Cloud SIEM | Datadog

Key metrics for measuring your organization's security posture

Learn which metrics provide a better understanding of your ability to respond to threats, manage security ...

Monitor your organization's security posture with Datadog

Learn how Datadog can help you assess your ability to respond to threats, maintain compliance, and track ...

Identify gaps to strengthen detection coverage with the Datadog Cloud SIEM MITRE ATT&CK Map

Learn how the MITRE ATT&CK Map in Datadog Cloud SIEM can help you visualize attack tactics and techniques, ...

Monitor your Atlassian audit records and event logs with Datadog Cloud SIEM

Learn how you can get centralized security visibility and threat detection across your Atlassian Jira and ...

Detect malicious activity in Google Workspace apps with Datadog Cloud SIEM

Learn the common ways attackers take advantage of Google Workspace and how to detect their activity.

Add more context to Cloud SIEM detections and investigations with Datadog Reference Tables

Learn how to use custom lookup tables to connect business-critical data to your Cloud SIEM detection rules for ...

Stream logs in the OCSF format to your preferred security vendors or data lakes with Observability Pipelines

Learn how Observability Pipelines can transform your security logs into OCSF format before they leave your ...

How attackers take advantage of Microsoft 365 services

Learn the common ways an attacker takes advantage of Microsoft 365 services and how to detect their activity.

Measure and optimize security team efficiency with Cloud SIEM security operational metrics

Datadog Cloud SIEM security operational metrics provide deep insights into the performance of your security ...

Monitor your Cisco Umbrella network logs with Datadog Cloud SIEM

Learn how you can use Datadog Cloud SIEM to get centralized security visibility and threat detection across ...

Identify the secrets that make your cloud environment more vulnerable to an attack

Learn how to improve secrets management by getting visibility into existing API keys, credentials, and more in ...

From on-prem to cloud: Detect lateral movement in hybrid Azure environments

Learn how attackers take advantage of Microsoft Entra ID for lateral movement within Azure environments.

...