Monitor Twistlock With Datadog | Datadog

Monitor Twistlock with Datadog

Track security and compliance risks alongside the health and performance of all your applications and infrastructure.

Request a Demo

登録にかかる時間はわずか30秒。クレジットカードは不要です。

Request a Demo

登録にかかる時間はわずか30秒。クレジットカードは不要です。

多くの企業で愛用され信頼を得ています

Samsung logo Ubisoft logo Deloitte Cloud logo Cybozuinc logo sansan logo Nginx logo Chef logo Nasdaq logo DreamWorks Animation logo Nikon logo Zynga logo Evernote logo Sonos logo Monotaroco logo

製品の特長

Monitor Security and Compliance Risks in Context

Know where your environment is weakest and where to prioritize your security efforts.
  • Easily detect which parts of your systems are most vulnerable with out-of-the-box dashboards and the live container map
  • Track the number of vulnerable hosts and container images over time, as well as lists of CVEs (common vulnerabilities and exposures)
  • Gain visibility into the health, performance, and security of your entire system with custom dashboards that display Twistlock metrics alongside metrics, traces, and logs from the rest of your stack
dg/210212_Compliance_ComplianceMonitoringOverviewDashboard_Screenshots.png

Rapidly Investigate & Respond to Vulnerability Statuses

Analyze trends in your vulnerabilities over time with Datadog’s built-in log-processing pipeline, which automatically enriches Twistlock logs with attributes.
  • Troubleshoot issues within specific parts of your infrastructure by with the ability to filter and correlate logs to CVEs; know which images to upgrade or downgrade to keep your systems safe
  • Focus on the level of risk that matters most to your system with tags; filter Twistlock data by tag severity
dg/210212_Security_AWSConfigModifidedSignals_Screenshots.png

Alert on Missed Scans & Improve Your Cloud Security

Correct any misconfigurations as soon as possible with real-time alerts that notify you when Twistlock has failed to carry out an expected scan.
  • Receive alerts for warnings or critical statuses when scans are irregular
  • Automatically identify abnormalities with outlier and anomaly detection
dg/210212_Security_SecurityMonitoringOverviewDashboard_Screenshots.png

Simplify Complexity with End-To-End, Unified Visibility

  • Analyze all layers of your cloud environment in just a few clicks; pivot seamlessly from one visualization to the next, from one telemetry to another
  • Align DevOps and Security together with full observability data and an easy-to-use, intuitive, unified platform
  • Easily access detailed observability data: workload events, application logs, infrastructure metrics, audits, and more
  • Enrich security signals with Datadog-managed threat intelligence feeds

Datadogを始める5つのステップ

ステップ1
トライアル登録フォームに入力 わずか30秒で無料でアカウントを作成。クレジットカードは不要
ステップ2
技術スタックに関する基本的な質問に回答 約1分で完了
ステップ3
Datadog エージェントをインストール システムレベルのメトリクスをDatadogプラットフォームに送信
ステップ4
API経由で追加のメトリクスを取得するための認証情報を提供 AWS、Azure、GCPなどのクラウド環境を完全に可視化
ステップ5
すぐに使えるダッシュボードでパフォーマンスを視覚化 環境全体のパフォーマンスをリアルタイムで確認可能

クラウド時代に不可欠なモニタリングとセキュリティのプラットフォーム

Datadogは、エンドツーエンドのトレース、メトリクス、ログを統合し、アプリケーション、インフラストラクチャ、サードパーティ・サービスを完全に可観測にします。

Platform Diagram
See how you can start detecting threats across your applications, network, and infrastructure in minutes.