Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Datadog Launches Application Security Monitoring to Break Down Silos Between Security and Operations Teams

Datadog, Inc., the monitoring and security platform for cloud applications, announced the general availability of its Application Security Monitoring (ASM) product. ASM uses distributed tracing to help security, development and operations teams accurately detect attacks targeting code-level vulnerabilities, such as server-side-request forgeries (SSRFs), SQL injections, cross-site scripting (XSS) attacks and more.

Applications are a common source of data breaches today. According to Forrester’s The State of Application Security, 2021, “Applications remain a top cause of external breaches, and the prevalence of open source, API, and containers only adds complexity to the security team.”

Security threats are increasingly focused on accessing data through an organization’s applications by identifying and exploiting vulnerabilities at the code level. These threats bypass legacy, perimeter-based security solutions, which are unable to accurately differentiate between a valid application request and one that poses a security risk. As software architectures become more and more complex, the need for application security solutions that remove silos between security, development and operations teams grows exponentially.

Recommended AI News: Onix Launches New, Customer-Centric Website

Related Posts
1 of 40,548

Datadog ASM uses distributed tracing to provide end-to-end context to help organizations detect threats more accurately and respond quicker. In concert with the other capabilities of the Datadog Cloud Security Platform across Cloud Security Posture Management (CSPM), Cloud Workload Security (CWS) and Cloud SIEM, this holistic visibility also provides teams with actionable insights that speed up remediation and improve collaboration.

“Applications are frequent sources of data breaches because security solutions have not kept pace with modern attacks, which focus on exploiting software code vulnerabilities,” said Pierre Betouin, VP of Product, Cloud Security Platform at Datadog. “Legacy, perimeter-based security solutions cannot adequately address the complexity of today’s advanced software architectures, which greatly increase the number of applications, APIs and services that must be monitored. We believe the answer is to use distributed tracing to more accurately detect attacks that expose organizations to risk. This approach helps teams get visibility on authenticated attacks and those that trigger code-level anomalies, ultimately helping them collaborate and respond to threats more quickly.”

Recommended AI News: Paradatec Enhances Automated Document Processing Technology, Adds Expanded Data Audit Trails

[To share your insights with us, please write to sghosh@martechseries.com]

Comments are closed.