Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Identify risky behavior in cloud environments

Risk assessment requires context. One of the primary challenges with protecting cloud environments is understanding how certain activity can lead to risk. Risky behavior can be categorized as any activity or action that increases the likelihood of an attack in your cloud environment. While certain activity may not be malicious on its own, it can expand an environment’s attack surface or indicate post-compromise behavior.

Strategies for accelerating a successful log migration

Log management becomes more challenging as both log volume and diversity rapidly grow. Yet many companies still rely on legacy log management and SIEM solutions that aren’t designed to cost-effectively or securely handle the large scale of logs today coming from sources both in the cloud and on premises.

Cybersecurity Modernization Summit: Moving From Reactive Threat Detection and Response to Proactive

Jake Williams, SVP of Modernization at Scoop News Group and Datadog VP Bianca Lankford for a conversation to learn more about how real-time threat detection paired with rich observability insights is helping organizations to achieve faster security outcomes. This conversation will also address the role auto-remediation plays in the future of government cybersecurity.

Monitor Azure data protection services with Datadog

Azure Backup Vault, Azure Recovery Services Vault, and Azure Site Recovery make up Microsoft’s core suite of data protection and disaster recovery services. Azure’s vaults enable customers to store backups of entire Azure VMs, on-premise workloads, and workloads from Azure services such as Azure SQL Database, Azure Blob, and Azure Database for PostgreSQL. Azure Site Recovery integrates with Azure Recovery Services Vault to extend its backup services to support disaster recovery.

Security and SRE: How Datadog's combined approach aims to tackle security and reliability challenges

Security is essential to cloud-based development, but integrating it into dynamic, distributed environments is difficult. Factors like complex architectures and operational constraints often create roadblocks, which makes it harder to enforce security policies and mitigate threats. These challenges are especially apparent within security organizations, where siloes limit their ability to keep pace with the larger organization as it scales.

Reference Tables is GA + Attacker Clustering & More | TMiDD March #Datadog #technews

What’s new at Datadog? Get up to speed on new features, including Attacker Clustering, Auto Test Retries, and Observability Pipelines integrations with SentinelOne, Amazon S3, Amazon Data Firehose, and AWS Lambda. That’s on This Month in Datadog. Check out the link in our bio to watch the new episode.

Reduce costs and enhance security with cross-region Datadog connectivity using AWS PrivateLink

Modern cloud architectures are increasingly distributed, with applications and services spanning multiple regions to improve availability, reduce latency, and support disaster recovery. Many of our customers rely on solutions like Virtual Private Cloud (VPC) peering, Network Address Translation (NAT) gateways, and AWS Transit Gateways to securely send telemetry to Datadog across regions. These methods work but can add complexity, increase costs, and create potential security risks.

Achieve PCI DSS v4.0.1 compliance with Datadog

In today’s digital economy, businesses that handle credit card transactions must prioritize security to protect customer data and maintain trust. Cyber threats that target payment information continue to evolve, making it essential for organizations to implement strong security controls. The Payment Card Industry Data Security Standard (PCI DSS) was created to establish a set of best practices for securing cardholder data.

This Month in Datadog: Reference Tables is generally available, Attacker Clustering, and more

Datadog is constantly elevating the approach to cloud monitoring and security. This Month in Datadog updates you on our newest product features, announcements, resources, and events. To learn more about Datadog and start a free 14-day trial, visit Cloud Monitoring as a Service | Datadog.