Datadog Improvises to Innovative Log Management Process

By CIOReview | Monday, June 3, 2019

FREMONT, CA: Datadog, one of the eminent pathfinders in the field of analytics and monitoring ventures for contemporary cloud environments, has launched its new HIPAA-compliant Log Management service. The ’enterprise’s healthcare clientele and business associates subject to HIPAA can use the Datadog Log Management service for applications that process, maintain, and store protected health information.

Datadog has been a trailblazing monitoring service for hybrid cloud applications, assisting organizations in improving the agility of their processes. With its aid in increasing the efficiency, and providing end-to-end visibility across multiple platforms, Datadog has created a unique pathway for its own ascent. The service is provided on a SaaS-based data analytics platform that enables DevOps and other teams to pick up the pace. The go-to-market efforts of Datadog enhance the application uptime by successfully completing digital transformation initiatives. Since its launch in 2010, Datadog has been accepted by more than 7,000 enterprises.

The achievement of HIPAA compliance is a part of the ’enterprise’s ongoing commitment to applying elevated standards for privacy and security for all of its customers, including those in highly regulated industries. The protection of individuals’ health information is a solemn responsibility, and the company looks forward to helping healthcare customers build and maintain its technology while meeting that responsibility.

Product security is of supreme importance at Datadog. Software patches are developed as part of the continuous integration process for safety management. The organization also performs continuous integration to respond rapidly―both functional and security issues. As a result, Datadog can achieve resolution within a short time frame for security vulnerabilities and functional issues alike. The results of all its applications are fed into an orchestration platform that triggers automated actions, which may include directly alerting the security team or triggering additional authentication requirements.