The integrated platform for monitoring & security
Observability
End-to-end, simplified visibility into your stack’s health & performance
インフラ
Applications
ログ
セキュリティ
Detect, prioritize, and respond to threats in real-time
Cloud Security
Application Security
Cloud SIEM
Digital Experience
Optimize front-end performance and enhance user experiences
Related Products
Software Delivery
Build, test, secure and ship quality code faster
Service Management
Integrated, streamlined workflows for faster time-to-resolution
AIOps
AI
Monitor and improve model performance. Pinpoint root causes and detect anomalies
AI Observability
Platform Capabilities
Built-in features & integrations that power the Datadog platform
Built-in Features
Workflows & Collaboration
Extensibility
Industry
テクノロジー
Use Case
Looking for Datadog logos?
You can find the logo assets on our press page.
Read our 2024 research report to understand the latest trends in cloud security posture.
For our 2024 report, we analyzed data from thousands of organizations to understand the latest trends in cloud ...
Learn about the security posture of tens of thousands of applications and adoption of DevSecOps practices.
Datadog は、数千ものアプリケーションとクラウド環境のデータを分析し、アプリケーションセキュリティの状態と DevSecOps のベストプラクティスの採用動向を評価しました。
Learn six facts about real-world cloud security in this research report.
この調査レポートで、実社会でのアプリケーションセキュリティに関する7つのファクトが分かります。
We analyzed data from thousands of organizations to discover which vulnerabilities really matter, which ...
Learn about the state of AWS cloud security in real-world environments. Read the report.
Learn how the Confluence RCE vulnerability works, how to detect it, and how Datadog can help you secure your ...
Learn how the Spring4Shell vulnerability works, how to detect it, and how Datadog can help you secure your ...
Learn how the Dirty Pipe vulnerability works, how to detect it, and how Datadog can help you secure your ...
Learn how the PwnKit vulnerability works, how to detect it, and how Datadog can help you secure your systems.
Learn how the Log4Shell vulnerability works, how to detect it, and how Datadog can help you secure your ...
Learn how to use webhooks to automate security operations based on your Datadog monitoring data.
Data from millions of cores monitored by Datadog shows widespread impacts of the security patches.
Datadogを開始