Security Monitoring | Datadog

Improve Your Cloud Security

Start detecting cloud security threats in real time across your applications, network, and infrastructure within minutes.

Request a Demo

登録にかかる時間はわずか30秒。クレジットカードは不要です。

Request a Demo

登録にかかる時間はわずか30秒。クレジットカードは不要です。

多くの企業で愛用され信頼を得ています

Samsung logo Ubisoft logo Deloitte Cloud logo Cybozuinc logo sansan logo Nginx logo Chef logo Nasdaq logo DreamWorks Animation logo Nikon logo Zynga logo Evernote logo Sonos logo Monotaroco logo

製品の特長

アプリ、ワークロード、インフラストラクチャにわたるフルスタックの防御

  • クラウドインフラ全体を数分で完全に可視化
  • セキュリティ上の問題を自動的に優先順位付けでアラート疲れを軽減し、重大な脅威を軽減
  • クラウド環境内の相互依存関係を可視化するリレーションシップ・グラフで、リソースの悪用範囲と確率を評価
  • 複数のツールを統合した基盤で、DevOpsチームとセキュリティチームの連携をスピードアップ
dg/resourcecatalog.png

Simplify Complexity with End-To-End, Unified Visibility

  • Analyze all layers of your cloud environment in just a few clicks; pivot seamlessly from one visualization to the next, from one telemetry to another
  • Align DevOps and Security together with full observability data and an easy-to-use, intuitive, unified platform
  • Easily access detailed observability data: workload events, application logs, infrastructure metrics, audits, and more
  • Enrich security signals with Datadog-managed threat intelligence feeds

Automatically Detect and Prioritize Cloud Security Risks

  • Strengthen your security posture by identifying risky misconfigurations
  • Improve threat hunting and investigations with real-time detection and in-depth context
  • Prioritize and fix vulnerabilities based on potential business impact
  • Mitigate identity risks, enforce least privilege, and trace attacks across your entire environment
dg/securityinbox.png

Get Set Up in Minutes with 900+ Detection Rules and 800+ Integrations

  • Improve your security and compliance posture with 900+ default detection rules mapped to the MITRE ATT&CK® and compliance frameworks
  • Discover in-depth insights into where issues are originating with 800+ vendor-backed integrations, including 100+ fully-supported AWS services
  • Create custom threat rules with an intuitive, easy-to-use query language
  • Get full visibility into your network, identity providers, and SaaS applications with minimal configuration

Detect Vulnerabilities Faster with Agentless Scanning

  • Gain visibility into risks and vulnerabilities within your hosts, running containers, and serverless functions—without installing agents on every host or where agents cannot be installed
  • Comprehensively monitor entire cloud accounts within minutes, in addition to misconfigurations, identity risks, and more
  • Easily analyze scans of the hosts and functions that are deployed on your cloud accounts to identify all of their associated packages and running containers
  • Maintain complete security by only forwarding the list of packages uncovered—no customer code or snapshots, encrypted or unencrypted, are sent back to Datadog after a snapshot is read
dg/agentless-scanning-headerimage.png

Accelerate Threat Response with an Intuitive Cost-Effective SIEM

  • Obtain immediate time to value, reduce operational overhead with a cloud-native SIEM, focus on threat detection, not hardware maintenace
  • Rapidly analyze threats and easily filter security signals based on key attributes such as severity level, the MITRE ATT&CK® technique, or any associated entity, such as an attacker’s IP
  • Collaborate with multiple teams through integrations with ticketing portals, chat systems, and remediation tools

Datadogを始める5つのステップ

ステップ1
トライアル登録フォームに入力 わずか30秒で無料でアカウントを作成。クレジットカードは不要
ステップ2
技術スタックに関する基本的な質問に回答 約1分で完了
ステップ3
Datadog エージェントをインストール システムレベルのメトリクスをDatadogプラットフォームに送信
ステップ4
API経由で追加のメトリクスを取得するための認証情報を提供 AWS、Azure、GCPなどのクラウド環境を完全に可視化
ステップ5
すぐに使えるダッシュボードでパフォーマンスを視覚化 環境全体のパフォーマンスをリアルタイムで確認可能

クラウド時代に不可欠なモニタリングとセキュリティのプラットフォーム

Datadogは、エンドツーエンドのトレース、メトリクス、ログを統合し、アプリケーション、インフラストラクチャ、サードパーティ・サービスを完全に可観測にします。

Platform Diagram

なぜDatadogなのか?

Real-Time Threat Detection

Detect and analyze malicious activity in real time. Improve your security and compliance posture


No Query Language Required

Users can create custom detection rules through our simple rules editor — no query language required


Out-Of-The-Box Rules

350+ out-of-the-box detection rules - automatically flag threats, misconfigurations, and runtime events


Compliance And Certifications

Track your compliance posture against regulatory frameworks with Datadog