Identity Threat Detection and Response (ITDR) Software

Identity Threat Detection and Response

What is Identity Threat Detection and Response Software?

Identity Threat Detection and Response (ITDR) is a strategic solution in protecting user identities and systems from cyber threats. ITDR systems monitor user behaviors to detect strange login patterns or unauthorized access attempts, to quickly pinpoint and resolve possible security threats. When a threat is detected, ITDR solutions facilitate immediate actions, like isolating compromised accounts or requiring extra authentication measures, to mitigate risks and protect sensitive information.

Common Features

  • Discover Machine Identities
  • Discover Federated Identities
  • Continuous Discovery
  • ZSP support
  • Authentication support
  • Suspicious activity
  • Time to value
  • Forensics
  • Policy Creation and Right Sizing
  • Refactoring
  • TTP detection
  • Discover Human Identities

Write a Review to receive up to a $10 Gift Card*

*After you complete our short 5-6 minute survey, we will happily provide you with your choice of reward up to $10 based on available options for your region.

Write a Review

Top Identity Threat Detection and Response Software 2024

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

Products below are ineligible for awards due to insufficient recent reviews

Insufficient Data
This product does not have enough reviews to meet the minimum criteria to display results. Please check back shortly or write a review.

Microsoft Entra ID Protection uses advanced machine learning to identify sign-in risks and unusual user behavior to block, challenge, limit, or allow access.

Insufficient Data
This product does not have enough reviews to meet the minimum criteria to display results. Please check back shortly or write a review.

Falcon Identity Protection unifies endpoint and identity security with a single agent and console for immediate time-to-value. Extend your protection further and close the skills gap with industry-leading 24/7 MDR services when you need it.

Insufficient Data
This product does not have enough reviews to meet the minimum criteria to display results. Please check back shortly or write a review.

Gurucul Risk Analytics is built upon our core PIBAE architecture (Predictive Identity Based Behavior Anomaly Engine). PIBAE identifies anomalous behaviors across users, accounts, applications, and devices by leveraging behavior analytics, machine learning, and peer group modeling.

Insufficient Data
This product does not have enough reviews to meet the minimum criteria to display results. Please check back shortly or write a review.

As cyberattacks become more sophisticated and users work from anywhere, the hub-and-spoke networks and perimeter security we once relied on—VPNs and firewalls—fail to provide strong cyber and data protection and deliver poor user experience. Stretching your network like this enables cybercriminals to attack and compromise sensitive data.

Insufficient Data
This product does not have enough reviews to meet the minimum criteria to display results. Please check back shortly or write a review.

Empower your security and intelligence in user access decisions with visibility across all environments.

Insufficient Data
This product does not have enough reviews to meet the minimum criteria to display results. Please check back shortly or write a review.

The Exabeam Security Operations Platform supports TDIR best practices with a use case approach for external and insider threats. Pre-built content streamlines workflows and Outcomes Navigator maps logs to use cases and ATT&CK, identifying coverage gaps and providing actionable recommendations.

Insufficient Data
This product does not have enough reviews to meet the minimum criteria to display results. Please check back shortly or write a review.

Email security trusted by 87 of the Fortune 100 to block human-targeted attacks, stop account takeover and safeguard privileged identities.

Insufficient Data
This product does not have enough reviews to meet the minimum criteria to display results. Please check back shortly or write a review.

Silverfort is the Unified Identity Protection company that pioneered the first and only platform, enabling modern identity security everywhere.

Insufficient Data
This product does not have enough reviews to meet the minimum criteria to display results. Please check back shortly or write a review.

Pioneers in intelligent identity security solutions dedicated to empowering enterprises to safeguard their digital environments. They transform IGA by delivering innovative, cloud-first solutions that ensure security, compliance, & risk management across diverse IT landscapes, including multi-cloud, hybrid, & on-premises environments.

Insufficient Data
This product does not have enough reviews to meet the minimum criteria to display results. Please check back shortly or write a review.

Okta transforms security by being the connective tissue that seamlessly integrates the SaaS and security solutions you depend on, automating real-time responses to Identity threats.