Use cases

Latest Dynatrace

With the power of Grail and the security data ingested into it, various data analysis, reporting, and automation use cases can be implemented.

Threat hunting

Threat hunting and forensics

Search for indicators of compromise (IoC) and perform forensic investigations and threat hunting activities.

Resolve incidents faster with templates

Speed up your log-related investigations with Security Investigator templates.

Operationalize DQL query results

Build DQL queries from your query results faster and more conveniently with Dynatrace Security Investigator.

Analyze AWS CloudTrail logs

Analyze CloudTrail logs and find potential security issues with Dynatrace Security Investigator.

Analyze Amazon API Gateway access logs

Monitor and identify errors in your Amazon API Gateway access logs with Dynatrace Security Investigator.

Detect threats against your AWS Secrets

Monitor and identify potential threats against your AWS Secrets with Dynatrace Security Investigator.

Monitor suspicious sign-in activity

Analyze suspicious and malicious sign-in behaviors with Dynatrace.

xSPM

Stay compliant with Security Posture Management

Stay on top of your security measures, policies, and practices with Dynatrace Security Posture Management.

Security alert noise reduction

CSPM Notification Automation

Automatically process, triage, enrich, and classify incoming security alerts.

Ingest and process custom security findings

Continuously ingest your container scan findings into Dynatrace.

Visualize and analyze security findings

Effortlessly view and analyze security findings across products and tools.

Automate and orchestrate security findings

Regularly check for critical container vulnerabilities and get automatic Jira tickets or Slack alerts.

entities

Discover coverage gaps in security scans

Gain visibility into the security validations during the Software Development Lifecycle (SDLC).

Runtime contextualization of container findings

Triage critical vulnerability findings in production applications on containers with vulnerable container images.