List of Datadog Integrations
This is a list of platforms and tools that integrate with Datadog. This list is updated as of September 2025.
-
1
Linkerd
Buoyant
Enhance Kubernetes security and performance effortlessly with ease.Linkerd significantly improves the security, observability, and reliability of your Kubernetes setup without requiring any changes to the existing codebase. It is licensed under Apache and has a vibrant, growing, and friendly community surrounding it. Developed with Rust, the data plane proxies of Linkerd are incredibly lightweight, weighing in at under 10 MB, and they deliver impressive performance with sub-millisecond latency for 99th percentile requests. There’s no need for complicated APIs or intricate configurations to grapple with. In many cases, Linkerd runs effortlessly right after installation. The control plane can be deployed within a single namespace, facilitating a gradual and secure service integration into the mesh. Furthermore, it offers a comprehensive suite of diagnostic tools, such as automatic mapping of service dependencies and real-time traffic monitoring. Its exceptional observability capabilities enable you to monitor vital metrics, including success rates, request volumes, and latency, ensuring every service in your stack performs at its best. This allows development teams to concentrate on building their applications while reaping the benefits of improved operational visibility and insights. As a result, Linkerd stands out as a valuable addition to any cloud-native architecture. -
2
Contrast Assess
Contrast Security
Transforming software security with proactive, seamless integration tools.A revolutionary method for enhancing security in contemporary software development has been introduced. This technique integrates security measures directly into the development toolchain, facilitating the swift resolution of issues shortly after installation. Contrast agents continuously oversee the code and generate insights from within the application, enabling developers to detect and fix vulnerabilities independently of specialized security experts. This transformation allows security teams to focus more on governance and oversight tasks. Furthermore, Contrast Assess features an innovative agent that incorporates intelligent sensors for real-time analysis of the code. This internal monitoring minimizes false positives, which can be a significant challenge for both developers and security teams. By seamlessly integrating with current software life cycles and aligning with the tools used by development and operations teams, including compatibility with ChatOps and CI/CD pipelines, Contrast Assess not only simplifies security processes but also boosts team productivity. Consequently, organizations can uphold a strong security stance while optimizing their development activities effectively. This holistic approach marks a significant shift towards a more proactive and collaborative security culture in software development. -
3
HUMAN Bot Defender
HUMAN
Secure your digital assets with advanced bot protection solutions.HUMAN Bot Defender presents a cutting-edge solution for bot management, designed to protect websites, mobile apps, and APIs from automated threats, thus securing your online revenue, reducing the risk of data breaches, and improving operational efficiency. Notably, more than half of all website traffic can be attributed to automated bots, which introduce significant risks by potentially compromising user accounts, misappropriating payment systems, monopolizing inventory, or siphoning off sensitive pricing and content information. In addition to acting as security threats, these bots can erode your competitive edge and skew web analytics, leading to financial losses and increased customer support costs. To combat these challenges, HUMAN Bot Defender utilizes sophisticated methods such as intelligent fingerprinting, behavioral analysis, and predictive modeling to precisely detect bot activities across your web and mobile interfaces, as well as API endpoints. By achieving high levels of accuracy, the solution not only minimizes user friction but also ensures a secure and seamless experience for customers as they navigate your digital assets. Furthermore, this holistic strategy to bot management strengthens security measures while fostering trust and credibility within your user community, ultimately contributing to a more resilient online presence. Consequently, adopting HUMAN Bot Defender can be a pivotal step toward safeguarding your digital ecosystem against the evolving landscape of automated threats. -
4
Cutover
Cutover
Automate IT operations with AI runbooksCutover leads the way in work orchestration and observability by providing unparalleled visibility into the dynamic workflows of an organization, shedding light on previously obscured elements and enabling teams to respond promptly and confidently. By moving beyond antiquated practices like static spreadsheets and urgent phone calls, Cutover equips teams to carry out their responsibilities with greater efficiency and efficacy, all while alleviating undue pressure. The platform enhances planning, orchestration, and auditing of essential processes—both human and automated—that are vital for major initiatives like technology rollouts, resilience evaluations, operational readiness, and managing significant incidents. It heralds a transformative model where human ingenuity and machine automation seamlessly coexist. Through its all-encompassing platform for strategic planning, orchestration, and real-time insights, Cutover guarantees that every stakeholder has access to the latest information. Ultimately, we promote a synergistic relationship between humans and technology, recognizing that this collaboration is crucial for fostering innovation, achieving success, and nurturing growth in an ever-evolving landscape. This partnership not only boosts productivity but also encourages a culture of ongoing improvement and adaptation within organizations, ensuring they remain competitive and agile. -
5
Thoropass
Thoropass
Seamless audits and effortless compliance for strategic growth.Imagine conducting an audit free of conflict and managing compliance without any turmoil—this is precisely what we offer. Your preferred information-security standards, such as SOC 2, ISO 27001, and PCI DSS, can now be approached with ease and confidence. No matter the complexity of your needs, whether it’s urgent compliance for an upcoming agreement or navigating multiple frameworks as you enter new markets, we are here to assist you. We facilitate a swift start, catering to those who are either new to the compliance landscape or looking to refresh outdated processes. This way, your team can concentrate on strategic growth and innovation rather than getting bogged down by exhaustive evidence collection. With Thororpass, you can navigate your audit seamlessly from start to finish, ensuring there are no gaps or unexpected challenges. Our dedicated auditors are always available to provide the necessary guidance and can leverage our platform to create strategies that are resilient and sustainable for the future. Additionally, we believe that a streamlined compliance approach can empower your organization to thrive in a competitive environment. -
6
Soveren
Soveren
Streamline data management while ensuring security and compliance.We support IT and engineering teams in reducing the time dedicated to managing personal data across their entire technological framework. Our platform offers secure connections with widely-used applications and databases, streamlining the automation of personal data management throughout your comprehensive IT ecosystem. As regulations progress, our privacy platform evolves as well, allowing you to focus on enhancing your primary product features while also building a robust IT infrastructure. With Soveren, you can stay proactive by automating privacy compliance, transforming it from a potential risk into a manageable aspect of your resources. We deliver a secure and compliant solution for storing and processing data, ensuring that all information, including backups, is retained within the EU. Stringent measures are implemented to ensure that client data is treated with the highest level of care and appropriate safeguards, fostering a secure environment that effectively reduces the risk of unauthorized access. This comprehensive approach ensures that your data management practices not only operate efficiently but also meet the stringent requirements for privacy compliance, giving you peace of mind in your operations. By prioritizing security and compliance, you can confidently navigate the complexities of data management in today's regulatory landscape. -
7
Datazoom
Datazoom
Optimize your video data pipeline for maximum impact today!Data plays a crucial role in enhancing the effectiveness, profitability, and user experience of streaming video services. Datazoom empowers video publishers to optimize their distributed systems by centralizing, standardizing, and integrating data in real-time, thereby creating a robust data pipeline that enhances observability and adaptability while streamlining solutions. As a video data platform, Datazoom continuously collects data from various endpoints, including CDNs and video players, through a network of collectors. Once this data is collected, it is normalized using consistent data definitions, ensuring uniformity across the board. Subsequently, the refined data is transmitted through connectors to various analytics platforms like Google BigQuery, Google Analytics, and Splunk, allowing for seamless integration. Visualization tools such as Looker or Superset can then be utilized to interpret and analyze this data effectively. By leveraging Datazoom, you unlock the potential for a more efficient and impactful data pipeline, enabling you to access the necessary data swiftly and address any urgent issues without delay. In a fast-paced digital landscape, timely access to accurate data can make all the difference in maintaining a competitive edge. -
8
Haylix
Haylix
Transform your cloud infrastructure for peak performance and security.Our strategy is thoughtfully designed to assess, improve, and manage your cloud infrastructures, guaranteeing they function at peak performance. Leveraging our expertise, we can either upgrade and support your existing systems or assist you in building a secure and efficient environment specifically tailored for your cloud platform. We will work closely with you to outline a comprehensive roadmap for our collaboration, which will include migrating current services to the cloud, along with offering optimization and remediation for existing cloud configurations. Upon completion of this roadmap, our focus will be on either enhancing your present cloud setup or creating a completely secure and optimized environment that aligns with industry standards. By moving your applications and platforms to a secure cloud infrastructure, we will revolutionize them through the application of DevOps automation and the adoption of cutting-edge microservices. This transformation not only aims to enhance performance but also establishes a solid groundwork for scalability and future innovation. Furthermore, by prioritizing security and efficiency, we ensure your cloud solutions are well-equipped to adapt to evolving business needs. -
9
Stackreaction
Stackreaction
Empower your project with tools, resources, and community!Are you aiming to launch a marketplace, an e-learning platform, or a site for memberships? Uncover a wide range of resources, tools, integrations, workflows, and detailed guides to help you initiate your venture. You can investigate various applications, find alternatives, assess features, and share your insights. Should you wish to streamline repetitive tasks, gain access to a unified hub for integrations from services like Zapier, Integromat, Automateio, and others, which enables you to weigh pricing and functionalities. Take advantage of valuable resources such as guides and tutorials provided by both the community and service providers. Contribute your knowledge and skills, and embrace the collaborative nature of the nocode community. Create your profile, choose your favorite tools, and display your tech stack to connect with like-minded individuals. Engaging with this energetic community not only encourages innovation but also sparks creativity in your projects, paving the way for new opportunities and partnerships. By sharing experiences and learning from one another, you can enhance your journey in this dynamic space. -
10
Chronicle SOAR
Chronicle
Transform security management with effortless scalability and intelligence.Leverage playbooks to swiftly realize value and support effortless scaling as your business grows. Address common challenges like phishing and ransomware by adopting pre-built use cases that consist of playbooks, simulated alerts, and educational tutorials. Create playbooks that seamlessly integrate the key tools necessary for your operations using an easy-to-use drag-and-drop interface. In addition, refine repetitive tasks to improve response times, enabling team members to dedicate their efforts to more strategic initiatives. Ensure your playbooks undergo effective lifecycle management by keeping them maintained, optimized, troubleshot, and enhanced through features such as run analytics, reusable components, version tracking, and options for rollback. Integrate threat intelligence at every stage while visualizing essential contextual details for each threat, highlighting who acted, when the action took place, and how all entities are interconnected regarding an event or source. Advanced technologies automatically merge contextually related alerts into a comprehensive threat-focused case, allowing a single analyst to perform in-depth investigations and respond to threats effectively. Moreover, this method encourages the ongoing enhancement of security measures, guaranteeing their strength against the constantly changing landscape of risks. Ultimately, by embedding these practices into your operational framework, your organization can cultivate a more resilient security posture that adapts to emerging threats. -
11
Multiplayer
Multiplayer
Revolutionize your team's workflow with seamless collaboration tools.A unified collaboration platform designed for teams engaged in distributed software development. Your team has the flexibility to collaborate from any location at any time. Securely organize documents, APIs, sketches, and various other resources in one centralized space. Effortlessly manage alterations and monitor progress through branching features. You can easily refine your concepts and gather valuable feedback. Assess your platform's performance against your system architecture effectively. Enhance dependency visualization by integrating with AWS, MongoDB Atlas, and Datadog. Multiplayer AI assists you in designing platform functionalities, generating microservices code, and producing documentation more swiftly. This AI technology allows for a more efficient process in designing, developing, and overseeing distributed software projects. Our goal is to revolutionize the workflow of developers. Multiplayer serves as an intuitive visual collaboration platform that empowers engineering teams to create, develop, and manage distributed software seamlessly, ensuring a smoother workflow and better project management. -
12
Canopy
Canopy
Transform workflows, enhance experiences, and innovate effortlessly today!Enable your development team to drastically cut down on task time, optimize workflows, and swiftly deliver outstanding experiences with Canopy. Forge secure links to elite SaaS platforms, relational databases, spreadsheets, and CSV files with ease. Develop new connectors for any dataset in mere minutes, catering to internal data, niche SaaS applications, and complex integrations alike. Tailor your data formatting to meet the specific requirements of any action or experience needed. Share data through your customized API, employing the best communication and caching techniques for optimal performance. Keep a close watch on, manage, and swiftly address issues surrounding your priorities with real-time insights, actions, and controls readily available. Built to exceed enterprise standards, Canopy ensures unmatched security, compliance, scalability, and quick response times, making it indispensable for today’s businesses. Moreover, with its powerful features, Canopy enables your team to prioritize innovation without being hindered by operational hurdles, fostering a more agile and efficient working environment. -
13
HCL IntelliOps Event Management
HCLSoftware
Transform IT operations with AI-driven, real-time event management.HCL IntelliOps Event Management is a vital component of the Intelligent Full Stack Observability within the HCLSoftware Intelligent Operation ecosystem. This advanced AI-driven IT Event Management solution equips organizations with state-of-the-art features, including real-time topology-based alert correlation, machine learning-driven alert correlation, and effective noise reduction. Additionally, the product smoothly integrates with existing monitoring tools and IT service management software, facilitating prompt and effective issue resolution while enhancing overall operational efficiency. -
14
Clutch
Clutch
Secure non-human identities for a resilient digital future.Clutch is addressing the increasingly critical challenge of securing non-human identities within modern enterprises. With the expansion and advancement of digital infrastructures, the management and protection of non-human identities—such as API keys, secrets, tokens, and service accounts—has emerged as a pivotal, albeit often neglected, aspect of cybersecurity. Recognizing this gap in security, Clutch is developing a dedicated platform designed specifically to ensure comprehensive protection and management of these identities. This innovative solution aims to bolster the digital framework of organizations, fostering a secure, resilient, and dependable environment for their operations. The rise of non-human identities is remarkable, with their numbers outstripping human identities by a staggering 45 to 1, and these identities possess considerable privileges and broad access necessary for essential automated functions. Furthermore, they frequently lack vital security features such as multi-factor authentication and conditional access policies, amplifying the urgency of their protection. By tackling these vulnerabilities, Clutch is paving the way for stronger integrity in automated systems across various enterprises, ultimately enhancing their overall cybersecurity posture. This proactive approach not only safeguards sensitive data but also fortifies the trust in automated processes that are becoming increasingly integral to business operations. -
15
Do Status
Rediim
Stay informed and in control of your services.Cloud Services Monitoring. Create a personalized dashboard that includes all the services you rely on, ensuring you receive immediate notifications in case of any problems. Stay updated about your vital services with our comprehensive Unified Dashboard, where you can subscribe to the services that are most important to you and conveniently view their current statuses on a single platform. Take advantage of our fullscreen feature to showcase the dashboard on a larger display or television, facilitating ongoing surveillance of your critical services. Unified Notifications. Receive instant alerts via Email or Slack whenever there are issues with your services, with future integrations planned for platforms like PagerDuty, Webhooks, and Microsoft Teams. Our system continuously monitors hundreds of cloud services for any disruptions, delivering real-time updates from leading cloud service providers directly to your unified dashboard. Additionally, we will alert you if any of your services face difficulties. Customize your dashboard to consolidate all your essential services in one spot, ensuring you receive prompt notifications whenever those services run into trouble, enabling you to maintain control and respond swiftly to any operational challenges. This comprehensive approach guarantees that you are always aware of your service statuses, reinforcing your ability to manage and mitigate potential disruptions effectively. -
16
Ozcode
Ozcode
Transform your debugging experience with powerful, intuitive insights.Ozcode significantly enhances the debugging process within Visual Studio. It enables developers to swiftly pinpoint the underlying issues in .NET applications and efficiently resolve them. This robust tool provides the capability to analyze your code thoroughly and visualize it down to intricate details. As a result, debugging becomes far simpler than one might have ever anticipated. With Ozcode, developers can spend less time troubleshooting and more time focusing on building innovative solutions. -
17
OpenTelemetry
OpenTelemetry
Transform your observability with effortless telemetry integration solutions.OpenTelemetry offers a comprehensive and accessible solution for telemetry that significantly improves observability. It encompasses a collection of tools, APIs, and SDKs that facilitate the instrumentation, generation, collection, and exportation of telemetry data, including crucial metrics, logs, and traces necessary for assessing software performance and behavior. This framework supports various programming languages, enhancing its adaptability for a wide range of applications. Users can easily create and gather telemetry data from their software and services, and subsequently send this information to numerous analytical platforms for more profound insights. OpenTelemetry integrates smoothly with popular libraries and frameworks such as Spring, ASP.NET Core, and Express, among others, ensuring a user-friendly experience. Moreover, the installation and integration process is straightforward, typically requiring only a few lines of code to initiate. As an entirely free and open-source tool, OpenTelemetry has garnered substantial adoption and backing from leading entities within the observability sector, fostering a vibrant community and ongoing advancements. The community-driven approach ensures that developers continually receive updates and support, making it a highly attractive option for those looking to boost their software monitoring capabilities. Ultimately, OpenTelemetry stands out as a powerful ally for developers aiming to achieve enhanced visibility into their applications.