Datadog's ASM platform unmasks attack flows at code level

Somebody using their phone in front of the Datadog logo
(Image credit: Getty Images)

Datadog, a provider of cloud monitoring and security services, has announced the general availability of its Application Security Monitoring (ASM) platform.

Aimed at eliminating silos between security, development, and operations teams, ASM makes use of “distributed tracing” to alert organizations to potential attacks targeting code-level vulnerabilities in web applications and APIs, including server-side request forgery (SSRF) and cross-site scripting (XSS).

ASM also provides visibility into attack flows, helping teams determine which OWASP threats kindle atypical application behavior. In addition, code-level context provides actionable insights for faster remediation.

“Security threats are increasingly focused on accessing data through an organization's applications by identifying and exploiting vulnerabilities at the code level. These threats bypass legacy, perimeter-based security solutions, which are unable to accurately differentiate between a valid application request and one that poses a security risk,” explained Datadog.

ASM by Datadog complements the firm’s recent acquisition of SaaS-based application security platform Sqreen, which is now fully integrated with Datadog’s cloud security solution.

"Applications are frequent sources of data breaches because security solutions have not kept pace with modern attacks, which focus on exploiting software code vulnerabilities," commented Pierre Betouin, VP of product and cloud security platform at Datadog.


Secure hybrid cloud for dummies

Accelerate transformation with hybrid cloud


"Legacy, perimeter-based security solutions cannot adequately address the complexity of today's advanced software architectures, which greatly increase the number of applications, APIs and services that must be monitored.

“We believe the answer is to use distributed tracing to more accurately detect attacks that expose organizations to risk. This approach helps teams get visibility on authenticated attacks and those that trigger code-level anomalies, ultimately helping them collaborate and respond to threats more quickly," added Betouin.