
Datadog announced new capabilities connecting user experience data with application traces, bridging the gap between frontend and backend performance monitoring.
This new capability enables on-call engineering teams to pinpoint the root cause of issues impacting customer experience on mobile and web-based applications to backend services. Traditional Real User Monitoring (RUM) and Application Performance Monitoring (APM) solutions are siloed, requiring separate workflows to troubleshoot across the stack. This makes connecting user experience data from browsers and mobile applications with backend traces, metrics, and logs a complex and tedious task. These manual correlation efforts slow down on-call engineering teams when trying to remediate issues, as they struggle to pinpoint which part of the application stack is responsible for revenue impacting incidents. Datadog’s automatic two-way correlation for frontend user sessions in RUM and backend traces in APM eliminates these blind spots, allowing on-call teams to quickly identify root causes and thus maintain robust user-experience on browser and mobile applications.
“Typically, frontend and backend engineers use their own, siloed monitoring solutions and rarely even look at the same signals and metrics. Very often, issues can arise anywhere in the stack and propagate in every direction,” said Renaud Boutet, VP of Product, Datadog. “By automatically connecting user journeys that start on the frontend with requests made to backend services, Datadog enables organizations to significantly reduce MTTD and MTTR for incidents.”
Datadog’s new APM and RUM capabilities automatically correlate critical application performance data, providing teams with:
- Full-Stack Correlation: connecting every user request to all backend services to cut down MTTD and MTTR with a unified view across the application stack
- Frontend/Backend Comparison: comparing frontend and backend durations on every request, enabling engineering teams to identify and optimize slow user experiences
- Trace Search and Analytics by User Journey Tags: slicing and dicing backend traces by location, device, operating system, and more to provide context for impacted customers
The Latest
Overall outage frequency and the general level of reported severity continue to decline, according to the Outage Analysis 2025 from Uptime Institute. However, cyber security incidents are on the rise and often have severe, lasting impacts ...
In March, New Relic published the State of Observability for Media and Entertainment Report to share insights, data, and analysis into the adoption and business value of observability across the media and entertainment industry. Here are six key takeaways from the report ...
Regardless of their scale, business decisions often take time, effort, and a lot of back-and-forth discussion to reach any sort of actionable conclusion ... Any means of streamlining this process and getting from complex problems to optimal solutions more efficiently and reliably is key. How can organizations optimize their decision-making to save time and reduce excess effort from those involved? ...
As enterprises accelerate their cloud adoption strategies, CIOs are routinely exceeding their cloud budgets — a concern that's about to face additional pressure from an unexpected direction: uncertainty over semiconductor tariffs. The CIO Cloud Trends Survey & Report from Azul reveals the extent continued cloud investment despite cost overruns, and how organizations are attempting to bring spending under control ...

According to Auvik's 2025 IT Trends Report, 60% of IT professionals feel at least moderately burned out on the job, with 43% stating that their workload is contributing to work stress. At the same time, many IT professionals are naming AI and machine learning as key areas they'd most like to upskill ...
Businesses that face downtime or outages risk financial and reputational damage, as well as reducing partner, shareholder, and customer trust. One of the major challenges that enterprises face is implementing a robust business continuity plan. What's the solution? The answer may lie in disaster recovery tactics such as truly immutable storage and regular disaster recovery testing ...
IT spending is expected to jump nearly 10% in 2025, and organizations are now facing pressure to manage costs without slowing down critical functions like observability. To meet the challenge, leaders are turning to smarter, more cost effective business strategies. Enter stage right: OpenTelemetry, the missing piece of the puzzle that is no longer just an option but rather a strategic advantage ...
Amidst the threat of cyberhacks and data breaches, companies install several security measures to keep their business safely afloat. These measures aim to protect businesses, employees, and crucial data. Yet, employees perceive them as burdensome. Frustrated with complex logins, slow access, and constant security checks, workers decide to completely bypass all security set-ups ...

In MEAN TIME TO INSIGHT Episode 13, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses hybrid multi-cloud networking strategy ...
In high-traffic environments, the sheer volume and unpredictable nature of network incidents can quickly overwhelm even the most skilled teams, hindering their ability to react swiftly and effectively, potentially impacting service availability and overall business performance. This is where closed-loop remediation comes into the picture: an IT management concept designed to address the escalating complexity of modern networks ...