IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Datadog's ASM platform unmasks attack flows at code level

The service employs distributed tracing to identify cyber criminals

Datadog, a provider of cloud monitoring and security services, has announced the general availability of its Application Security Monitoring (ASM) platform.

Aimed at eliminating silos between security, development, and operations teams, ASM makes use of “distributed tracing” to alert organizations to potential attacks targeting code-level vulnerabilities in web applications and APIs, including server-side request forgery (SSRF) and cross-site scripting (XSS).

ASM also provides visibility into attack flows, helping teams determine which OWASP threats kindle atypical application behavior. In addition, code-level context provides actionable insights for faster remediation.

“Security threats are increasingly focused on accessing data through an organization's applications by identifying and exploiting vulnerabilities at the code level. These threats bypass legacy, perimeter-based security solutions, which are unable to accurately differentiate between a valid application request and one that poses a security risk,” explained Datadog.

ASM by Datadog complements the firm’s recent acquisition of SaaS-based application security platform Sqreen, which is now fully integrated with Datadog’s cloud security solution.

"Applications are frequent sources of data breaches because security solutions have not kept pace with modern attacks, which focus on exploiting software code vulnerabilities," commented Pierre Betouin, VP of product and cloud security platform at Datadog. 

Related Resource

Secure hybrid cloud for dummies

Accelerate transformation with hybrid cloud

Whitepaper cover with cartoon man's face wearing glasses in yellow circle with blue, black and yellow colour block backgroundFree Download

"Legacy, perimeter-based security solutions cannot adequately address the complexity of today's advanced software architectures, which greatly increase the number of applications, APIs and services that must be monitored.

“We believe the answer is to use distributed tracing to more accurately detect attacks that expose organizations to risk. This approach helps teams get visibility on authenticated attacks and those that trigger code-level anomalies, ultimately helping them collaborate and respond to threats more quickly," added Betouin.

Featured Resources

Four strategies for building a hybrid workplace that works

All indications are that the future of work is hybrid, if it's not here already

Free webinar

The digital marketer’s guide to contextual insights and trends

How to use contextual intelligence to uncover new insights and inform strategies

Free Download

Ransomware and Microsoft 365 for business

What you need to know about reducing ransomware risk

Free Download

Building a modern strategy for analytics and machine learning success

Turning into business value

Free Download

Recommended

Senate report slams agencies for poor cyber security
cyber security

Senate report slams agencies for poor cyber security

3 Aug 2021
Most employees put their workplace at risk by taking cyber security shortcuts
cyber security

Most employees put their workplace at risk by taking cyber security shortcuts

27 Jul 2021
61% of organizations say improving security a top priority for 2021
cyber security

61% of organizations say improving security a top priority for 2021

29 Jun 2021
ProtectedBy.AI’s CodeLock blocks malware at source code level
software as a service (SaaS)

ProtectedBy.AI’s CodeLock blocks malware at source code level

9 Jun 2021

Most Popular

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack
hacking

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack

16 May 2022
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

13 May 2022
Windows Server admins say latest Patch Tuesday broke authentication policies
Server & storage

Windows Server admins say latest Patch Tuesday broke authentication policies

12 May 2022