• Categories

    • Loading categories...

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Identity Threat Detection and Response (ITDR)

Identity Threat Detection and Response (ITDR) Reviews and Ratings

What is Identity Threat Detection and Response (ITDR)?

Identity Threat Detection and Response (ITDR) refers to a set of security practices and technologies designed to detect, investigate, and respond to threats targeting digital identities within an organization. These threats often involve compromised credentials, privilege escalation, or unauthorized access to sensitive systems. ITDR solutions work by continuously monitoring identity-related activities, analyzing behavior patterns, and identifying anomalies that may indicate malicious intent. Once a threat is detected, ITDR tools help security teams respond quickly by isolating affected accounts, enforcing multi-factor authentication, or initiating automated remediation workflows. As identity becomes a primary attack vector in modern cyber threats, ITDR plays a crucial role in strengthening an organization’s overall security posture.

How Categories and Markets Are Defined

Product Listings

Filter by

Products 1 - 13 of 13
Sort by
Logo of Falcon Next-Gen Identity Security

Falcon Next-Gen Identity Security

By CrowdStrike

4.6
(109 Ratings)

CrowdStrike is a recognized entity in the cybersecurity space, specializing in enterprise risk management through the innovative application of technology. The company focuses primarily on protecting essential business risk areas such as endpoints, cloud workloads, identity, and data. Employing the state-of-the-art CrowdStrike Security Cloud and advanced AI technology, the firm provides effective solutions. Its CrowdStrike Falcon platform uses real-time indications of attack, threat intelligence, telemetry enhanced from diverse enterprise sources, and evolving adversary knowhow for high-grade detection, automated protection and healing, advanced threat tracking, and efficient vulnerability visibility. The Falcon platform, designed in the cloud with a singular lightweight-agent architecture, offers swift deployment, unique protection and performance, and reduced complexity. Therefore, CrowdStrike delivers a significant value proposition right from the beginning.

Show More Details
Logo of Microsoft Defender for Identity

Microsoft Defender for Identity

By Microsoft

4.3
(45 Ratings)

Microsoft enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more. Microsoft is dedicated to advancing human and organizational achievement.

Microsoft Security helps protect people and data against cyberthreats to give peace of mind.

Show More Details
Logo of Singularity Identity

Singularity Identity

By SentinelOne

4.3
(27 Ratings)

SentinelOne provides autonomous security solutions for various IT environments. The company's main focus is on endpoint security, cloud security, and identity security. It operates on an AI-powered platform that brings prevention, detection, response, remediation, and forensics under one umbrella. The endpoint security product uses artificial intelligence to constantly adapt to new threats, offering real-time protection and automated response. The key principle of SentinelOne's security approach is to allow organizations to detect harmful behavior across multiple vectors, rapidly eliminate threats with an integrated response, and continuously adapt defenses against advanced cyber attacks. The company also provides a range of services such as threat hunting, incident response, and incident management.

Show More Details
Logo of Proofpoint Identity Threat Defense

Proofpoint Identity Threat Defense

By Proofpoint

4.5
(25 Ratings)

The company focuses on providing cybersecurity and compliance solutions. It primarily aims to offer protection across various digital channels such as email, web, cloud, and social media.

Show More Details
Logo of Cisco Identity Intelligence

Cisco Identity Intelligence

By Cisco Systems

4.6
(7 Ratings)

Cisco is a company that specializes in networking technologies, particularly Internet Protocol (IP)-based solutions. It was established in 1984 by a group of computer scientists from Stanford University. As of today, Cisco has a global workforce, continuing to innovate in various fields, notably in routing and switching. Adding to its core business, the company also delves into emerging technologies including home networking, IP telephony, optical networking, security features, storage area networking, and wireless technology. Moreover, Cisco extends its expertise to offer a sweeping range of services such as technical support and advanced services. The company sells its products and services on an enterprise level, to commercial businesses, service providers, and end-users.

Show More Details
Logo of Netwrix Identity Threat Detection and Response (ITDR)

Netwrix Identity Threat Detection and Response (ITDR)

By Netwrix

4.3
(4 Ratings)

Netwrix empowers information security and governance professionals to identify and protect

sensitive data to reduce the risk of a breach. Our solutions also limit the impact of attacks by helping

IT teams detect, respond and recover from them faster and with less effort. Over 13,500

organizations worldwide rely on Netwrix solutions to strengthen their security and compliance

posture across all three primary attack vectors: data, identity and infrastructure.

Show More Details
Logo of Delinea Identity Threat Protection

Delinea Identity Threat Protection

By Delinea

4.7
(3 Ratings)

Delinea specializes in the provision of Privileged Access Management (PAM) solutions, catering to the needs of the modern, hybrid enterprise. Delinea's Platform concentrates on offering authorization for varying identities, ensuring controlled access to critical hybrid cloud infrastructure as well as sensitive data. Aiming to bring down risk, guarantee compliance and streamline security within an organization, it prioritizes privileged access as a pivotal part of cyber-security strategies. Delinea's solutions are hinged on the belief that every user should be regarded as a privileged user, and they should be able to enjoy secure, seamless access without excessive complexity. The goal is an increased accessibility of privileged access in a world where organizations are gradually transforming digitally and moving their operations to the cloud. Delinea's approach pinpoints and effectively defines the boundaries of access for an organization.

Show More Details
Logo of Silverfort Identity Threat Detection & Response (ITDR)

Silverfort Identity Threat Detection & Response (ITDR)

By Silverfort

4.5
(2 Ratings)

Silverfort operates as an identity security platform that integrates natively with on-prem and cloud-based IAM directories, infrastructures, and SaaS apps—including Active Directory, Entra ID, Okta, Ping, AWS, and others. It inspects all authentication and access attempts across human users and machine accounts in hybrid environments, enforcing real-time access policies such as MFA, deny, or Just-in-Time access. It extends security controls to systems not traditionally protected, including legacy apps, IT infrastructure, file shares, and command-line interfaces. Silverfort also performs discovery and classification of privileged users, mapping access behavior to enforce least privilege. Its architecture operates at the authentication layer, enabling centralized policy orchestration across environments. This allows organizations to prevent credential compromise, lateral movement, and privilege escalation while maintaining full visibility and control over identity activity.

Show More Details
Logo of Gurucul Identity Threat Detection and Response (ITDR) Solution

Gurucul Identity Threat Detection and Response (ITDR) Solution

By Gurucul

4
(1 Rating)

Gurucul is a global cybersecurity analytics company that empowers security operations teams to find and detect external and insider threats in real-time. Our unified, cloud-native platform scales to meet today's data demands and is purpose-built for prevalent use cases like account compromise, SOC modernization, fraud, compliance, and more. The power of our open analytics engine is a combination of several things: a flexible architecture that supports your choice of data lakes; an automated pipeline that ingests any type of data from anywhere; thousands of pre-tuned machine learning models that continuously learn and are easily customized; and a unified risk score enriched with behavior and identity context. From our headquarters in Los Angeles, we’ve proudly served the world’s biggest brands and government agencies for more than a decade.

Show More Details
Logo of Semperis ITDR

Semperis ITDR

By Semperis

5
(1 Rating)

For security teams charged with defending hybrid and multi-cloud environments, Semperis ensures the integrity and availability of critical enterprise directory services at every step in the cyber kill chain and cuts recovery time by 90%. Purpose-built for securing hybrid Active Directory environments, Semperis' patented technology protects over 50 million identities from cyberattacks, data breaches, and operational errors.

Show More Details
Logo of Cortex XDR

Cortex XDR

By Palo Alto Networks

Palo Alto Networks is a global cybersecurity organization shaping the future of cloud-centric technology. The main business objective is to provide effective cybersecurity solutions, maintaining and valuing the digital way of life. It addresses the significant issue of maintaining digital security in an increasingly online-centric world. The company utilizes innovative approaches leveraging advancements in artificial intelligence, analytics, automation, and orchestration. Offering an integrated platform and bolstering a burgeoning ecosystem of collaborators, it assures protection across various platforms including clouds, networks, and mobile devices. The organization envisions a progressively safe and secure digital world each day.

Be the first to .
Logo of Huntress Managed ITDR

Huntress Managed ITDR

By Huntress

Huntress is the enterprise-grade cybersecurity platform backed by our 24/7 AI-assisted SOC—built for all businesses, not just the 1%. The company’s focus is to outplay hackers, using comprehensive understanding and insight into the hacker's mindset. Huntress offers a Managed Security Platform uniting skilled minds in cybersecurity to tackle complex cyber threats. The platform enables businesses to detect and counter threats in their systems effectively. Additional features of the platform include comprehensive incident reports for seamless security incident handling, capabilities of antivirus, detection of ransomware, and host isolation.

Be the first to .
Logo of Permiso

Permiso

By Permiso Security

Permiso Security focuses on addressing identity protection and threat detection for both human and non-human identities throughout all stages of the identity lifecycle. The company develops solutions that monitor and identify potential risks associated with identity use across various environments. Permiso Security aims to reduce vulnerabilities by providing tools that help organizations maintain visibility and control over the identities that access their systems, emphasizing detection and response to threats related to identity management.

Be the first to .

Top Trending Products

Falcon Next-Gen Identity SecurityMicrosoft Defender for IdentitySingularity IdentityProofpoint Identity Threat Defense

Popular Product Comparisons

Falcon Next-Gen Identity Security vs Microsoft Defender for Identity

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.