Threat Monitoring | Datadog

Threat Monitoring

Continuously monitor for security threats across any cloud environment.

Datadog Security Monitoring gives visibility into the entire tech stack in a single pane of glass. With real-time threat monitoring, Datadog analyzes and evaluates security and observability data in order to identify threats and reduce risks. Use configurable out-of-the-box rules—mapped to the MITRE ATT&CK™ framework—to track common attacker techniques, such as a VM enumerating all storage buckets in your account.


Catch brute force attempts with threat monitoring

Detect potential account takeovers in real time by analyzing your full stream of observability and security data.
  • Seamlessly investigate events and logs to remediate valid login attempt in real time
  • Gain quick visibility into detailed attributes for security signals like IP address, geo, user, and more
  • Triage and respond to security threats in a single pane of glass to enable collaboration and strengthen security visibility
Catch brute force attempts with threat monitoring

Monitor threats across applications, network, and infrastructure

Remediate threats in real time across dynamic cloud environments at scale.
  • Monitor for threats and leverage detailed observability data to accelerate security investigations
  • Collaborate across your organization in a single unified platform to break down communication and data silos
  • Quickly enable turnkey threat detection rules with no required query language to start monitoring your environment
Monitor threats across applications, network, and infrastructure

Correlate security threats and compliance misconfigurations to reduce risk

Analyze compliance violations alongside any security signal in a unified view.
  • Quickly assess the scope of potential compliance violations in terms of teams, services, and environments that might be affected
  • Get visibility into security and compliance posture at a glance with pre-built out-of-the-box dashboards
  • Apply out-of-the-box threat monitoring rules to check for PCI and CIS compliance against servers, containers, Kubernetes clusters, and other assets
Correlate security threats and compliance misconfigurations to reduce risk

The Essential Monitoring and Security Platform for the Cloud Age

Datadog brings together end-to-end traces, metrics, and logs to make your applications, infrastructure, and third-party services entirely observable.


Proactive Threat Monitoring

Quickly detect, identify, and respond to security threats.


Security Investigation Dashboards

Simplify your investigations with drag-and-drop, customizable dashboards.



Detect threats and issues using machine learning.


Root cause analysis

Visualize your observability and security data together, seamlessly pivoting between related metrics, traces, and logs.

Threat Monitoring Resources

Learn about threat monitoring in these docs, videos, and blog posts.

Security Monitoring with Datadog

Security Monitoring Blog Posts

Loved & Trusted by Thousands

Washington Post logo 21st Century Fox Home Entertainment logo Peloton logo Samsung logo Comcast logo Nginx logo