Datadog's ASM platform unmasks attack flows at code level
The service employs distributed tracing to identify cyber criminals
Datadog, a provider of cloud monitoring and security services, has announced the general availability of its Application Security Monitoring (ASM) platform.
Aimed at eliminating silos between security, development, and operations teams, ASM makes use of “distributed tracing” to alert organizations to potential attacks targeting code-level vulnerabilities in web applications and APIs, including server-side request forgery (SSRF) and cross-site scripting (XSS).
ASM also provides visibility into attack flows, helping teams determine which OWASP threats kindle atypical application behavior. In addition, code-level context provides actionable insights for faster remediation.
“Security threats are increasingly focused on accessing data through an organization's applications by identifying and exploiting vulnerabilities at the code level. These threats bypass legacy, perimeter-based security solutions, which are unable to accurately differentiate between a valid application request and one that poses a security risk,” explained Datadog.
ASM by Datadog complements the firm’s recent acquisition of SaaS-based application security platform Sqreen, which is now fully integrated with Datadog’s cloud security solution.
"Applications are frequent sources of data breaches because security solutions have not kept pace with modern attacks, which focus on exploiting software code vulnerabilities," commented Pierre Betouin, VP of product and cloud security platform at Datadog.
Secure hybrid cloud for dummies
Accelerate transformation with hybrid cloudFree Download
"Legacy, perimeter-based security solutions cannot adequately address the complexity of today's advanced software architectures, which greatly increase the number of applications, APIs and services that must be monitored.
“We believe the answer is to use distributed tracing to more accurately detect attacks that expose organizations to risk. This approach helps teams get visibility on authenticated attacks and those that trigger code-level anomalies, ultimately helping them collaborate and respond to threats more quickly," added Betouin.
Activation playbook: Deliver data that powers impactful, game-changing campaigns
Bringing together data and technology to drive better business outcomesFree Download
In unpredictable times, a data strategy is key
Data processes are crucial to guide decisions and drive business growthFree Download
Achieving resiliency with Everything-as-a-Service (XAAS)
Transforming the enterprise IT landscapeFree Download
What is contextual analytics?
Creating more customer value in HR software applicationsFree Download