The integrated platform for monitoring & security
Observability
End-to-end, simplified visibility into your stack’s health & performance
インフラ
Applications
ログ
セキュリティ
Detect, prioritize, and respond to threats in real-time
Cloud Security
Application Security
Cloud SIEM
Digital Experience
Optimize front-end performance and enhance user experiences
Related Products
Software Delivery
Build, test, secure and ship quality code faster
Service Management
Integrated, streamlined workflows for faster time-to-resolution
AIOps
AI
Monitor and improve model performance. Pinpoint root causes and detect anomalies
AI Observability
Platform Capabilities
Built-in features & integrations that power the Datadog platform
Built-in Features
Workflows & Collaboration
Extensibility
Industry
テクノロジー
Use Case
Looking for Datadog logos?
You can find the logo assets on our press page.
Learn the common ways attackers take advantage of Google Workspace and how to detect their activity.
Learn how to use custom lookup tables to connect business-critical data to your Cloud SIEM detection rules for ...
Learn how Observability Pipelines can transform your security logs into OCSF format before they leave your ...
Learn the common ways an attacker takes advantage of Microsoft 365 services and how to detect their activity.
Datadog Cloud SIEM security operational metrics provide deep insights into the performance of your security ...
Learn how you can use Datadog Cloud SIEM to get centralized security visibility and threat detection across ...
Learn how to improve secrets management by getting visibility into existing API keys, credentials, and more in ...
Learn how attackers take advantage of Microsoft Entra ID for lateral movement within Azure environments.
Learn how we use our own products to implement and maintain a detection as code methodology across our ...
Learn how you can use Datadog Cloud SIEM to get centralized endpoint security visibility into your SentinelOne ...
Learn how a new content pack for Cloud SIEM lets you leverage Datadog’s Slack integration to perform ...
Learn about the latest additions to Cloud SIEM Content Packs and how they can help you strengthen security ...
Learn about new, out-of-the-box threat detections available in Datadog Cloud SIEM to help you improve security ...
Learn how you can monitor the health and performance of your Teleport services and audit their activity.
Learn how Datadog Cloud SIEM helps you efficiently prioritize security risks and get deeper insights into AWS ...
Learn how Datadog Cloud SIEM enables you to create valuable signals from your historical logs.
Learn how Datadog provides centralized security monitoring for your Google Cloud environment.
Learn how Datadog’s cloud security and logging solutions are fully compliant with US government requirements ...
Learn how visualizing your Google Cloud Armor data within Datadog can help you better protect your application ...
Learn about our new offering, Datadog Cloud SIEM 15-Months Retention, and what customers can expect moving ...
Learn how the Google Cloud Security Command Center integration enables you to quickly detect threats to your ...
Learn about some of the challenges with and recommendations for building sufficient security coverage for your ...
Learn how Content Packs in Datadog Cloud SIEM help you quickly and easily obtain key insights into potential ...
Learn how to use Datadog’s Cloud SIEM Investigator to understand user activity in Azure so you can triage ...
Learn how Sigma's out-of-the-box rules can help your security teams quickly and easily detect threats in your ...
長期にわたるセキュリティ侵害のログデータを調査、視覚化することで、攻撃を理解し、封じ込めます。
Visualize resource access and alert on suspicious network activity with the Twingate integration.
Learn how to use CIDR notation in Datadog Log Management to easily search and analyze network traffic.
Learn how to maximize visibility into firewall activity with Datadog.
Learn how Datadog's Verified Access integration enables you to monitor access attempts across your ...
Learn how saved recent searches, keyboard shortcuts, syntax highlighting, and other features help you build ...
Datadog Workflows enable you to automate tasks necessary to remediate issues, triage security signals, and ...
Learn how you can create tickets to handle issues of any size or scope with Datadog Case Management.
Learn how you can start developing effective identity and access management controls for your cloud-native ...
Learn how Datadog Cloud SIEM provides shared context for security teams and DevOps to monitor activity in ...
Learn best practices for securing application data and getting better visibility into data activity.
Learn how to monitor and alert on key performance metrics for your HCP Boundary instances with Datadog.
Learn how to implement an effective strategy for keeping cloud-native applications secure.
Learn how Datadog analyzes security logs and events from Amazon Security Lake to help you detect and remediate ...
Learn how the Datadog Sensitive Data Scanner enables you to identify and manage sensitive data leaks across ...
Get full visibility into CSP reports so you can detect and address misconfigurations that may be affecting ...
Learn how Datadog can help you identify when an attacker is using your system resources to mine ...
Learn some best practices for implementing an effective data compliance strategy for your environment.
Learn best practices for customizing the logrotate utility for your applications.
Learn how Datadog Cloud SIEM's impossible travel detection rule type can help improve your organization's ...
Learn how to apply formulas and functions to your log data to answer 10 common questions about your ...
Learn how to improve Kubernetes security and mitigate legitimate threats to your applications.
Learn how to create detection rules that enable you to efficiently identify and respond to security threats in ...
Learn about HashiCorp Vault security threats and how to detect them with Datadog.
Learn how Datadog can help you monitor key security and usage metrics for HCP Vault.
Learn how the Sensitive Data Scanner helps you discover, classify, and protect sensitive data in your logs, so ...
Datadog's anomaly detection security rules can help you quickly spot anomalous activity indicating potential ...
Learn how Datadog helps you analyze your Amazon FSx for Windows File Server audit event logs for file access ...
Read this post to see how the executive order establishes a new baseline for agencies' cybersecurity ...
Read our breakdown of key security trends and highlights from the 2021 RSA Conference.
Learn how to use webhooks to automate security operations based on your Datadog monitoring data.
Learn how Datadog collects Salesforce events to help you monitor your environment's security and performance.
Learn how Datadog helps you detect abuse of functionality tactics and techniques that are mapped to the MITRE ...
Learn how to use Datadog Cloud SIEM's new term detection method to secure your AWS environment against ...
A deep dive into the key metrics and logs for monitoring the health and performance of HashiCorp Vault.
Learn how to use Datadog Cloud SIEM's new value detection method to monitor baseline activity across your ...
Learn how to get the most out of your Microsoft Azure platform logs and use them to secure your applications.
Learn some of the key Kubernetes API server audit logs that can help you detect potential threats to your ...
Learn how to monitor authentication logs across your entire environment to more easily identify security ...
Learn how our integration gives you a deeper level of insight into the security and performance of your Microsoft 365 services.
Datadog gives you full visibility into traffic through AWS Network Firewall.
Collect and analyze Oracle Cloud logs with Datadog for more insight into your Oracle Cloud Infrastructure.
Get insights into your Amazon network’s Route 53 DNS traffic with Datadog.
Enable Datadog's Auth0 integration to monitor logs for potential security threats.
Learn how Datadog's integration with Alcide kAudit gives you more visibility into your Kubernetes environment.
Learn how Datadog can help you monitor your Carbon Black Defense logs and get full visibility into endpoint ...
Learn how to monitor your Google Cloud audit logs for better visibility into GCP security with Datadog.
Integrate Cilium with Datadog to ensure your security policies are properly enforced across your containerized ...
Deliver AWS IAM Access Analyzer findings to your Datadog account to ensure your AWS resources are secure.
Proactively monitor Google Workspace user and administrative activity by analyzing and alerting on audit logs ...
Signal Sciences users can see, analyze, and receive alerts from web application activity directly in Datadog.
Datadogを開始