SEARCH FINANCIAL SERVICES INFRASTRUCTURE SECURITY SCIENCE INTERVIEWS

 

     

Datadog Application Security Monitoring GA

May 4, 2022

ASM uses distributed tracing to help security, development and operations teams accurately detect attacks targeting code-level vulnerabilities, such as server-side-request forgeries (SSRFs), SQL injections, cross-site scripting (XSS) attacks and more.

Applications are a common source of data breaches today. According to Forrester's The State of Application Security, 2021, "Applications remain a top cause of external breaches, and the prevalence of open source, API, and containers only adds complexity to the security team."

Security threats are increasingly focused on accessing data through an organization's applications by identifying and exploiting vulnerabilities at the code level. These threats bypass legacy, perimeter-based security solutions, which are unable to accurately differentiate between a valid application request and one that poses a security risk. As software architectures become more and more complex, the need for application security solutions that remove silos between security, development and operations teams grows exponentially.

Datadog ASM uses distributed tracing to provide end-to-end context to help organizations detect threats more accurately and respond quicker. In concert with the other capabilities of the Datadog Cloud Security Platform across Cloud Security Posture Management (CSPM), Cloud Workload Security (CWS) and Cloud SIEM, this holistic visibility also provides teams with actionable insights that speed up remediation and improve collaboration.

"Applications are frequent sources of data breaches because security solutions have not kept pace with modern attacks, which focus on exploiting software code vulnerabilities," said Pierre Betouin, VP of Product, Cloud Security Platform at Datadog. "Legacy, perimeter-based security solutions cannot adequately address the complexity of today's advanced software architectures, which greatly increase the number of applications, APIs and services that must be monitored. We believe the answer is to use distributed tracing to more accurately detect attacks that expose organizations to risk. This approach helps teams get visibility on authenticated attacks and those that trigger code-level anomalies, ultimately helping them collaborate and respond to threats more quickly."

Application Security Monitoring builds on Datadog's April 2021 acquisition of Sqreen, which has been fully integrated into the Datadog Cloud Security Platform to provide a unified user experience and more comprehensive capabilities. The product is generally available for customers today.

Terms of Use | Copyright 2002 - 2022 CONSTITUENTWORKS SM  CORPORATION. All rights reserved. | Privacy Statement