Datadog CIEM | Datadog

Datadog CIEM

Identify and address identity risks in your IAM configurations before a threat actor can exploit them.

Request a Demo

登録にかかる時間はわずか30秒。クレジットカードは不要です。

Request a Demo

登録にかかる時間はわずか30秒。クレジットカードは不要です。

多くの企業で愛用され信頼を得ています

Samsung logo Ubisoft logo Deloitte Cloud logo Cybozuinc logo sansan logo Nginx logo Chef logo Nasdaq logo DreamWorks Animation logo Nikon logo Zynga logo Evernote logo Sonos logo Monotaroco logo

製品の特長

Surface Identity Risks Based on Best Practices and Research

  • Automatically detect and prioritize identity risks for users, roles, groups, policies, EC2 instances, and Lambda functions
  • Remain proactive in your defense as new risks are identified by Datadog’s Security Research team who curates the list of identity risks that Datadog CIEM detects
  • Review individual at-risk resources or address one identity risk at a time by grouping all resources (e.g., users, roles, groups, policies) that carry that risk
dg/ciem1.png

Gain Deeper Insights to Efficiently Mitigate Identity Risks

  • Get a detailed description of the issue and suggested remediation steps for every identified risk
  • Detect several IAM roles with unused permissions before a threat actor can leverage these to gain access to your services and resources
  • Receive additional context for understanding the scope of each risk, such as a list of all provisioned permissions for an IAM role that has been identified as unused
dg/ciem2.png

Streamline Collaboration During Investigations

  • Unite Dev, Sec, and Ops teams by seamlessly implementing robust threat detection and incident response processes into existing workflows
  • Declare an incident in a single click to start the remediation process
  • Remediate threats in minutes by automatically identifying the exact owner of the asset, environment variables, and the attack flow gathered from full observability data
dg/csm2.png

Unparalleled Visibility of Your Cloud Infrastructure

  • Continuously scan your cloud environment to map the relationship between all assets
  • Quickly investigate the most critical threats with contexual findings in a single view
  • Prioritize remediating threats your team owns by drilling down by asset: containers, hosts, databases, and more
dg/csm1.png

Get Set Up in Minutes with 900+ Detection Rules and 900+ Integrations

  • Improve your security and compliance posture with 900+ default detection rules mapped to the MITRE ATT&CK® and compliance frameworks
  • Discover in-depth insights into where issues are originating with 900+ vendor-backed integrations, including 100+ fully-supported AWS services
  • Create custom threat rules with an intuitive, easy-to-use query language
  • Get full visibility into your network, identity providers, and SaaS applications with minimal configuration

Datadogを始める5つのステップ

ステップ1
トライアル登録フォームに入力 わずか30秒で無料でアカウントを作成。クレジットカードは不要
ステップ2
技術スタックに関する基本的な質問に回答 約1分で完了
ステップ3
Datadog エージェントをインストール システムレベルのメトリクスをDatadogプラットフォームに送信
ステップ4
API経由で追加のメトリクスを取得するための認証情報を提供 AWS、Azure、GCPなどのクラウド環境を完全に可視化
ステップ5
すぐに使えるダッシュボードでパフォーマンスを視覚化 環境全体のパフォーマンスをリアルタイムで確認可能

クラウド時代に不可欠なモニタリングとセキュリティのプラットフォーム

Datadogは、エンドツーエンドのトレース、メトリクス、ログを統合し、アプリケーション、インフラストラクチャ、サードパーティ・サービスを完全に可観測にします。

Platform Diagram