Hi, how can we help you today?

Datadog Cloud Monitoring vs EC2
Comparaison des fonctionnalités

Découvrez comment Datadog Cloud Monitoring et EC2 se comparent entre eux par leurs fonctionnalités

Iš viso

177
25

A/B Testing

AI/Machine Learning

API

Access Controls/Permissions

Action-Word Testing

Activity Dashboard

Activity Monitoring

Activity Tracking

Alerts/Escalation

Alerts/Notifications

Analytics

Anomaly Detection

Anomaly/Malware Detection

Application Security

Archiving & Retention

Asset Tracking

Association Discovery

Audit Management

Audit Trail

Authentication

Automated Discovery

Automated Testing

Availability Testing

Backup and Recovery

Bandwidth Monitoring

Baseline Manager

Bayesian Analysis

Bug/Issue Capture

Build Log

CPU Monitoring

Campaign Management

Capacity Analytics

Capacity Management

Capacity Planning

Change Management

Collaboration Tools

Color Codes/Icons

Communications Management

Competitive Analysis

Compliance Management

Compliance Tracking

Configuration Management

Connectivity Management

Container Isolation

Content Management

Continuous Delivery

Continuous Deployment

Continuous Integration

Conversion Rate Optimization

Correlation Analysis

Credential Management

Customizable Dashboard

Customizable Reports

DDoS Protection

Dashboard

Data Aggregation

Data Analysis Tools

Data Classification

Data Collection

Data Connectors

Data Migration

Data Security

Data Storage Management

Data Visualization

Database Monitoring

Debugging

Dependency Tracking

Deployment Management

Desktop Virtualization

Device Auto Discovery

Diagnostic Tools

Disaster Recovery

ETL

Email Alerts

Email Monitoring

Engagement Tracking

Event Logs

Event Tracking

FTP Monitoring

Firewalls

For DevSecOps

For Developers

For IoT Devices

Forecasting

Graphical User Interface

Hierarchical Mapping

Hierarchical View

High Volume Processing

Historical Trend Analysis

IP Address Monitoring

IT Monitoring

Incident Management

Incident Reporting

Inventory Management

Keyword Research Tools

Load Balancing

Location-Based Mapping

Log Access

Log Collection

Log Management

Maintenance Scheduling

Mobile Network Troubleshooting

Model-Based Testing

Monitoring

Multi-User Collaboration

Multitenancy

Multivariate Analysis

Namespace Management

Network Analysis

Network Monitoring

Network Resource Management

OSHA Compliance

On Call Scheduling

Patch Management

Pattern Detection and Recognition

Performance Analysis

Performance Management

Performance Metrics

Performance Monitoring

Pipeline Management

Policy Management

Power Management

Predictive Analytics

Prioritization

Problem Area Alerts

Quality Assurance

Query Analysis

Real-Time Analytics

Real-Time Data

Real-Time Monitoring

Regression Analysis

Remediation Management

Remote Access/Control

Remote Monitoring & Management

Reporting & Statistics

Reporting/Analytics

Repository Management

Requirements Management

Resource Management

Resource Optimization

Root Cause Analysis

SQL Injections

Safety Incident Management

Scheduling

Search/Filter

Secure Data Storage

Security Auditing

Security Testing

Self-Updating Maps

Server Logs

Server Monitoring

Service Level Agreement (SLA) Management

Simple Network Management Protocol (SNMP)

Static Analysis

Statistical Analysis

Statistical Process Control

Statistical Simulation

Status Tracking

Supports Parallel Execution

Survival Analysis

Tagging

Test Script Reviews

Testing Management

Third-Party Integrations

Threat Intelligence

Threat Response

Threshold Alerts

Ticket Management

Transaction Monitoring

Trend Analysis

Troubleshooting

Unicode Compliance

Uptime Reporting

Version Control

Virtual Machine Migration

Virtual Machine Monitoring

Virtual Machine Provisioning

Virtualization

Visitor Tracking

Visual Analytics

Vulnerability Scanning

Web Traffic Reporting

Web-Application Security

Workflow Management