Datadog Improvises to Innovative Log Management Process
FREMONT, CA: Datadog, one of the eminent pathfinders in the field of analytics and monitoring ventures for contemporary cloud environments, has launched its new HIPAA-compliant Log Management service. The ’enterprise’s healthcare clientele and business associates subject to HIPAA can use the Datadog Log Management service for applications that process, maintain, and store protected health information.
Datadog has been a trailblazing monitoring service for hybrid cloud applications, assisting organizations in improving the agility of their processes. With its aid in increasing the efficiency, and providing end-to-end visibility across multiple platforms, Datadog has created a unique pathway for its own ascent. The service is provided on a SaaS-based data analytics platform that enables DevOps and other teams to pick up the pace. The go-to-market efforts of Datadog enhance the application uptime by successfully completing digital transformation initiatives. Since its launch in 2010, Datadog has been accepted by more than 7,000 enterprises.
The achievement of HIPAA compliance is a part of the ’enterprise’s ongoing commitment to applying elevated standards for privacy and security for all of its customers, including those in highly regulated industries. The protection of individuals’ health information is a solemn responsibility, and the company looks forward to helping healthcare customers build and maintain its technology while meeting that responsibility.
Product security is of supreme importance at Datadog. Software patches are developed as part of the continuous integration process for safety management. The organization also performs continuous integration to respond rapidly―both functional and security issues. As a result, Datadog can achieve resolution within a short time frame for security vulnerabilities and functional issues alike. The results of all its applications are fed into an orchestration platform that triggers automated actions, which may include directly alerting the security team or triggering additional authentication requirements.
By Leni Kaufman, VP & CIO, Newport News Shipbuilding
By George Evans, CIO, Singing River Health System
By John Kamin, EVP and CIO, Old National Bancorp
By Elliot Garbus, VP-IoT Solutions Group & GM-Automotive...
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Sam Lamonica, CIO & VP Information Systems, Rosendin...
By Sergey Cherkasov, CIO, PhosAgro
By Pascal Becotte, MD-Global Supply Chain Practice for the...
By Stephen Caulfield, Executive Director, Global Field...
By Shamim Mohammad, SVP & CIO, CarMax
By Ronald Seymore, Managing Director, Enterprise Performance...
By Brad Bodell, SVP and CIO, CNO Financial Group, Inc.
By Jim Whitehurst, CEO, Red Hat
By Clark Golestani, EVP and CIO, Merck
By Scott Craig, Vice President of Product Marketing, Lexmark...
By Dave Kipe, SVP, Global Operations, Scholastic Inc.
By Meerah Rajavel, CIO, Forcepoint
By Amit Bahree, Executive, Global Technology and Innovation,...
By Greg Tacchetti, CIO, State Auto Insurance