Introducing CrowdStrike Falcon® Next-Gen Identity Security: The future is here. Learn more

Datadog Observability Pipelines

Transform, enrich, and route security logs at scale

Observability Pipelines is an on-premises, vendor-agnostic pipeline that lets DevOps and Security teams filter, normalize, and route logs from firewalls, network devices, and applications to CrowdStrike’s Falcon® platform. Reduce noise and costs, improve security investigations, mask sensitive data, and streamline log migrations to CrowdStrike—all through a single pane of glass.

 

  • Faster log onboarding
    Streamline the ingestion of logs from firewalls, applications, and network devices into the Falcon platform with minimal engineering effort.
  • Cost and volume control
    Filter and deduplicate logs before they reach CrowdStrike to reduce data volume and optimize licensing costs without losing critical security insights.
  • Stronger compliance posture
    Mask sensitive log data across sources to meet audit and regulatory requirements with greater consistency and control.
  • Enhanced security investigations
    Ensure high-value security logs are prioritized, enriched, and routed to CrowdStrike for faster, more accurate threat detection and response. Easily remap any log—from any vendor or source—to the Open Cybersecurity Schema Framework (OCSF) to standardize your security data.

Get Started

 

Collect, transform, mask, and route critical infrastructure logs from any source to the CrowdStrike Falcon®.

  • Faster log onboarding
  • Cost and volume control
  • Stronger compliance posture
  • Enhanced security investigations
Contact Partner

Not A CrowdStrike Customer?

Try CrowdStrike

Marketplace resources

Our partners

Our partners

CrowdStrike partners with the leaders in cybersecurity to deliver best-in-class protection.

CrowdStrike Shopping Bag icon

Buying on Marketplace

Buying on Marketplace

Explore all the listings that are available to purchase from CrowdStrike — some even qualify for CrowdCredits.

Become a partner

Become a partner

Join our open cybersecurity ecosystem of best-of-breed solutions to drive innovation and stop breaches.