • Continuously scan your cloud environment to map the relationship between all assets
  • Quickly investigate the most critical threats with contexual findings in a single view
  • Prioritize remediating threats your team owns by drilling down by asset: containers, hosts, databases, and more
dg/csm1.png

Get Set Up in Minutes with 900+ Detection Rules and 900+ Integrations

  • Improve your security and compliance posture with 900+ default detection rules mapped to the MITRE ATT&CK® and compliance frameworks
  • Discover in-depth insights into where issues are originating with 900+ vendor-backed integrations, including 100+ fully-supported AWS services
  • Create custom threat rules with an intuitive, easy-to-use query language
  • Get full visibility into your network, identity providers, and SaaS applications with minimal configuration