DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

SBOMs are essential to circumventing software supply chain attacks, and they provide visibility into various software components.

Related

  • Maximizing Return on Investment When Securing Our Supply Chains: Where to Focus Our Limited Time to Maximize Reward
  • Compliance Automated Standard Solution (COMPASS), Part 8: Agentic AI Policy as Code for Compliance Automation With Prompt Declaration Language
  • The 7 Biggest Cloud Misconfigurations That Hackers Love (and How to Fix Them)
  • The Cybersecurity Blind Spot in DevOps Pipelines

Trending

  • Testing Java Applications With WireMock and Spring Boot
  • 12 Principles for Better Software Engineering
  • Understanding k-NN Search in Elasticsearch
  • Stop Building Monolithic AI Brains, Build a Specialist Team Instead
  1. DZone
  2. Software Design and Architecture
  3. Security
  4. Datadog Adds Real-Time Security Monitoring With Immunio

Datadog Adds Real-Time Security Monitoring With Immunio

Add real-time security intelligence to the other operational data Datadog provides about your cloud environment and applications.

By 
Mike Milner user avatar
Mike Milner
·
Aug. 08, 16 · News
Likes (1)
Comment
Save
Tweet
Share
12.8K Views

Join the DZone community and get the full member experience.

Join For Free

We at IMMUNIO are longtime fans of Datadog. We’ve used it internally from the start to view our performance metrics and alerts in unified, interactive dashboards. Through its extensive list of integrations, Datadog aggregates critical data and events across the devops stack, making it easier to track and manage the information you need to keep your apps running smoothly.

By adding IMMUNIO to your Datadog integrations, you add real-time security intelligence to the other operational data Datadog provides about your cloud environment and applications, letting you know instantly when your applications are under attack and significantly reducing your response time.

We’ve just announced the availability of IMMUNIO’s new integration with Datadog. We and Datadog recently hosted a joint webinar explaining how you can gain access to IMMUNIO’s critical, real-time metrics and alerts on web app security, right from within the Datadog dashboards. Here’s a breakdown of the highlights:

Datadog is a hosted, infrastructure app monitoring platform that processes a trillion data-points per day. The platform pulls in events and metrics from users’ own apps using its client libraries, generates and uploads JSON-formatted dashboards, and provides a RESTful HTTP API for full data access.

The data provided by your IMMUNIO integration with Datadog will help you gain a clearer sense of what's normal for your system and your apps—so you can quickly identify abnormal activity, determine whether it's malicious, and take immediate action. For example, with IMMUNIO you can:

  • Correlate CPU usage spikes with a brute force login attack
  • Diagnose database query latency by matching to a blind SQL Injection attack
  • Use IMMUNIO to stop bots by automatically serving CAPTCHAs, and set a Datadog alert based on number of CAPTCHAs served

Armed with this information, you can develop and act on customized alerts on the specific metrics that are leading indicators for the issues your customers care most about. The data you’ll gain through the IMMUNIO integration with Datadog allows you to differentiate between attacks on your site, such as Account Takeover attacks, and periods of higher-than-normal traffic.

To get all the details on the integration and to see a full demo illustrating how you can use IMMUNIO within Datadog to analyze and stop an Account Takeover attack, check out the full IMMUNIO/Datadog webinar.

If you’re an existing Datadog user and you like what you see, now’s the time to sign up: we’re offering Datadog users a three-month free trial of IMMUNIO for their first application if you sign up by Aug. 30.

security

Published at DZone with permission of Mike Milner, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

Related

  • Maximizing Return on Investment When Securing Our Supply Chains: Where to Focus Our Limited Time to Maximize Reward
  • Compliance Automated Standard Solution (COMPASS), Part 8: Agentic AI Policy as Code for Compliance Automation With Prompt Declaration Language
  • The 7 Biggest Cloud Misconfigurations That Hackers Love (and How to Fix Them)
  • The Cybersecurity Blind Spot in DevOps Pipelines

Partner Resources

×

Comments

The likes didn't load as expected. Please refresh the page and try again.

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • [email protected]

Let's be friends: