Datadog's ASM platform unmasks attack flows at code level
The service employs distributed tracing to identify cyber criminals
Datadog, a provider of cloud monitoring and security services, has announced the general availability of its Application Security Monitoring (ASM) platform.
Aimed at eliminating silos between security, development, and operations teams, ASM makes use of “distributed tracing” to alert organizations to potential attacks targeting code-level vulnerabilities in web applications and APIs, including server-side request forgery (SSRF) and cross-site scripting (XSS).
ASM also provides visibility into attack flows, helping teams determine which OWASP threats kindle atypical application behavior. In addition, code-level context provides actionable insights for faster remediation.
“Security threats are increasingly focused on accessing data through an organization's applications by identifying and exploiting vulnerabilities at the code level. These threats bypass legacy, perimeter-based security solutions, which are unable to accurately differentiate between a valid application request and one that poses a security risk,” explained Datadog.
ASM by Datadog complements the firm’s recent acquisition of SaaS-based application security platform Sqreen, which is now fully integrated with Datadog’s cloud security solution.
"Applications are frequent sources of data breaches because security solutions have not kept pace with modern attacks, which focus on exploiting software code vulnerabilities," commented Pierre Betouin, VP of product and cloud security platform at Datadog.
"Legacy, perimeter-based security solutions cannot adequately address the complexity of today's advanced software architectures, which greatly increase the number of applications, APIs and services that must be monitored.
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.
“We believe the answer is to use distributed tracing to more accurately detect attacks that expose organizations to risk. This approach helps teams get visibility on authenticated attacks and those that trigger code-level anomalies, ultimately helping them collaborate and respond to threats more quickly," added Betouin.