Contact Details

Datadog

Located in United States, New York, New York

Founded in 2010

Best For User Type

  • Website Monitoring
Search

Compare product ratings to similar products Find other products with similar features to suit your business

contact us

Have you used this product before? Find other productswith similar features to suit your business

Write a review

Does this product belong to you

Alternatives to Datadog SIEM

SolarWinds SIEM

SolarWinds SIEM

No ratings yet!
ManageEngine EventLog Analyzer SIEM

ManageEngine EventLog Analyzer SIEM

No ratings yet!
Securonix Next-Generation SIEM

Securonix Next-Generation SIEM

No ratings yet!
LogPoint SIEM

LogPoint SIEM

No ratings yet!
McAfee SIEM

McAfee SIEM

No ratings yet!
IBM QRadar Incident Forensics SIEM

IBM QRadar Incident Forensics SIEM

No ratings yet!
RSA NetWitness SIEM

RSA NetWitness SIEM

No ratings yet!
View all alternatives

What is Datadog SIEM?

Show Less

Contact Details

Datadog

Located in United States, New York, New York

Founded in 2010

Best For User Type

  • Website Monitoring

Top Industries Represented

Data from Grid Report for Security Information And Event Management (Siem) Software

View grid data

Deployment & Support

Deployment

  • Cloud, Saas, Web-based
  • Desktop-mac
  • Desktop-Windows
  • Desktop-Linux
  • Desktop-Chromebook
  • On Promise Windows
  • On Premise Linux
  • Mobile-Android
  • Mobile-Iphone
  • Mobile-Ipad

Support

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live Recap)

Training

  • In Person
  • Live Online
  • Webinars
  • Documentation
  • Videos

Datadog SIEM Pricing  View vendors pricing

Check out our offers for each of our packages to get best out of the software

Visit us on our website to know more

Get a custom quote

Datadog SIEM Features

Primary Features

Log Management

A Log Management System (LMS) is a software solution that gathers, sorts and stores log data and event logs from a variety of sources in one centralized location.

Real Time Monitoring

Real-time monitoring is a technique that allows you to determine the current state of queues and channels within a queue manager.

Threat Intelligence

Threat intelligence, or cyber threat intelligence, is information an organization uses to understand the threats that have, will, or are currently targeting the organization.

Application Security

Application security describes security measures at the application level that aim to prevent data or code within the app from being stolen or hijacked.

Secondary Features

  • Reporting/Analytics
  • Incident Management
  • Reporting & Statistics
  • Event Logs
  • Alerts/Notifications
  • Data Visualization
  • Search/Filter
  • Monitoring

Compare with Similar Products

SolarWinds SIEM

SolarWinds SIEM

ManageEngine EventLog Analyzer SIEM

ManageEngine EventLog Analyzer SIEM

Securonix Next-Generation SIEM

Securonix Next-Generation SIEM

LogPoint SIEM

LogPoint SIEM

LogRhythm Security Information And Event Management SIEM

LogRhythm Security Information And Event Management SIEM

McAfee SIEM

McAfee SIEM

IBM QRadar Incident Forensics SIEM

IBM QRadar Incident Forensics SIEM

Rapid7 Security Information And Event Management SIEM

Rapid7 Security Information And Event Management SIEM

RSA NetWitness SIEM

RSA NetWitness SIEM

OSSEC Security Information And Event Management (Siem) Software

OSSEC Security Information And Event Management (Siem) Software

Show Comparisons