Pinup: Datadog Offers Monitoring Service For Cloud Solutions

Pinup: Datadog Offers Monitoring Service For Cloud Solutions

Datadog Offers Monitoring Service for Cloud Solutions

Datadog_ScreenBoard

A monitoring service designed initially to promote oversight of cloud solutions, Datadog offers users real-time metrics and analytics via a subscription-based software-as-a-service product.

Developed by Olivier Pomel and Alexis Lê-Quôc, Datadog provides a unified picture of the infrastructure of cloud-based and physical servers, tools, applications, databases, and other services. The partners conceived the idea for Datadog while working at Wireless Generation; Pomel led the education technology firm’s engineering department and Lê-Quôc ran its operations unit. Because each of their teams employed different systems, they experienced considerable difficulties when attempting to cooperatively troubleshoot issues related to technology infrastructure and performance. Moreover, these endeavors became increasingly difficult to accomplish when the company opted to migrate infrastructure to the cloud.

Although Datadog was initially conceived as a monitoring platform for cloud servers, the solution is equally adept at overseeing on-premise servers. In fact, many of the company’s clients use a combination of physical and cloud servers. The Datadog product enables development and operations staff to collaborate on maintenance and upgrade efforts while helping them avoid downtime, correct inefficiencies and redundancies, and improve deployment and development projects.

Although the product is proficient at meeting monitoring requirements for on-premise servers, Datadog was designed specifically to address issues unique to infrastructure based in the cloud. Cloud servers are automatically deployed or removed according to demand for computing and data resources. Because these shifts occur spontaneously, information technology and other dedicated staff often find it difficult to monitor all servers. To prevent this problem, Datadog includes all auto-deployed servers in its monitoring system, ensuring that these resources constantly appear on its dashboard and alert systems. Moreover, the product compiles data from all servers into a unified key performance indicator report, making it easier to identify issues.

Datadog_Integrations

In addition, companies often fail to effectively monitor cloud-based and open source services because of diverse performance data metrics. Datadog circumvents problems created by a proliferation of infrastructure components with more than 50 integrations that standardize metrics for each service, allowing them to be monitored and tracked more efficiently. The product also meets challenges caused by acceleration in release cycles for applications that may occur spontaneously or without adequate forewarning with automatic tracking and tagging or each event related to applications and other services.

Released from Beta testing in June of 2012, Datadog currently serves hundreds of customers ranging from tech startups to fortune 500 companies. Today, Datadog monitors approximately 20,000 cloud servers and about 20,000 on-premise servers. On a daily basis, the platform absorbs nearly 30 billion records per day; each record is deposited, graphed, and scrutinized in real-time. The capabilities of Datadog reduce monitoring time while improving monitoring function, allowing information technology staff to focus on forward-looking projects and programs.

Delivered to clients via subscription, Datadog boasts rates as low as $15 per month for each monitored server. In addition to this service, the company will monitor clients’ temporary servers for an hourly fee. The company, which has offices in Boston and New York City, expects to continue its growth to meet the demands of businesses that exclusively utilize cloud servers as well as those that use a combination of cloud and on-premise servers.

By Mary Elizabeth

About Mary Elizabeth

A communications professional with more than 20 years of experience in advertising, branding, finance, and technology, Mary Elizabeth Johnson strives to identify disruptive and innovative trends in these fields. In addition to her reporting for CloudTweaks.com, Mary Elizabeth serves as a consultant for organizations in the real estate, banking, technology, and manufacturing industries.

View All Articles

Sorry, comments are closed for this post.

Comic
InformationWeek Reveals Top 125 Vendors Taking the Technology Industry by Storm

InformationWeek Reveals Top 125 Vendors Taking the Technology Industry by Storm

InformationWeek Reveals Top 125 Vendors Five-part series details companies to watch across five essential technology sectors SAN FRANCISCO, Sept. 27, 2016 /PRNewswire/ — InformationWeek released its list of “125 Vendors to Watch” in 2017. Selected by InformationWeek’s expert editorial team, the companies listed fall into one of five key themes: infrastructure, security, cloud, data management and…

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Connected Vehicles From cars to combines, the IoT market potential of connected vehicles is so expansive that it will even eclipse that of the mobile phone. Connected personal vehicles will be the final link in a fully connected IoT ecosystem. This is an incredibly important moment to capitalize on given how much time people spend…

Embedded Sensors and the Wearable Personal Cloud

Embedded Sensors and the Wearable Personal Cloud

The Wearable Personal Cloud Wearable tech is one avenue of technology that’s encouraging cloud connections and getting us all onto interconnected networks, and with the continued miniaturization and advancement of computing the types of wearable tech are always expanding and providing us with new opportunities. A few years ago, smartwatches were rather clunky devices with…

SWIFT Says Bank Hacks Set To Increase

SWIFT Says Bank Hacks Set To Increase

Bank Hacks Set To Increase SWIFT, whose messaging network is used by banks to send payment instructions worth trillions of dollars each day, said three clients were hacked over the summer and cyber attacks on banks are set to increase. The theft of $81 million in February from Bangladesh’s central bank using SWIFT messages rocked…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

What You Need To Know About Choosing A Cloud Service Provider

What You Need To Know About Choosing A Cloud Service Provider

Selecting The Right Cloud Services Provider How to find the right partner for cloud adoption on an enterprise scale The cloud is capable of delivering many benefits, enabling greater collaboration, business agility, and speed to market. Cloud adoption in the enterprise has been growing fast. Worldwide spending on public cloud services will grow at a…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Cloud-based GRC Intelligence Supports Better Business Performance

Cloud-based GRC Intelligence Supports Better Business Performance

Cloud-based GRC Intelligence All businesses need a strategy and processes for governance, risk and compliance (GRC). Many still view GRC activity as a burdensome ‘must-do,’ approaching it reactively and managing it with non-specialized tools. GRC is a necessary business endeavor but it can be elevated from a cost drain to a value-add activity. By integrating…

Get Ready For Virtual Reality and the Cloud

Get Ready For Virtual Reality and the Cloud

Virtual Reality Cloud We’re lucky to live in an era where virtual reality is no longer relegated to the confines of a sci-fi movie universe. Thanks to technology introduced by products like Oculus Rift, consumers now have access to virtual environments with fully immersive graphic capabilities. As a result, companies have only just begun to…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

5 Predictions For Education Technology

5 Predictions For Education Technology

Education Technology Although technology has fast influenced most sectors of our world, education is an area that’s lagged behind. Many classrooms still employ the one-to-many lecturing model wherein the average student is catered for while a few are left behind, and others bored. Recently, there’s been a drive to uncover how to use technology successfully…

Surprising Facts and Stats About The Big Data Industry

Surprising Facts and Stats About The Big Data Industry

Facts and Stats About The Big Data Industry If you start talking about big data to someone who is not in the industry, they immediately conjure up images of giant warehouses full of servers, staff poring over page after page of numbers and statistics, and some big brother-esque official sat in a huge government building…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Cloud Infographic – The Internet Of Things In 2020

Cloud Infographic – The Internet Of Things In 2020

The Internet Of Things In 2020 The growing interest in the Internet of Things is amongst us and there is much discussion. Attached is an archived but still relevant infographic by Intel which has produced a memorizing snapshot at how the number of connected devices have exploded since the birth of the Internet and PC.…

Big Data – Top Critical Technology Trend For The Next Five Years

Big Data – Top Critical Technology Trend For The Next Five Years

Big Data Future Today’s organizations should become more collaborative, virtual, adaptive, and agile in order to be successful in complex business world. They should be able to respond to changes and market needs. Many organizations found that the valuable data they possess and how they use it can make them different than others. In fact,…