Operations | Monitoring | ITSM | DevOps | Cloud

Track GitHub Copilot Usage with Datadog #GitHubCopilot #Datadog #DevTools

Easily track GitHub Copilot usage across your organization with our new integration. On This Month in Datadog, we’re covering this integration, Datadog CoTerm, and the new Optimization page in Datadog Real User Monitoring. Check out the link in our bio to watch the new episode.

Unifying OpenTelemetry & Datadog | #Observability #OpenTelemetry #datadog

Previously, teams had to choose between adopting the OpenTelemetry Collector’s capabilities and fully leveraging our advanced features. On This Month in Datadog, we’re spotlighting our OTel Collector distribution, which unifies OTel and Datadog. Check out the link in our bio to watch the new episode.

This Month in Datadog: OpenTelemetry Collector distribution, GitHub Copilot integration, and more

Datadog is constantly elevating the approach to cloud monitoring and security. This Month in Datadog updates you on our newest product features, announcements, resources, and events. To learn more about Datadog and start a free 14-day trial, visit Cloud Monitoring as a Service | Datadog. This month, we put the Spotlight on the Datadog Distribution of the OpenTelemetry Collector.

Datadog named a Leader in the Forrester Wave: AIOps Platforms, Q2 2025

We are thrilled to announce that Datadog has been named a Leader in the Forrester Wave: AIOps Platforms, Q2 2025. We believe this placement reflects Datadog’s commitment to offering an AI-driven platform that enables customers to observe and secure systems, orient teams, and take action in one place. Datadog sits within your most critical workflows, processing trillions of telemetry data points every hour through your alerts, service maps, teams, on-call schedules, and more.

Identify risky behavior in cloud environments

Risk assessment requires context. One of the primary challenges with protecting cloud environments is understanding how certain activity can lead to risk. Risky behavior can be categorized as any activity or action that increases the likelihood of an attack in your cloud environment. While certain activity may not be malicious on its own, it can expand an environment’s attack surface or indicate post-compromise behavior.

Making profiling visualizations accessible to engineers at all levels

Modern code profilers gather performance data that is highly useful for developers, but the traditional presentation of that data can be challenging to interpret for engineers who are new to profiling. For the Continuous Profiler team at Datadog, our guiding mission is to make profiling a standard practice for all developers by flattening its learning curve and helping teams quickly gain insights into application performance.

How we use our Digital Experience Monitoring products to reduce friction in frontend testing and debugging

Blind spots in frontend monitoring can occur when you’re managing complex modern applications. Browser and device variability, user journeys with intricate workflows and multiple touchpoints, and ephemeral frontend components can all create visibility gaps that make it difficult to identify, understand, and resolve the issues impacting user experience.

Flexible Log Management at Scale for Government

As government agencies scale their IT modernization initiatives and deepen their focus on security, managing and maximizing the value of growing log volumes becomes more challenging. During this webinar, Datadog experts examined how to collect, process, and store large machine-generated data sets, transforming them from noise into actionable intelligence.

Empower your engineering teams with Self-Service Actions in Datadog Software Catalog

Engineering teams constantly balance the need for speed and standardization, but achieving both goals at the same time often feels impossible. Developers’ dependence on platform engineers for support with infrastructure and tooling can create bottlenecks for routine operational tasks such as provisioning environments, troubleshooting incidents, and managing deployments.