
Chainguard announced a partnership with Datadog.
Together, Chainguard and Datadog will combine container observability with clear, prioritized actions to help engineering and security teams eliminate common vulnerabilities and exploits (CVEs), and improve software development velocity. Through a new Chainguard dashboard in Datadog, customers can gain real-time insights into container risks, receive clear remediation recommendations, and seamlessly transition to more secure alternatives — accelerating software delivery while reducing security threats.
The integration between Chainguard and Datadog enhances Datadog's core container observability with new visibility and associated risk remediation potential, surfaced in a dashboard. The Chainguard dashboard organizes container metrics to understand where Chainguard is being used today and identifies environments where a more secure base image is available.
The dashboard will be available to all Datadog customers, offering a holistic view of existing container infrastructure and associated CVE risks, including:
- Containers built using Chainguard images
- Longest running container images
- Vulnerabilities in most widely-used images
- Chainguard alternatives for insecure container images
"Through our partnership with Datadog, we're combining leading observability with secure, minimal container solutions," said Kim Lewandowski, Chief Product Officer and Co-founder at Chainguard. "Chainguard is building the safe source for open source so customers can build more efficiently and securely from the start. Datadog is leading the way in observability and monitoring across cloud infrastructure. Together, we're empowering companies of all sizes to build software better."
"Tens of thousands of organizations rely on Datadog every day for real-time risk monitoring and visibility into the health and performance of their containerized environments," said Bharat Sajnani, Senior Vice President, Head of Corporate Development and Platform at Datadog. "With our integration with Chainguard, our customers can identify CVE risks within their container infrastructure, seamlessly pinpoint alternatives, and measure progress in implementing these minimal CVE container images. Together, we're helping companies make their container infrastructure more secure while making the most of their engineering resources."
With Chainguard and Datadog's integration, joint customers benefit from reduced risk across their application surface area. Now, security teams can move from reactive alerts to proactive risk reduction by identifying and prioritizing CVE remediation in their most widely deployed and high-risk containers. As a result, engineering teams will spend less time patching one-off containers, so organizations can redirect development resources and ship secure software faster.
The Chainguard and Datadog integration is now generally available.
The Latest
According to Auvik's 2025 IT Trends Report, 60% of IT professionals feel at least moderately burned out on the job, with 43% stating that their workload is contributing to work stress. At the same time, many IT professionals are naming AI and machine learning as key areas they'd most like to upskill ...
Businesses that face downtime or outages risk financial and reputational damage, as well as reducing partner, shareholder, and customer trust. One of the major challenges that enterprises face is implementing a robust business continuity plan. What's the solution? The answer may lie in disaster recovery tactics such as truly immutable storage and regular disaster recovery testing ...
IT spending is expected to jump nearly 10% in 2025, and organizations are now facing pressure to manage costs without slowing down critical functions like observability. To meet the challenge, leaders are turning to smarter, more cost effective business strategies. Enter stage right: OpenTelemetry, the missing piece of the puzzle that is no longer just an option but rather a strategic advantage ...
Amidst the threat of cyberhacks and data breaches, companies install several security measures to keep their business safely afloat. These measures aim to protect businesses, employees, and crucial data. Yet, employees perceive them as burdensome. Frustrated with complex logins, slow access, and constant security checks, workers decide to completely bypass all security set-ups ...

In MEAN TIME TO INSIGHT Episode 13, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses hybrid multi-cloud networking strategy ...
In high-traffic environments, the sheer volume and unpredictable nature of network incidents can quickly overwhelm even the most skilled teams, hindering their ability to react swiftly and effectively, potentially impacting service availability and overall business performance. This is where closed-loop remediation comes into the picture: an IT management concept designed to address the escalating complexity of modern networks ...
In 2025, enterprise workflows are undergoing a seismic shift. Propelled by breakthroughs in generative AI (GenAI), large language models (LLMs), and natural language processing (NLP), a new paradigm is emerging — agentic AI. This technology is not just automating tasks; it's reimagining how organizations make decisions, engage customers, and operate at scale ...
In the early days of the cloud revolution, business leaders perceived cloud services as a means of sidelining IT organizations. IT was too slow, too expensive, or incapable of supporting new technologies. With a team of developers, line of business managers could deploy new applications and services in the cloud. IT has been fighting to retake control ever since. Today, IT is back in the driver's seat, according to new research by Enterprise Management Associates (EMA) ...
In today's fast-paced and increasingly complex network environments, Network Operations Centers (NOCs) are the backbone of ensuring continuous uptime, smooth service delivery, and rapid issue resolution. However, the challenges faced by NOC teams are only growing. In a recent study, 78% state network complexity has grown significantly over the last few years while 84% regularly learn about network issues from users. It is imperative we adopt a new approach to managing today's network experiences ...

From growing reliance on FinOps teams to the increasing attention on artificial intelligence (AI), and software licensing, the Flexera 2025 State of the Cloud Report digs into how organizations are improving cloud spend efficiency, while tackling the complexities of emerging technologies ...