Want instant access to real pricing data for 20k software products?

Vendr's purple icon logo
Datadog
$438,487$574,271per year
Fast, fair, easy pricing. No sales call required.

Datadog

Datadog is a software company that offers an integrated platform for monitoring and security. It helps see inside any stack, any app, at any scale, anywhere.

|Visit datadoghq.com

How much does Datadog cost?

Median buyer pays
$518,300
per year
Based on data from 8 purchases, with buyers saving 10% on average.
Median: $518,300
$438,487
$574,271
LowHigh
See detailed pricing for your specific purchase

About Datadog

Datadog Overview

Datadog is a software company that offers an integrated platform for monitoring and security. It helps see inside any stack, any app, at any scale, anywhere.

Datadog's 74 Products

AI Observability: LLM Observability logo
AI Observability: LLM Observability

Application Security Management logo
Application Security Management

Applications: APM logo
Applications: APM

APM starts at $31 per host every month for resolving issues faster with end-to-end distributed traces and service health metrics. It can be billed annually or $36 on-demand.

Applications: APM DevSecOps logo
Applications: APM DevSecOps

Reduce security risk with OSS vulnerability detection in production

Applications: APM DevSecOps Enterprise logo
Applications: APM DevSecOps Enterprise

Reduce security risk with OSS vulnerability detection in production

Applications: APM DevSecOps Pro logo
Applications: APM DevSecOps Pro

Reduce security risk with OSS vulnerability detection in production

Applications: APM Enterprise logo
Applications: APM Enterprise

APM Enterprise starts $40 per host every month for optimizing code performance in production with minimal overhead.

Applications: APM Pro logo
Applications: APM Pro

APM Pro starts at $35 per host every month for track and improving the performance of your streaming data pipelines end to end. It can be billed annually or $42 on-demand.

Applications: Data Jobs Monitoring logo
Applications: Data Jobs Monitoring

Applications: Database Monitoring logo
Applications: Database Monitoring

Applications: Universal Service Monitoring logo
Applications: Universal Service Monitoring

Cloud Security Management (CSM) logo
Cloud Security Management (CSM)

Cloud Security Posture Management runs continuous configuration checks across your cloud accounts, hosts, and containers.

Cloud Security Management Enterprise logo
Cloud Security Management Enterprise

Cloud Security Management Pro logo
Cloud Security Management Pro

Code Security (IAST) logo
Code Security (IAST)

Cloud Workload Security is a real-time eBPF-powered threat detection across your hosts and containers.

Digital Experience: API Testing logo
Digital Experience: API Testing

Digital Experience: Browser Testing logo
Digital Experience: Browser Testing

Digital Experience: Continuous Testing (add-on) logo
Digital Experience: Continuous Testing (add-on)

Digital Experience: Error Tracking logo
Digital Experience: Error Tracking

Digital Experience: Mobile App Testing logo
Digital Experience: Mobile App Testing

Digital Experience: RUM logo
Digital Experience: RUM

Digital Experience: RUM & Session Replay logo
Digital Experience: RUM & Session Replay

Flex Logs Starter logo
Flex Logs Starter

Flex Logs Starter is for historical investigations and long-term retention

Infrastructure : Cloud Cost Management logo
Infrastructure : Cloud Cost Management

Infrastructure : DevSecOps Enterprise logo
Infrastructure : DevSecOps Enterprise

DevSecOps Enterprise has advanced risk and threat detection capabilities

Infrastructure : DevSecOps Pro logo
Infrastructure : DevSecOps Pro

Secure your cloud resources and adhere to industry standards with DevSecOps Pro

Infrastructure : Enterprise logo
Infrastructure : Enterprise

Infrastructure Enterprise includes advanced features and administrative controls

Infrastructure : Free logo
Infrastructure : Free

Infrastructure Free offers core collection and visualization features.

Infrastructure : Network Device Monitoring logo
Infrastructure : Network Device Monitoring

Infrastructure : Network Performance Monitoring logo
Infrastructure : Network Performance Monitoring

Infrastructure : Pro logo
Infrastructure : Pro

Infrastructure Pro allows centralized monitoring of systems, services, and serverless functions

Infrastructure : Pro Plus logo
Infrastructure : Pro Plus

Infrastructure Pro Plus monitors and security platform for cloud applications.

Infrastructure : Serverless APM logo
Infrastructure : Serverless APM

Infrastructure : Serverless Application Security logo
Infrastructure : Serverless Application Security

Infrastructure : Serverless Workload Monitoring logo
Infrastructure : Serverless Workload Monitoring

Logs: Audit Trail logo
Logs: Audit Trail

Logs: Flex Compute logo
Logs: Flex Compute

Flex Compute provides multiple preconfigured compute options to suit your search and analytics workloads

Logs: Flex Storage logo
Logs: Flex Storage

Use Flex Storage for historical investigations or security, audit, and compliance use cases

Logs: Ingest logo
Logs: Ingest

Ingest, process, enrich, live tail, and archive all your logs

Logs: Log Forwarding to Custom Destinations logo
Logs: Log Forwarding to Custom Destinations

Centralize your log processing, enrichment and routing to multiple destinations

Logs: Observability Pipelines logo
Logs: Observability Pipelines

Logs: Retain or Rehydrate Log Events (15 Day Retention Period) logo
Logs: Retain or Rehydrate Log Events (15 Day Retention Period)

Logs: Retain or Rehydrate Log Events (180 Day Retention Period) logo
Logs: Retain or Rehydrate Log Events (180 Day Retention Period)

Logs: Retain or Rehydrate Log Events (3 Day Retention Period) logo
Logs: Retain or Rehydrate Log Events (3 Day Retention Period)

Logs: Retain or Rehydrate Log Events (30 Day Retention Period) logo
Logs: Retain or Rehydrate Log Events (30 Day Retention Period)

Logs: Retain or Rehydrate Log Events (45 Day Retention Period) logo
Logs: Retain or Rehydrate Log Events (45 Day Retention Period)

Logs: Retain or Rehydrate Log Events (60 Day Retention Period) logo
Logs: Retain or Rehydrate Log Events (60 Day Retention Period)

Logs: Retain or Rehydrate Log Events (7 Day Retention Period) logo
Logs: Retain or Rehydrate Log Events (7 Day Retention Period)

Logs: Retain or Rehydrate Log Events (90 Day Retention Period) logo
Logs: Retain or Rehydrate Log Events (90 Day Retention Period)

Logs: Sensitive Data Scanner logo
Logs: Sensitive Data Scanner

Logs: Standard Indexing (15-Day Retention) logo
Logs: Standard Indexing (15-Day Retention)

Logs: Standard Indexing (180-Day Retention) logo
Logs: Standard Indexing (180-Day Retention)

Logs: Standard Indexing (3-Day Retention) logo
Logs: Standard Indexing (3-Day Retention)

Standard Indexing is for real-time exploration, alerting, and dashboards with mission-critical logs

Logs: Standard Indexing (30-Day Retention) logo
Logs: Standard Indexing (30-Day Retention)

Logs: Standard Indexing (45-Day Retention) logo
Logs: Standard Indexing (45-Day Retention)

Logs: Standard Indexing (60-Day Retention) logo
Logs: Standard Indexing (60-Day Retention)

Logs: Standard Indexing (7-Day Retention) logo
Logs: Standard Indexing (7-Day Retention)

Logs: Standard Indexing (90-Day Retention) logo
Logs: Standard Indexing (90-Day Retention)

Security: Cloud SIEM logo
Security: Cloud SIEM

Security: Enterprise logo
Security: Enterprise

Security: Pro logo
Security: Pro

Pro allows continuous scanning for misconfigurations across your cloud resources

Security: Software Composition Analysis (SCA) logo
Security: Software Composition Analysis (SCA)

Security: Threat Management logo
Security: Threat Management

Service Management: App Builder logo
Service Management: App Builder

Service Management: Event Management logo
Service Management: Event Management

Service Management: Incident Management logo
Service Management: Incident Management

Service Management: Workflow Automation logo
Service Management: Workflow Automation

Software Delivery: API Testing logo
Software Delivery: API Testing

Software Delivery: Browser Testing logo
Software Delivery: Browser Testing

Software Delivery: CI Pipeline Visibility logo
Software Delivery: CI Pipeline Visibility

Software Delivery: Continuous Testing (add-on) logo
Software Delivery: Continuous Testing (add-on)

Software Delivery: Intelligent Test Runner logo
Software Delivery: Intelligent Test Runner

Software Delivery: Mobile App Testing logo
Software Delivery: Mobile App Testing

Software Delivery: Test Visibility logo
Software Delivery: Test Visibility

Compare prices for similar companies

Supplier
Datadog
Honeycomb.io
Median Contract Value$518,300$126,450
Avg Savings9.78%-

Negotiation insights

Discount levers
Success potential
What you can give to move the needle on pricing
RenewalsNew purchases

Multi-Year
yellow circle with white dashyellow circle with white dash
Case Study / Reference
red circle with arrow pointing downred circle with arrow pointing down
Expected Growth / Economies of Scale
yellow circle with white dashyellow circle with white dash
End of Quarter Signature
red circle with arrow pointing downyellow circle with white dash
Quick Sales Process / Signature
red circle with arrow pointing downyellow circle with white dash

red circle with arrow pointing downLow chances of success
yellow circle with white dashMedium chances of success
green circle with white arrow pointing upHigh chances of success
Think we got something wrong? Let’s make it right — contact us at support@vendr.com

About Vendr

Vendr FAQs

AI Quote Analysis

Upload your quote to check if you’re getting a fair price, under 2 minutes and completely free.Chart showing an example of a price range
Chart showing an example of a price range

Other companies you might be interested in