Application Security Management | Datadog
Detect, prioritize, and respond to application threats and vulnerabilities in production
Security

Application Security Management

Detect, prioritize, and respond to application threats and vulnerabilities in production

Feature Overview

Datadog helps detect attacks on our serverless apps and triggers an automated response to block them in real time. Application Security Management was easy to enable and configure. With vulnerability detection and severity ratings, we can better prioritize remediation within our service layers.


Detect and defend against attacks

  • Understand how ongoing threats targeting your web and serverless applications are propagating through your service chain with end-to-end attack flows
  • Pivot to errors, associated stack traces, and logs to easily collaborate across teams and eliminate bottlenecks
  • Slow down attackers by blocking suspicious requests or bad actors directly through the Datadog platform
Detect and defend against attacks targeting your applications, APIs, and serverless functions
Detect and defend against attacks targeting your applications, APIs, and serverless functions

Automatically discover your API attack surface

  • Gain visibility into the performance, security, and ownership of all your API endpoints in a single view
  • Surface the most targeted and at-risk endpoints to prioritize remediation efforts
  • Protect API endpoints by automatically blocking specific IPs, users, or requests
Understand the performance, security, and ownership of all your API endpoints
Understand the performance, security, and ownership of all your API endpoints

Continuously monitor for code-level vulnerabilities in production

  • Continuously identify vulnerabilities in application code serving production-level traffic, without the overhead of code scans or time-consuming testing processes
  • Identify the specific input or request that triggered the vulnerability in order to accelerate triage
  • Immediately see the exact vulnerable file, version, and line of code to reduce mean time to remediation

Focus on open source vulnerabilities which present active risk

  • Get end-to-end visibility into vulnerable open source libraries loaded across the CI and production
  • Prioritize open source library vulnerabilities in your code and at runtime with Datadog’s Severity Score, which factors in exposure, CVSS, and real-time threat activity
  • Ensure remediated vulnerabilities make it to production and avoid discrepancies between static and runtime code due to errors in the CI/CD pipeline

Report: State of DevSecOps

Learn seven key insights about the 2024 DevSecOps landscape

What's Next

Get started today with a 14-day free-trial of Application Security Management


Learn more

Request a Demo

View documentation View pricing