Security Inbox Enhanced by Datadog for Quick Issue Resolution

0
During AWS re:Invent, Datadog, Inc. added identity, vulnerability, and app-level findings into the Security Inbox. This enhancement offers engineers a unified, actionable perspective to enhance security without added complexity. By introducing these features, Datadog advances cloud security in the software development lifecycle, enabling proactive issue resolution for developers and security teams.

Datadog’s Security Inbox delivers a unified view of the top issues DevOps and security teams need to address to significantly reduce risk across cloud accounts, Kubernetes clusters, containers, and applications. With the capabilities announced today, Datadog helps proactively detect and address identity and access-related risks with the general availability of its Cloud Infrastructure and Entitlement Management (CIEM). And Security Inbox’s new vulnerability management capability detects, prioritizes—based on heuristics like exposure risk, probability of being exploited and all observability context—and helps remediate infrastructure vulnerabilities in hosts, containers and applications.

“Security Inbox gives DevOps and security teams a prioritized list of actionable fixes they can deploy to maximize improvements to their security posture,” said Prashant Prahlad, VP of Cloud Security Products at Datadog. “With the added capabilities to Security Inbox, engineers can now proactively mitigate issues without requiring the security teams to inform them about the urgency or the impact of their security fixes. Meanwhile, security teams continue to save precious time lost to tedious contextualization and triage work, and can choose to focus on overall security posture of their cloud estates.”

With the new capabilities announced today, Security Inbox gives organizations:

  • Full App-to-Infrastructure Visibility: Security Inbox unifies findings collected by Datadog Cloud Security Management and Application Security Management into a single view, simplifying the process of managing security issues.
  • Context-Based Prioritization: The capability incorporates context from potential suspicious activity detected from cloud logs, application traces or file and process activity detected on the host, enabling teams to concentrate on issues with a high likelihood of impact.
  • Correlation and Attack Path Detection: Datadog uses agentless cloud integrations, one agent and tracing libraries to map the relationships between an organization’s entire stack, spanning from cloud resources and compute resources to applications. When a combination of risks suggesting a potential attack path in the environment is detected, a security issue is generated and displayed in Security Inbox.

 

These features are now generally available. To learn more, read the Datadog blog, Easily identify and prioritize your top security risks with Datadog Security Inbox here.

Related News:

Datadog Expands Application Security Capabilities Uncovering Vulnerabilities

Datadog’s Report Finds Major Growth of Container-Based Serverless Platforms

Share.

About Author

Taylor Graham, marketing grad with an inner nature to be a perpetual researchist, currently all things IT. Personally and professionally, Taylor is one to know with her tenacity and encouraging spirit. When not working you can find her spending time with friends and family.