• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Identity Threat Detection and Response (ITDR)

Identity Threat Detection and Response (ITDR) Reviews and Ratings

What is Identity Threat Detection and Response (ITDR)?

Identity Threat Detection and Response (ITDR) refers to a set of security practices and technologies designed to detect, investigate, and respond to threats targeting digital identities within an organization. These threats often involve compromised credentials, privilege escalation, or unauthorized access to sensitive systems. ITDR solutions work by continuously monitoring identity-related activities, analyzing behavior patterns, and identifying anomalies that may indicate malicious intent. Once a threat is detected, ITDR tools help security teams respond quickly by isolating affected accounts, enforcing multi-factor authentication, or initiating automated remediation workflows. As identity becomes a primary attack vector in modern cyber threats, ITDR plays a crucial role in strengthening an organization’s overall security posture.

How Categories and Markets Are Defined

Product Listings

Filter by

Products 1 - 16 of 16
Sort by
Logo of Falcon Next-Gen Identity Security

Falcon Next-Gen Identity Security

By CrowdStrike

4.6
(138 Ratings)

CrowdStrike Falcon Identity Protection delivers identity threat detection and response (ITDR) capabilities, protecting organizations from identity-based attacks in real time. It unifies identity and endpoint protection, improving security outcomes and operational efficiency. Falcon Identity Protection provides comprehensive visibility and protection across on-premises, cloud, and hybrid identity environments. By baselining normal user behavior, it instantly detects and prevents malicious identity activity. It also extends conditional, risk-based access controls, maintaining security with a frictionless user experience. With Falcon Identity Protection, organizations gain proactive security against identity threats, preventing breaches before they occur.

Show More Details
Logo of Microsoft Defender for Identity

Microsoft Defender for Identity

By Microsoft

4.3
(57 Ratings)

Microsoft Defender for Identity is a software designed to help organizations detect and investigate advanced identity-related threats within on-premises Active Directory environments. It provides real-time monitoring and analysis of user activities, behaviors, and permissions to identify potential security risks such as compromised accounts, lateral movement, and reconnaissance efforts. The software uses data from Active Directory signals and network traffic to pinpoint suspicious actions and provide actionable insights for security operations teams. Its integration with broader security platforms allows streamlined incident response and supports investigations by enabling visibility into identity-based attacks targeting businesses.

Show More Details
Logo of Proofpoint Identity Threat Defense

Proofpoint Identity Threat Defense

By Proofpoint

4.5
(27 Ratings)

Proofpoint Identity Threat Defense is a software that detects and mitigates identity-based threats within enterprise environments. The software uses analytics to identify compromised credentials, lateral movement, and privilege escalation tactics used by attackers. It provides visibility into user accounts and privileges to help organizations manage attack surfaces associated with identity and access. By analyzing network and directory activity, the software uncovers potential exposures, high-risk accounts, and attack paths that could be exploited. It integrates with existing security tools to enrich detection and response efforts and supports policy-driven remediation to reduce risk related to compromised identities. Proofpoint Identity Threat Defense addresses identity security challenges by providing organizations with the ability to detect, prioritize, and respond to threats targeting user accounts within their networks.

Show More Details
Logo of Singularity Identity

Singularity Identity

By SentinelOne

4.3
(27 Ratings)

Singularity Identity is a software developed by SentinelOne designed to detect and protect against identity-based threats within enterprise environments. The software offers real-time monitoring and analysis of identity-related activities, including credential exposures, lateral movement attempts, and privilege escalations. By leveraging behavioral analytics and automated response mechanisms, it helps organizations identify and mitigate risks associated with compromised accounts and unauthorized access. Singularity Identity integrates with existing security frameworks to provide visibility into user credentials, access patterns, and directory service activities, enabling organizations to address challenges related to identity security and maintain access integrity across their networks.

Show More Details
Logo of Netwrix Threat Prevention

Netwrix Threat Prevention

By Netwrix

4.2
(11 Ratings)

Netwrix Threat Prevention, part of the Netwrix Identity Threat Detection and Response (ITDR) solution, helps organizations protect Active Directory from identity-based threats. By capturing events at the source, without relying on native logs, it spots suspicious authentications and unauthorized modifications in real time, and can be configured to automatically block them to stop privilege escalation, policy tampering, and other identity-based attacks. With built-in alerting, centralized event storage and search, and integrations with SIEM tools, it enables faster investigation, supports compliance, and strengthens the resilience of identity infrastructure.

Show More Details
Logo of Cisco Identity Intelligence

Cisco Identity Intelligence

By Cisco Systems

4.6
(7 Ratings)

Cisco Identity Intelligence is a software designed to provide organizations with visibility and analysis of identity data across hybrid and multi-cloud environments. The software aggregates identity information from various sources, utilizing analytics and artificial intelligence to detect suspicious activities, potential threats, and policy violations. By integrating with existing security systems, the software enables administrators to assess risks associated with user accounts, identities, and credentials. The solution aids businesses in managing access controls, identifying privileged users, and mitigating the risk of identity-driven attacks. The software addresses the challenge of maintaining secure and compliant identity management in complex enterprise environments by offering actionable insights and improving operational efficiency.

Show More Details
Logo of Netwrix Identity Threat Detection and Response (ITDR)

Netwrix Identity Threat Detection and Response (ITDR)

By Netwrix

4.2
(5 Ratings)

Netwrix Identity Threat Detection and Response is a software designed to help organizations identify, investigate, and mitigate identity-based threats across hybrid and multi-cloud environments. The software provides automated detection of suspicious activities, risk indicators, and anomalous behavior related to user identities and credentials. It facilitates incident investigation by correlating identity threat data and streamlining alert management. Netwrix Identity Threat Detection and Response enables organizations to reduce the risk associated with compromised accounts, privilege abuse, and identity-related attack paths. The software supports integration with existing security solutions and offers customizable policies to tailor detection and response to specific requirements. Its primary business purpose is to enhance security posture by addressing vulnerabilities and threats connected to identity management.

Show More Details
Logo of Cortex XDR

Cortex XDR

By Palo Alto Networks

4.7
(3 Ratings)

Cortex XDR is a software developed by Palo Alto Networks that integrates data from network, endpoint, and cloud sources to detect, investigate, and respond to cyber threats. The software enables security teams to identify suspicious behavior, conduct root cause analysis, and respond to incidents through automated response capabilities. It provides analytics-driven threat prevention and leverages behavioral analytics to correlate alerts across different environments, helping organizations reduce risks from advanced attacks. Cortex XDR addresses challenges of fragmented security data and manual threat investigations by consolidating security operations into a single platform, allowing for more efficient detection and response workflows.

Show More Details
Logo of Delinea Identity Threat Protection

Delinea Identity Threat Protection

By Delinea

4.7
(3 Ratings)

Delinea Identity Threat Protection is a software designed to defend organizations against identity-based cyber threats by monitoring, analyzing, and responding to anomalies in user behavior and access patterns. The software delivers capabilities such as detection of suspicious activities, identification of compromised credentials, and prevention of lateral movement within IT environments. It integrates with existing identity and access management solutions to provide continuous oversight of privileged accounts and enforces policies to reduce risk. The software aims to address the business problem of unauthorized access, privilege escalation, and potential data breaches through automated response mechanisms and analytics-driven threat identification, thereby supporting organizational efforts to secure sensitive information and maintain compliance with regulatory requirements.

Show More Details
Logo of Netwrix Threat Manager

Netwrix Threat Manager

By Netwrix

3.4
(3 Ratings)

Netwrix Threat Manager protects your identity infrastructure by blocking threats, detecting, and responding to identity-based attacks across Active Directory and Entra ID with high accuracy and speed. It uses behavioral analytics and machine learning to surface true threats and reduce alert noise. With automated response actions and seamless integration into SIEMs platforms, ITSM tools like ServiceNow and collaboration platforms like Slack, it enables fast, coordinated incident response. Built-in investigation tools provide full visibility into suspicious activity so your team can take control before attackers do.

Show More Details
Logo of Silverfort Identity Threat Detection & Response (ITDR)

Silverfort Identity Threat Detection & Response (ITDR)

By Silverfort

4.7
(3 Ratings)

Silverfort Identity Threat Detection & Response is a software designed to monitor, detect, and respond to identity-based threats across hybrid and multi-cloud environments. The software integrates with existing identity and access management solutions to analyze authentication activity and identify unauthorized access attempts or abnormal behavior. It delivers real-time risk assessments and alerts, as well as automated response actions to help prevent credential compromise and lateral movement within networks. Silverfort Identity Threat Detection & Response enables organizations to strengthen identity security by providing visibility into identity attack surfaces and allowing proactive measures against identity threats without requiring modifications to endpoints or changes to user workflows.

Show More Details
Logo of Gurucul Identity Threat Detection and Response (ITDR) Solution

Gurucul Identity Threat Detection and Response (ITDR) Solution

By Gurucul

4
(2 Ratings)

Gurucul Identity Threat Detection and Response (ITDR) Solution is a software designed to monitor, analyze, and manage identity-based threats within organizations. The software leverages advanced analytics and machine learning to identify suspicious activities related to user and entity behaviors, access management, and credential misuse. It provides features for real-time threat detection, automated response, and in-depth investigation of identity-related incidents to help organizations prevent data breaches and reduce risk associated with compromised identities. The software assists businesses in addressing challenges around unauthorized access, insider threats, and security gaps in identity and access management systems by providing actionable intelligence and orchestrating response workflows for identified threats.

Show More Details
Logo of Huntress Managed ITDR

Huntress Managed ITDR

By Huntress

3
(1 Rating)

Huntress Managed ITDR is a software developed to provide identity threat detection and response capabilities for organizations. The software continuously monitors identity infrastructure to detect unauthorized access, suspicious authentication activity, and potential identity-based threats. It includes automated analysis of user and service account behaviors, lateral movement detection, and indicators of credential compromise. Huntress Managed ITDR aims to help organizations respond to identity threats by generating detailed alerts and actionable insights, enabling security teams to investigate incidents and mitigate risks associated with compromised credentials and misused permissions in their environments.

Show More Details
Logo of Semperis ITDR

Semperis ITDR

By Semperis

5
(1 Rating)

Semperis ITDR is a software designed to detect, respond to, and remediate identity-based threats within hybrid Active Directory environments. It offers capabilities for monitoring identity infrastructure, analyzing suspicious activities, and responding to potential compromises by automating threat detection workflows. The software helps organizations protect against unauthorized access and account takeover attempts. Through integration with existing security systems, it provides insights into vulnerabilities and supports incident response by offering tools for containment and recovery. The software addresses the business challenge of safeguarding identity-related assets against increasingly sophisticated cyber attacks targeting authentication platforms and user directories.

Show More Details
Logo of Permiso

Permiso

By Permiso Security

Permiso is a software that provides cloud detection and response capabilities for organizations seeking to secure their cloud environments. The software monitors cloud infrastructure activity, aiming to identify and investigate potential threats by analyzing user and service account behaviors. Permiso offers features such as identity-based tracking and threat hunting, facilitating visibility into cloud activity and providing tools to detect signs of compromise. The software addresses business challenges related to unauthorized access, insider threats, and difficult-to-detect security incidents in complex cloud architectures by enabling security teams to investigate incidents efficiently and strengthen cloud security posture.

Be the first to .
Logo of Seceon aiSIEM

Seceon aiSIEM

By Seceon

Seceon Open Threat Management OTM Platform aiSIEM is a cybersecurity software designed to deliver threat detection, monitoring, and response automation for organizations. The software utilizes artificial intelligence and machine learning to analyze security data from various sources, enabling the identification of malicious activities, policy violations, and vulnerabilities. It provides automated correlation and contextualization of security events to support threat prioritization and alert management. The software offers integrated security information and event management SIEM capabilities, including log collection, normalization, and real-time analytics, cloud monitoring, and UBEA and NDR capabilities, allowing organizations to address security incidents and meet compliance requirements. The platform aims to streamline security operations by reducing manual efforts and supporting efficient incident resolution.

Be the first to .

Top Trending Products

Falcon Next-Gen Identity SecurityMicrosoft Defender for IdentityCortex XDRGurucul Identity Threat Detection and Response (ITDR) SolutionProofpoint Identity Threat DefenseSilverfort Identity Threat Detection & Response (ITDR)Huntress Managed ITDR

Popular Product Comparisons

Falcon Next-Gen Identity Security vs Microsoft Defender for IdentityFalcon Next-Gen Identity Security vs Semperis ITDR

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.