Compare the Top Attack Surface Management Platforms that integrate with Datadog as of September 2025

This a list of Attack Surface Management platforms that integrate with Datadog. Use the filters on the left to add additional filters for products that have integrations with Datadog. View the products that work with Datadog in the table below.

What are Attack Surface Management Platforms for Datadog?

Attack surface management (ASM) platforms enables organizations to monitor and manage their attack surface risk. Attack surface management software allows companies to view cyber risks and attack vectors related to external digital assets outside of their firewall. These platforms continuously scan and assess an organization’s digital infrastructure, including networks, systems, applications, and endpoints, to detect vulnerabilities, misconfigurations, and exposed assets that could be exploited by attackers. Compare and read user reviews of the best Attack Surface Management platforms for Datadog currently available using the table below. This list is updated regularly.

  • 1
    Axonius

    Axonius

    Axonius

    Axonius gives customers the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between all assets, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks. Recognized as creators of the Cyber Asset Attack Surface Management (CAASM) category and innovators in SaaS Management Platform (SMP) and SaaS Security Posture Management (SSPM), Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically enforce policies and automate action.
  • 2
    Resmo

    Resmo

    Resmo

    All-in-one platform for SaaS app and access management for modern IT teams. Streamline app discovery, identity security, user offboarding, access reviews, and cost tracking. Actively scan and notify for vulnerabilities with 100+ native integrations with your favorite tools. Review identity access permissions, OAuth risks, and SSO logins. Uncover shared accounts, weak passwords, excessive permissions, externally shared files, and more. Let them use the SaaS they need to get their job done quickly. Lift the burden of security checks on your IT and security teams with automation. Offboard employees securely with no dormant accounts left behind. We empower your team to take ownership of security without any roadblocks, ensuring a seamless and secure workflow. Get accurate visibility over the apps your employees login with their business accounts. Empower your workforce with SaaS adoption while maintaining control over your SaaS security posture.
    Starting Price: $2 per month
  • 3
    Panaseer

    Panaseer

    Panaseer

    Panaseer’s continuous controls monitoring platform sits above the tools and controls within your organisation. It provides automated, trusted insight into the security and risk posture of the organisation. We create an inventory of all entities across your organisation (devices, apps, people, accounts, databases). The inventory highlights assets missing from different sources and where security controls are missing from assets. The platform equips you with metrics and measures to understand your security and compliance status at any level. The platform ingests data from any source in the cloud or on-premises, across security, IT and business domains through out-of-the-box data connectors. It uses entity resolution to clean, normalise, aggregate, de-duplicate and correlate this data, creating a continuous feed of unified asset and controls insights across devices, applications, people, databases and accounts.
  • 4
    Hadrian

    Hadrian

    Hadrian

    Hadrian reveals the hacker’s perspective so the risks that matter most can be remediated with less effort. - Hadrian scans the internet to identify new assets and configurations changes to existing assets in real time. Our Orchestrator AI gathers contextual insights to reveal unseen links between assets. - - Hadrian’s platform detects over 10,000 3rd party SaaS applications, 1,000s of different software packages and versions, plugins for common tools, and open source repositories. - Hadrian identifies vulnerabilities, misconfigurations and exposed sensitive files. Risks are validated by Orchestrator AI to ensure accuracy, and ranked based on exploitability and business impact. - Hadrian finds exploitable risks the moment they appear in your attack surface. The tests are triggered immediately by Hadrian’s event-based Orchestrator AI.
  • Previous
  • You're on page 1
  • Next