CIO Influence
CIO Influence News Cloud Security

The Datadog Security Inbox Now Contains ID, Vulnerability, and Application-Level Findings

The Datadog Security Inbox Now Contains ID, Vulnerability, and Application-Level Findings

The new capabilities empower DevOps teams to improve security posture, from code to cloud to application, by focusing only on the security problems that matter

Datadog, the monitoring and security platform for cloud applications at AWS re:Invent added identity, vulnerability and app-level findings to Security Inbox. This provides engineers with one actionable view to improve security posture, without any additional overhead or friction. With these new features, Datadog shifts cloud security earlier in the software development lifecycle and empowers developers and security teams to address issues proactively.

PREDICTIONS SERIES 2024 - CIO InfluenceRead More: CIO Influence Interview with Russ Ernst, Chief Technology Officer at Blancco

Datadog’s Security Inbox delivers a unified view of the top issues DevOps and security teams need to address to significantly reduce risk across cloud accounts, Kubernetes clusters, containers and applications. With the capabilities announced today, Datadog helps proactively detect and address identity and access-related risks with the general availability of its Cloud Infrastructure and Entitlement Management (CIEM). And Security Inbox’s new vulnerability management capability detects, prioritizes—based on heuristics like exposure risk, probability of being exploited and all observability context—and helps remediate infrastructure vulnerabilities in hosts, containers and applications.

“Security Inbox gives DevOps and security teams a prioritized list of actionable fixes they can deploy to maximize improvements to their security posture,” said Prashant Prahlad, VP of Cloud Security Products at Datadog. “With the added capabilities to Security Inbox, engineers can now proactively mitigate issues without requiring the security teams to inform them about the urgency or the impact of their security fixes. Meanwhile, security teams continue to save precious time lost to tedious contextualisation and triage work, and can choose to focus on overall security posture of their cloud estates.”

Read More: CIO Influence Interview with Lior Yaari, CEO and Co-Founder at Grip Security

With the new capabilities announced today, Security Inbox gives organizations:

  • Full App-to-Infrastructure Visibility: Security Inbox unifies findings collected by Datadog Cloud Security Management and Application Security Management into a single view, simplifying the process of managing security issues.
  • Context-Based Prioritization: The capability incorporates context from potential suspicious activity detected from cloud logs, application traces or file and process activity detected on the host, enabling teams to concentrate on issues with a high likelihood of impact.
  • Correlation and Attack Path Detection: Datadog uses agentless cloud integrations, one agent and tracing libraries to map the relationships between an organization’s entire stack, spanning from cloud resources and compute resources to applications. When a combination of risks suggesting a potential attack path in the environment is detected, a security issue is generated and displayed in Security Inbox.

Read More: CIO Influence Interview with Antoine Jebara, Co-Founder and GM, MSP Products at JumpCloud

[To participate in our interview series, please write to us at sghosh@martechseries.com]

Related posts

Qualcomm and NEC Further the Commercialization of Virtualized and Open RAN

CIO Influence News Desk

Quectel Announces RG255G MediaTek-Based Module to Drive 5G RedCap Preparations

Business Wire

Guardicore Collaborates with Amdocs to Elevate Globe Telecom’s Cloud Security

CIO Influence News Desk