Datadog, Inc., the monitoring and security platform for cloud applications, announced 15 months of data retention for Cloud SIEM, with new detection and exploration capabilities so security teams can conduct historical investigations and uncover threats hidden within their cloud and IT environments.
Conducting investigations is time consuming as security teams are constantly importing and archiving older logs to long-term storage. These logs may be spread across multiple environments and geographies for compliance reasons and often must be re-indexed before an investigation can start. Customers may also need to write complex search queries to correlate user activity with other security events to uncover a threat.
CIO INFLUENCE: Nextira Selected by Ansys Technology Partner Program to Support Customers Implementing Ansys Gateway Powered by AWS
Datadog Cloud SIEM visualizes security activity across systems or entities—such as users, devices, IP addresses, apps and network connections—within the organization’s infrastructure for as far back as 15 months.This new capability enables customers to correlate and uncover embedded threats without having to write custom queries or import log data for every investigation.
“Without the ability to retain logs for a long period of time, companies are at risk of missing deep embedded issues that may threaten the availability and integrity of systems, apps, services and data,” said Yash Kumar, Senior Director of Product Management, Cloud SIEM, at Datadog. “With Cloud SIEM, security teams now have a time machine to discover hidden threats and malicious activity. They can visualize and correlate events as far back as 15 months, making historical investigations faster and easier.”
CIO INFLUENCE: CIO Influence Interview with Pete Lilley, Vice President and GM at Instaclustr
[To share your insights with us, please write to sghosh@martechseries.com]