Hero background

Security

Dynatrace elevates data security with separated storage and unique encryption keys for each tenant

Read now

Dynatrace achieves CSA Star 2 certification

Read now

Dynatrace achieves SOC 1 Type II certification

Read now

Cloud-native observability made seamless with OpenPipeline and AI-driven observability

Read now

Enrich Amazon ECR vulnerability findings with runtime context

Read now

Break the silos: Enrich vulnerability findings with runtime context

Read now

Dynatrace SaaS achieves “Protected” status after successful completion of Australian Information Security Registered Assessors Program assessment (IRAP)

Read now

The Dynatrace journey toward DORA compliance

Read now

Dynatrace completed Data Privacy Framework self-certification

Read now

Dynatrace awarded TISAX information security certification for the European automotive industry

Read now

Dynatrace EdgeConnect securely connects your local systems to Dynatrace SaaS

Read now

What is DevSecOps? And what you need to do it well

Read now

Cybersecurity Awareness Month: Essential cybersecurity best practices to safeguard your organization

Read now

How zero trust architecture can improve government user experiences

Read now

Dynatrace Application Security extends automatic vulnerability management to .NET

Read now

‘Security as code’ demands proactive DevSecOps

Read now

5 years of external pentesting: How the Dynatrace security posture has strengthened

Read now

How Dynatrace protects its software development and delivery life cycle against supply chain attacks

Read now

Further improvements to OneAgent security for Windows and Linux

Read now

Additional security for Synthetic monitor credentials with the new credential vault

Read now

Easily check configuration changes or environment sign ins with the new Audit logs API

Read now

Vulnerability Management: Dynatrace’s data driven approach to security

Read now

Running a successful internal bug bounty program

Read now

New permissions limit capture & viewing of sensitive data

Read now