Why I Actually Tried It (And Why You Might Not Want To)
Our security team was spending more time switching between tools than actually investigating threats. Splunk for security events, New Relic for app performance, Datadog for infrastructure - during our last major incident, I had 12 browser tabs open and still couldn't see the whole picture.
So when Datadog launched their Cloud SIEM, I figured it was worth testing. The pitch was simple: stop paying for three different platforms when one could do the job. Turns out we weren't the only ones fed up with tool sprawl - everyone's trying to consolidate this stuff.
Here's what actually happened: The integration story is real but comes with trade-offs. When our API got hammered with credential stuffing attacks last month, seeing the auth failures spike alongside response times and database connections in one unified dashboard was genuinely helpful. No more copying timestamps between tools to correlate events.
But security people hate it. Our CISO keeps asking why we're using a "monitoring tool" for security instead of Splunk Enterprise Security or IBM QRadar. Fair point - Datadog security launched in 2021 while Splunk's been doing SIEM since 2003.
What You Actually Get (September 2025)
After DASH 2025, Datadog security isn't just log parsing anymore. They added some genuinely useful stuff, even if the security team still grumbles about it.
Cloud SIEM: The Security Part That Actually Works
Cloud SIEM is basically Datadog's attempt at being Splunk. It ingests your logs, runs 100+ pre-built detection rules, and alerts when bad shit happens. The rules are decent out of the box - they caught our brute force attacks and that time someone fat-fingered permissions on an S3 bucket. Forrester's analysis notes that unified platforms like this are becoming more common as organizations seek operational efficiency.
What triggers alerts in real life:
- 50+ failed SSH attempts from the same IP in 5 minutes (finally caught that script kiddie)
- AWS API calls from Belarus at 3am (turned out to be a dev on vacation, but still...)
- SQL injection attempts against the API (blocked by our WAF, but good to know)
- Kubernetes pods getting modified outside CI/CD (someone was debugging in prod again)
- Unusual database queries at 2am (DBA running maintenance without telling anyone)
The killer feature isn't the detection rules - it's seeing security events next to your app metrics. When our login endpoint started throwing 500s, we could immediately see it was related to the authentication service getting hammered, not our app code breaking.
CSPM: The Compliance Nagging That Actually Helps
CSPM is like having a security auditor constantly looking over your shoulder. Annoying, but it's saved our asses more than once.
Real shit it's caught us doing wrong:
- Security groups with 0.0.0.0/0 on port 22 (classic junior dev mistake covered in AWS security best practices)
- S3 bucket that someone made world-readable during a debugging session (data breach waiting to happen)
- RDS instances without encryption (because someone clicked through the wizard too fast)
- Kubernetes containers running as root (guilty as charged - see CIS Kubernetes benchmarks)
- IAM roles with AdministratorAccess attached (easier than figuring out the actual permissions needed - principle of least privilege who?)
The compliance mapping is legitimately useful. When the auditors showed up for SOC 2, CSPM had screenshots of every control automatically. No more scrambling to prove our S3 buckets aren't public or that we're logging admin actions.
Pro tip: The alerts get annoying fast. We set up Slack integration and now the security team just mutes the channel. Compliance is important, but so is getting work done.
The New AI Stuff (DASH 2025): Actually Useful This Time
The AI security features from DASH 2025 are less marketing fluff than I expected. Some of this stuff actually works.
Secret Scanning: New feature that scans your repos automatically on every push. Found hardcoded API keys in our codebase within 24 hours (looking at you, frontend team). Uses the same detection engine as their Sensitive Data Scanner, so it's actually decent at catching real secrets vs fake positives. Still in preview as of September 2025, but worth requesting access.
ML-Powered PII Detection: They added machine learning to detect human names in logs - catches stuff like customer names in support tickets that pattern matching misses. Pretty clever for GDPR compliance where you need to catch all personal data, not just the obvious stuff like credit cards.
AI Security Monitoring: This one's new because everyone's throwing LLMs into production without thinking about security. It monitors for:
- Prompt injection attempts (someone tried to get our chatbot to reveal customer data)
- Weird inference patterns (API calls from the same IP requesting 10,000 completions in an hour)
- Model output that looks like it's leaking training data
- Unusual GPU usage patterns that might indicate model theft
Security Graph: Brand new from DASH 2025 - visualizes relationships between your infrastructure components to surface hidden attack paths. Shows you stuff like "this exposed S3 bucket connects to this database that has admin access to..." - the kind of relationship mapping that takes hours manually but happens instantly with their graph analysis.
Bits AI Security Analyst: The AI that monitors the other AI. Honestly, this is where it gets useful:
- Learns what normal looks like and flags actual anomalies (not just threshold breaches)
- Correlates security events across different systems automatically
- Reduces false positive alerts by around 40% (they claim 60%, but be realistic)
- Actually writes incident summaries that make sense instead of garbage
Application Security Monitoring: The Good and The Annoying
ASM tries to protect your apps at runtime. It's basically a WAF integrated into your application monitoring.
What it actually catches:
- SQL injection attempts against our API (mostly script kiddies with sqlmap)
- XSS attempts in user input fields (caught a few legitimate ones)
- API rate limit bypassing attempts (someone trying to scrape our product data)
- Weird business logic abuse (users trying to checkout with negative quantities)
The container stuff is hit or miss:
- Container escape attempts: Never seen a real one, but alerts when legitimate admin tools run
- Privilege escalation: Mostly false positives when debugging
- File system modifications: Alerts every time we update anything
- Network connections: Flags legitimate service-to-service communication
Real talk: ASM works better for web apps than container security. The container monitoring is overly paranoid and generates too many false positives. We ended up tuning down the sensitivity just to get work done.
Why the Integration Actually Matters (Sometimes)
The whole point of Datadog Security is that it uses the same data as your infrastructure monitoring. This sounds like marketing bullshit, but it's actually useful in practice.
Real example from last month: Our payment API started returning 500 errors at 2am. Instead of bouncing between tools, I could see in one dashboard:
- Security: 1,200 credential stuffing attempts against /login
- Infrastructure: Database CPU spiking to 90%
- Application: Response times jumping from 200ms to 8 seconds
- Business impact: Payment failure rate at 15%
With separate tools, it would've taken 20 minutes to correlate all this. With Datadog, it took 2 minutes to see the attack was overwhelming our auth service.
The unified alerting is clutch: Security alerts go to the same Slack channel as infrastructure alerts. Same PagerDuty rules. Same people get woken up at 3am. No one has to learn a new tool during an incident.
But here's the thing: Security people hate this approach. They want purpose-built tools like Splunk ES with advanced threat hunting, behavioral analytics, and specialized investigation workflows. Datadog Security is "good enough" - which isn't what security teams want to hear.
The Cost Reality: Prepare Your Budget for Pain
Security logging is expensive as hell. Here's what nobody tells you about the real costs.
Data volume explosion: Our security logs are 8x larger than application logs. With detailed audit logging, authentication events, and WAF logs, we went from 50GB/day to 400GB/day overnight. Each failed login attempt generates 3-4 log events across different systems.
Query performance sucks: Searching 6 months of security logs takes 45 seconds minimum. Security investigations that require joining data across multiple timeframes are brutally slow. Your security team will complain constantly.
The pricing reality (September 2025): Security logging costs have stayed brutal. We're paying around $18k/month just for security log ingestion on a medium-sized environment. Application Security Monitoring adds another $30+/host/month. Compare this to Splunk which runs about 40-50% higher, and Datadog starts looking reasonable - which should terrify you about security tool pricing in general.
What nobody mentions: Security logs need 2-year retention minimum for compliance. That's 24x your monthly ingestion costs in storage. We're using Flex Logs to archive old data cheaply, but searching archived logs is painfully slow.
Resource usage: The security correlation engine uses significant CPU. We had to upgrade our Datadog plan twice because of the compute requirements for real-time security analysis.
Comparison: Our Splunk bill was $28,000/month for the same data volume, but at least Splunk was built for this. Datadog works, but it's not optimized for security workloads.
The unified monitoring approach means all your security data flows through the same platform as your application and infrastructure metrics, creating a single source of truth during incidents.
Should You Use It? Depends on Your Team Structure
Use Datadog Security if:
- You're already paying Datadog a fortune and want to consolidate vendors
- Your "security team" is actually the platform engineering team wearing two hats
- You care more about operational efficiency than best-in-class security tools
- Your compliance requirements are basic (SOC 2, basic PCI DSS)
- You're a startup/scale-up with limited security expertise
Skip it if:
- You have dedicated security analysts who know Splunk/QRadar/Sentinel
- You need advanced threat hunting and behavioral analytics
- Your security requirements are complex (finance, healthcare, government)
- You're already happy with your current SIEM and it's not broken
- You have budget for best-in-class security tools
The real decision factor: Team capability. If your security team consists of platform engineers who also handle security, Datadog Security makes sense. If you have dedicated security professionals, they'll want specialized tools.
My recommendation: Try the 14-day free trial, enable basic Cloud SIEM and CSPM, and see if it catches anything your current tools miss. If it doesn't provide immediate value, stick with what you have. Security tools are too expensive to use "just because."