Datadog Adds Identity, Vulnerability and App-Level Findings to Security Inbox to Help DevOps and Security Teams Address Issues Quickly
The new capabilities empower DevOps teams to improve security posture, from code to cloud to application, by focusing only on the security problems that matter
LAS VEGAS ,
"Security Inbox gives DevOps and security teams a prioritized list of actionable fixes they can deploy to maximize improvements to their security posture," said
With the new capabilities announced today, Security Inbox gives organizations:
- Full App-to-Infrastructure Visibility: Security Inbox unifies findings collected by Datadog Cloud Security Management and Application Security Management into a single view, simplifying the process of managing security issues.
- Context-Based Prioritization: The capability incorporates context from potential suspicious activity detected from cloud logs, application traces or file and process activity detected on the host, enabling teams to concentrate on issues with a high likelihood of impact.
- Correlation and Attack Path Detection:
Datadog uses agentless cloud integrations, one agent and tracing libraries to map the relationships between an organization's entire stack, spanning from cloud resources and compute resources to applications. When a combination of risks suggesting a potential attack path in the environment is detected, a security issue is generated and displayed in Security Inbox.
These features are now generally available. To learn more, please visit booth #732 at AWS re:Invent or read more here: https://www.datadoghq.com/blog/security-inbox.
About
Forward-Looking Statements
This press release may include certain "forward-looking statements" within the meaning of Section 27A of the Securities Act of 1933, as amended, or the Securities Act, and Section 21E of the Securities Exchange Act of 1934, as amended including statements on the benefits of new products and features. These forward-looking statements reflect our current views about our plans, intentions, expectations, strategies and prospects, which are based on the information currently available to us and on assumptions we have made. Actual results may differ materially from those described in the forward-looking statements and are subject to a variety of assumptions, uncertainties, risks and factors that are beyond our control, including those risks detailed under the caption "Risk Factors" and elsewhere in our
Contact
press@datadoghq.com
View original content to download multimedia:https://www.prnewswire.com/news-releases/datadog-adds-identity-vulnerability-and-app-level-findings-to-security-inbox-to-help-devops-and-security-teams-address-issues-quickly-301998043.html
SOURCE