App and API Protection | Datadog
  • Manufacturing & Logistics
  • Healthcare/Life Sciences
  • Retail/E-Commerce
  • Government
  • Education
  • Media & Entertainment
  • Technology
  • Gaming
  • Technology

  • Amazon Web Services Monitoring
  • Azure Monitoring
  • Google Cloud Monitoring
  • Oracle Cloud Monitoring
  • Kubernetes Monitoring
  • Red Hat OpenShift
  • Pivotal Platform
  • OpenAI
  • SAP Monitoring
  • OpenTelemetry
  • Use Case

  • Application Security
  • Cloud Migration
  • Monitoring Consolidation
  • Unified Commerce Monitoring
  • SOAR
  • DevOps
  • Shift-Left Testing
  • Digital Experience Monitoring
  • Security Analytics
  • Compliance for CIS Benchmarks
  • Hybrid Cloud Monitoring
  • IoT Monitoring
  • Real-Time BI
  • On-Premises Monitoring
  • Log Analysis & Correlation
  • CNAPP
  • Maintain API security posture and compliance. Detect and respond to threats in production.
    Security

    App and API Protection

    Maintain API security posture and compliance. Detect and respond to threats in production.

    Feature Overview

    Datadog App & API Protection helps Security and DevOps teams secure APIs with unified visibility, posture management, and runtime protection. Unlike traditional Web Application Firewalls or niche API security solutions, Datadog delivers scalable, code-aware security using the same platform teams already trust for observability.


    Comprehensive API Security

    • Continuously discover and monitor all APIs—including undocumented and shadow APIs
    • Detect OWASP API Top 10 risks and leverage integrations (code ownership, tagging) for effective remediation
    • Protect API endpoints by blocking specific IPs, users, or requests

    Protect Against Runtime Threats

    • Visualize how attacks propagate across services with end-to-end attack flows
    • Investigate easily by pivoting to related stack traces, errors, and logs
    • Block malicious requests, users, or IPs in real time, at the edge or in-app
    Protect Against Runtime Threats
    Protect Against Runtime Threats

    Defend Against Business Logic Abuse

    • Instrument sensitive flows (login, checkout, account recovery) in minutes
    • Detect and respond to attacks like Account Takeover and Credential Stuffing
    • Filter out noise with built-in rules that prioritize real business risks
    Defend Against Business Logic Abuse
    Defend Against Business Logic Abuse

    Flexible Deployment and Protection

    • Choose between in-app tracer-based or and perimeter-based deployment options
    • Block threats at the Edge (WAF, CDN, Load Balancer, Reverse Proxy) or in-app service layer using Datadog’s integration and control plane
    Flexible Deployment and Protection
    Flexible Deployment and Protection

    Report: State of DevSecOps

    Learn seven key insights about the 2024 DevSecOps landscape

    What's Next

    Get started today with a 14-day free-trial of App and API Protection


    Learn more

    Request a Demo

    View documentation View pricing