Hero background

Dynatrace Blog

Modern cloud done right. Innovate faster and compete more effectively in the digital age.

Background wave overlay

Data privacy by design: How an observability platform protects data security

Read now

OneAgent release notes version 1.263

Read now

Dynatrace SaaS release notes version 1.264

Read now

Log auditing and log forensics benefit from converging observability and security data

Read now

RSA 2023 news guide: Cloud application security remains core challenge for organizations

Read now

Get to know Dynatracers: Molly Rossman

Read now

How multicloud observability boosts cloud performance at Tractor Supply Co.

Read now

Dynatrace supports the newly released AWS Lambda Response Streaming

Read now

Ensure application resilience with AI-driven application health analysis

Read now

Tech Transforms podcast: Navigating complex cloud environments and improving efficiency

Read now

Tech Transforms podcast: Metrics meeting service, new ways of working, and guest appearances – January & February recap

Read now

Dynatrace OS Services monitoring ensures efficiency and security

Read now

Dynatrace announces support of Google Cloud’s AlloyDB for PostgreSQL metrics ingest

Read now

Connect your software with the right people: Ownership drives effective collaboration

Read now

Application vulnerabilities: Important lessons from the OWASP top 10 about application security risks

Read now

OneAgent release notes version 1.261

Read now

Dynatrace Managed release notes version 1.262

Read now

SLOs done right: how DevOps teams can build better service-level objectives

Read now

Dynatrace supports Amazon Linux 2023 as an AWS launch partner

Read now

Dynatrace SaaS release notes version 1.262

Read now

Zero-day vulnerability management can help avert the next Log4Shell

Read now

Answer-driven DevOps automation: Automation use cases that accelerate insights

Read now

The future of AI: Kelsey Hightower on how AI can raise the bar for humanity

Read now

What is Log4Shell? The Log4j vulnerability explained (and what to do about it)

Read now