Difference between revisions of "Datadog Cloud Security Management (CSM)"
Jump to navigation
Jump to search
Line 3: | Line 3: | ||
* [[Vulnerability management]]: [[Host Vulnerability Management]], [[Container Vulnerability Management]] | * [[Vulnerability management]]: [[Host Vulnerability Management]], [[Container Vulnerability Management]] | ||
* Automated [[compliance checks]] | * Automated [[compliance checks]] | ||
− | * Continuous posture management | + | * [[Continuous posture management]] |
* Real-time threat detection | * Real-time threat detection | ||
* Identity [[risk assessments]] | * Identity [[risk assessments]] |
Revision as of 09:12, 25 June 2024
- Vulnerability management: Host Vulnerability Management, Container Vulnerability Management
- Automated compliance checks
- Continuous posture management
- Real-time threat detection
- Identity risk assessments
Features
- Resource Inventory
- Case Management
- Misconfigurations
- Threat Detection
- Identify Risk
- Host Vulnerability Management
- Container Vulnerability Management
Related
See also
- Terraform datadog, provider,
datadog_user, datadog_monitor_json, datadog_logs_custom_pipeline, datadog_integration_aws, datadog_security_monitoring_rule, datadog_integration_slack_channel
- Datadog, Datadog agent, Forwarder, Spans, DBM, standard attribute list, facets, log explorer, Terraform datadog, Airflow,
dog, agent, DogStatsD
, Airflow integration, Datadog pipelines,app.datadoghq.eu
, Datadog Cloud SIEM, Cloud Security Management, Datadog AWS Integration, Datadog Monitors,dd-trace-go
, DataDog Continuous Profiler, CoScreen, Kubernetes APM
Advertising: