Threat Detection | Datadog

State of Cloud Security

We analyzed data from thousands of organizations to understand the latest trends in cloud security posture.

Security-focused chaos engineering experiments for the cloud

Learn how to approach chaos engineering experiments with the security of your cloud resources in mind.

Build sufficient security coverage for your cloud environment

Learn about some of the challenges with and recommendations for building sufficient security coverage for your ...

Integrate Sigma detection rules with Datadog Cloud SIEM

Learn how Sigma's out-of-the-box rules can help your security teams quickly and easily detect threats in your ...

Conduct historical security investigations with Datadog Cloud SIEM Investigator

Explore and visualize log data from long-running security breaches to understand and contain attacks.

AWS threat emulation and detection validation with Stratus Red Team and Datadog Cloud SIEM

Learn how to use Stratus Red Team and Datadog Cloud SIEM to emulate AWS attacks and detect new threats.

Monitor Windows event logs with Datadog

Learn how Windows event logs can help you monitor your environment's security boundaries and provide ...

アプリケーション セキュリティ調査レポート

この調査レポートで、実社会でのアプリケーションセキュリティに関する7つのファクトが分かります。

State of Application Security

We analyzed data from thousands of organizations to discover which vulnerabilities really matter, which ...

Best practices for identity and access management in cloud-native infrastructure

Learn how you can start developing effective identity and access management controls for your cloud-native ...

Visualize activity in your Google Cloud environment with Datadog Cloud SIEM Investigator

Learn how Datadog Cloud SIEM provides shared context for security teams and DevOps to monitor activity in ...

Best practices for detecting and evaluating emerging vulnerabilities

Learn how to assess emerging vulnerabilities and develop an emergency-response playbook.