DataDog

Last updated: Mar 25, 2026


How does Fluid Attacks' solution compare to DataDog's?

The following comparison table enables you to discern the performance of both providers across various attributes essential for meeting your company's cybersecurity needs. To better understand each attribute, read their descriptions in the dedicated page.

Organization

AttributeEssentialAdvancedDataDog
FocusNative ASPM with in-house scannersAI-powered PTaaS on top of native ASPM with in-house scannersApplication monitoring
ExtrasNoneNoneApp and API Protection, App builder, Cloudcraft, Cloud security, Cloud SIEM, Code security, Continuous testing, Event management, Incident response, Internal developer portal, LLM observability, Test optimization, Workflow Automation and Workload protection
Headcount157Same9,770
Headcount distributionEngineering 40%, IT 14%, sales 15%, marketing 2%, operations 4% and others 25%SameEngineering 37%, IT 10%, sales 23%, marketing 2%, operations 3% and others 25%
Headcount growth+14%, +15%, -1%Same+8%, +23%, +62%
HeadquartersCO and USSameAU, ES, IE, IT, FR, JP, NL, UK, US and SE
CountriesAR, BO, CA, CL, CO, DO, MX, PA, PE and USSameFR and US
Reputation9.76 from 228 reviews over 8 years on Gartner and ClutchSame8.93 from 2,203 reviews over 12 years on Capterra, G2, Gartner, PeerSpot and TrustRadius
Followers22K based on the following: Facebook, Instagram, LinkedIn, X and YouTubeSame684K based on the following: Facebook, Instagram, LinkedIn, X and YouTube
Research firmsNoneNone451 Research, Everest Group, Forrester, Frost & Sullivan, Gartner, GigaOM, IDC, Info-Tech Research Group, Nucleus Research and Omdia
Founded2001Same2010
FundingBootstrappedSame$1B USD in 9 rounds from 16 investors
AcquisitionsNoneNoneAcquired 0 times and made 16 acquisitions
Revenue10M to 15MSame1B to 3B
CVEs as CNA Researcher289 CVEs reported to MITRE, ranked in the top 10 CVE labs worldwideSameNot applicable, as it is not a CNA Researcher
ComplianceSOC 2 Type II and SOC 3SameCSA STAR Level 1, DORA, EU-US DPF, FedRAMP, HIPAA, ISO/IEC 27001, ISO/IEC 27017, ISO/IEC 27018, ISO/IEC 27701, PCI DSS, SOC 2, SOC 2 Type I and TISAX
Bug bountyYesYesYes
Visits27K per month. Top 3: 34% PE, 33% CO, 6% CL. Others 27%Same3.2M per month. Top 3: 39% US, 7% BR, 6% IN. Others 48%
Authority31 out of 100Same52 out of 100
Public vulnerability DBDiscovered and third-partySameNone
ContentBlog, documentation, e-books, glossary, reports, success stories, videos, webinars and white papersSameBlog, documentation, events, news and webinars
Comprehensive documentation13 documentation sections, 2 in common and 11 additionalSame7 documentation sections, 2 in common and 5 additional
CommunityForumSameChat (slack)
Sync training1 workshopSameNo
Async training3 product use courses, all freeSameSecurity education platform (subscription based)
DistributionDirect or with any of its 14 partnersSameDirect or with any of its 1,161 partners
MarketplacesAWSSameAWS, Azure, GCP and GitHub
FreemiumNoNoYes
Free trial21-day free trialPoV14-day free trial
DemoYesYesYes
Open demoNoNoNo
PricingContact sales and marketplaceContact salesContact sales, marketplaces and public web
Pricing tiers1 plan1 plan1 plan
Minimum termMonthlyMonthlyMonthly
Minimum payment periodMonthlyMonthlyMonthly
Minimum capabilitiesASPM, binary SAST, DAST, IaC, SAST, SCA and secretsSame plus: AI SAST, API security testing, PTaaS, RE and SCRIAST, SAST, dynamic SCA and run-time SCA
Minimum scope1 authorSame1 developer
Pricing driversAuthorsSameDevelopers
Free implementationYesYesNo
Free supportYesYesNo

Service

AttributeEssentialAdvancedDataDog
PTaaSNoYesNo
Reverse engineeringNoYesNo
Secure code reviewNoYesNo
PivotingNoYesNo
ExploitationNoYesNo
Manual reattacksNot applicableUnlimited reattacksNot applicable
Zero-day vulnerabilitiesNoneContinuous zero-day vulnerability researchNone
SLAAvailabilityAccuracy, availability and responseAvailability and support
Minimum availability99.95% per yearSame99.8% per month
After-sale guaranteesNoYesYes
AccreditationsCNA and Penetration Testing by CRESTSameNone
Pentester certificationsNot applicable202 from 59 different typesNot applicable
Type of contractEmployeeSameEmployee
Endpoint controlNoTotalNot applicable
Channel controlNoTotalNot applicable
StandardsSome requirements from 67 standards, 17 in common and 50 additionalAll requirements from the same standards26 standards, 17 in common and 9 additional
Detection methodAutomated toolsAutomated tools, AI and human intelligenceAutomated tools and AI
Remediation5, 4 in common and 1 additionalSame, plus 14, all in common
Output5, 2 in common and 3 additionalSame, plus 29, 2 in common and 7 additional

Product

AttributeEssentialAdvancedDataDog
ASPMYesYesNo
APIGraphQL with JSONSameREST with JSON
IDE5 functionalities, 2 in common and 3 additionalSame, plus 1 functionality4 functionalities, 2 in common and 2 additional
CLIYesYesYes
CI/CDBreaks the buildSameBreaks the build
Vulnerability sources4 sources, 2 in common and 2 additionalSame3 sources, 2 in common and 1 additional
Threat model alignmentYesYesNo
Priority criteriaCVSS v4.0, CVSSF, EPSS and KEVSameCVSS 4.0, EPSS and KEV
Custom prioritizationPriority scoreSameNo
Scanner originIn-houseIn-houseIn-house
SCA19 package managers, 12 in common and 7 additionalSame15 package managers, 12 in common and 3 additional
AI securityNoYesYes
Reachability12 languagesSameNo
Reachability typeDeterministicSameNot applicable
SBOM22 package managers, 11 in common and 11 additionalSame15 package managers, 11 in common and 4 additional
Malware detectionYesYesYes
Autofix on componentsNoNoNo
Source SAST (languages)12, 10 in common and 2 additionalSame12, 10 in common and 2 additional
Source SAST (frameworks)22SameYes. No information available
Custom rulesNoNoCompliance rules
IaC6, 3 in common and 3 additional43, all in common
Binary SAST1 type of binary, none in commonSame, plus 2 types of binaries. None in commonNo
DAST7 attack surface typesSameNo
API security testingNo4 types of APIs, 1 in common and 3 additional1 type of API
IASTNoNoYes. No information available
ASMNoNoNo
Secrets15 secrets types, 5 in common and 10 additionalSame, plus verify other attack vectors and secrets exploitability7 secrets types, 5 in common and 2 additional
AI4 functions, 2 in common and 2 additionalSame3 functions, 2 in common and 1 additional
MCPYesYesYes
Open-sourceMPL-2 license, totally equivalent to the paid versionNot applicableNo
Provisioning as codeYesYesNo
DeploymentSaaS (multi-tenant)SameSaaS (multi-tenant)
RegionsUSSameAP, EU and US
StatusYesYesYes
Incidents4 per yearSame3.6 per year

Integrations

AttributeEssentialAdvancedDataDog
SCM6, 4 in common and 2 additionalSame4, all in common
Binary repositoriesNoneNone9
Ticketing3, all in commonSame7, 3 in common and 4 additional
ChatOpsNoneNone4
IDE3, all in commonSame7, 3 in common and 4 additional
CI/CD21, 14 in common and 7 additionalSame21, 14 in common and 7 additional
SCANativeSameNative and 5 integrations
SASTNativeSameNative and 2 integrations
DASTNativeSame1
IASTNoneNoneNative and 1 integration
SecretsNativeSame5
RemediationNoneNone2
Bug bountyNoneNoneNone
Vulnerability managementNoneNone3
ComplianceNoneNone1

More like DataDog

Tags

aisecurityapibountycompareiaciastmalwaremcpsastsbomscasecrets

On this page