Pinup: Datadog Offers Monitoring Service For Cloud Solutions

Pinup: Datadog Offers Monitoring Service For Cloud Solutions

Datadog Offers Monitoring Service for Cloud Solutions

Datadog_ScreenBoard

A monitoring service designed initially to promote oversight of cloud solutions, Datadog offers users real-time metrics and analytics via a subscription-based software-as-a-service product.

Developed by Olivier Pomel and Alexis Lê-Quôc, Datadog provides a unified picture of the infrastructure of cloud-based and physical servers, tools, applications, databases, and other services. The partners conceived the idea for Datadog while working at Wireless Generation; Pomel led the education technology firm’s engineering department and Lê-Quôc ran its operations unit. Because each of their teams employed different systems, they experienced considerable difficulties when attempting to cooperatively troubleshoot issues related to technology infrastructure and performance. Moreover, these endeavors became increasingly difficult to accomplish when the company opted to migrate infrastructure to the cloud.

Although Datadog was initially conceived as a monitoring platform for cloud servers, the solution is equally adept at overseeing on-premise servers. In fact, many of the company’s clients use a combination of physical and cloud servers. The Datadog product enables development and operations staff to collaborate on maintenance and upgrade efforts while helping them avoid downtime, correct inefficiencies and redundancies, and improve deployment and development projects.

Although the product is proficient at meeting monitoring requirements for on-premise servers, Datadog was designed specifically to address issues unique to infrastructure based in the cloud. Cloud servers are automatically deployed or removed according to demand for computing and data resources. Because these shifts occur spontaneously, information technology and other dedicated staff often find it difficult to monitor all servers. To prevent this problem, Datadog includes all auto-deployed servers in its monitoring system, ensuring that these resources constantly appear on its dashboard and alert systems. Moreover, the product compiles data from all servers into a unified key performance indicator report, making it easier to identify issues.

Datadog_Integrations

In addition, companies often fail to effectively monitor cloud-based and open source services because of diverse performance data metrics. Datadog circumvents problems created by a proliferation of infrastructure components with more than 50 integrations that standardize metrics for each service, allowing them to be monitored and tracked more efficiently. The product also meets challenges caused by acceleration in release cycles for applications that may occur spontaneously or without adequate forewarning with automatic tracking and tagging or each event related to applications and other services.

Released from Beta testing in June of 2012, Datadog currently serves hundreds of customers ranging from tech startups to fortune 500 companies. Today, Datadog monitors approximately 20,000 cloud servers and about 20,000 on-premise servers. On a daily basis, the platform absorbs nearly 30 billion records per day; each record is deposited, graphed, and scrutinized in real-time. The capabilities of Datadog reduce monitoring time while improving monitoring function, allowing information technology staff to focus on forward-looking projects and programs.

Delivered to clients via subscription, Datadog boasts rates as low as $15 per month for each monitored server. In addition to this service, the company will monitor clients’ temporary servers for an hourly fee. The company, which has offices in Boston and New York City, expects to continue its growth to meet the demands of businesses that exclusively utilize cloud servers as well as those that use a combination of cloud and on-premise servers.

By Mary Elizabeth

About Mary Elizabeth

A communications professional with more than 20 years of experience in advertising, branding, finance, and technology, Mary Elizabeth Johnson strives to identify disruptive and innovative trends in these fields. In addition to her reporting for CloudTweaks.com, Mary Elizabeth serves as a consultant for organizations in the real estate, banking, technology, and manufacturing industries.

View All Articles

Sorry, comments are closed for this post.

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…