This Month in Datadog - February 2026
The Bits AI Security Analyst automates investigation of security alerts within cloud environments like AWS, Azure, and GCP by leveraging AI to enrich data, prioritize incidents, an…
The Bits AI Security Analyst automates investigation of security alerts within cloud environments like AWS, Azure, and GCP by leveraging AI to enrich data, prioritize incidents, an…
This article introduces new UI capabilities for Dynatrace’s Model Context Protocol (MCP) applications, allowing developers to visualize data directly within their IDEs and AI assis…
Reese Lee, Adriana Villela, and Julia Furst Morgado have been appointed as the new Community Managers for OpenTelemetry (OTel). They bring extensive experience within the OTel proj…
Dynatrace has enhanced its SmartScape platform by introducing Business Flows – a new entity type that directly links IT performance to critical business processes like loan approva…
Dynatrace's new Exception Analysis feature simplifies identifying and understanding exceptions within distributed systems. It provides an aggregated view of exceptions across entir…
The New Relic Synthetics Recorder is a Chrome extension designed to simplify the creation of synthetic monitors for web applications. It allows users to record their browser intera…
CMDB tools are essential for modern IT, acting as a central repository for configuration data and mapping relationships between IT components and business services. These tools go …
This Datadog article details how to identify and remediate common misconfigurations in Amazon Bedrock, a fully managed generative AI service. It explains how Datadog's Cloud Securi…
This article advocates for combining Application Performance Monitoring (APM) and Real User Monitoring (RUM) data to achieve comprehensive full-stack observability. By unifying the…
Dynatrace now integrates with Qualys to improve vulnerability management for DevSecOps teams. This integration unifies and deduplicates vulnerability findings from Qualys, then enr…
Ivanti Application Control utilizes a “Trusted Ownership” model, focusing on *how* software arrives on a system—its origin—rather than simply *what* the software is. This provenanc…
This article highlights the increasing risk of maintaining separate IT and OT (Operational Technology) monitoring systems, particularly as Industry 4.0 and IoT become more prevalen…