• HOME
  • CATEGORIES

    • CATEGORIES

    • Application Development

      • Observability Platforms
      • Integrated Development Environment (IDE) Software
      • Enterprise Agile Planning Tools
      • Integration Platform as a Service
      • AI-Augmented Software Testing Tools
      • View All
    • Artificial Intelligence

      • AI Code Assistants (Transitioning to AI Coding Agents)
      • Generative AI Knowledge Management Apps/General Productivity
      • AI Application Development Platforms
      • Artificial Intelligence Applications in IT Service Management (Transitioning to AI Applications in IT Service Management)
      • Conversational AI Platforms
      • View All
    • Cloud Computing

      • Backup and Data Protection Platforms
      • Cloud Database Management Systems
      • Strategic Cloud Platform Services
      • Server Virtualization (Transitioning to Server Virtualization Platforms)
      • Hybrid Cloud Storage
      • View All
    • Customer Relationship Management

      • Contact Center as a Service
      • CRM Customer Engagement Center
      • Digital Experience Platforms
      • Web Content Management
      • Field Service Management
      • View All
    • Data and Analytics

      • Analytics and Business Intelligence Platforms
      • Data Science and Machine Learning Platforms (Transitioning to AI Platforms For Data Science and Machine Learning)
      • Data Integration Tools
      • Process Mining Platforms (Transitioning to Process Intelligence Platforms)
      • Augmented Data Quality Solutions
      • View All
    • Education

      • Manager and Leadership Training
      • Corporate Learning Technologies
      • eLearning Authoring Tools
      • Higher Education Student Information System Software as a Service (Transitioning to Higher Education SaaS Student Information Systems)
      • Digital Learning Content Providers
      • View All
    • Enterprise Networking and Communications

      • Unified Communications as a Service
      • Global WAN Services
      • Intranet Packaged Solutions
      • SD-WAN
      • Edge Distribution Platforms
      • View All
    • Finance

      • Expense Management Software
      • Financial Planning Software
      • Financial Close and Consolidation Solutions
      • Cloud Financial Management Tools
      • Accounts Payable Applications
      • View All
    • Healthcare and Life Sciences

      • Medical Device Security Solutions (Transitioning to Medical Device Risk Management Platforms)
      • Health Navigation Solutions
      • Claim Editor Software
      • Revenue Cycle Management Software (Transitioning to Revenue Cycle Management Solutions)
      • Digital Health Platforms (Transitioning to Healthcare Provider Industry Cloud Platforms)
      • View All
    • Human Resources

      • Employee Recognition and Reward Systems
      • Workforce Management Applications (Transitioning to Workforce Management (WFM) Technology)
      • Digital Employee Experience Management Tools
      • Talent Acquisition (Recruiting) Suites
      • Cloud HCM Suites for Regional and/or Sub-1,000 Employee Enterprises
      • View All
    • IT Infrastructure and IoT

      • Enterprise Wired and Wireless LAN Infrastructure (Transitioning to Enterprise Wired and Wireless LAN)
      • Endpoint Management Tools
      • IT Service Management Platforms
      • Container Management
      • Infrastructure Monitoring Tools
      • View All
    • IT Security

      • Endpoint Protection Platforms
      • Email Security
      • Managed Detection and Response
      • Security Information and Event Management
      • Security Awareness Computer-Based Training
      • View All
    • Legal

      • Contract Life Cycle Management
      • Electronic Signature
      • Governance, Risk and Compliance Tools, Assurance Leaders
      • Compliance Monitoring Solutions
      • Corporate Governance Services
      • View All
    • Manufacturing

      • Enterprise Asset Management Software
      • Manufacturing Execution Systems
      • Global Industrial IoT Platforms
      • PLM Software in Discrete Manufacturing Industries
      • Computer-Aided Design (CAD) Software
      • View All
    • Marketing

      • Video Editing Software
      • Email Marketing
      • Multichannel Marketing Hubs
      • Customer Data Platforms
      • Event Marketing and Management Platforms
      • View All
    • Productivity and Collaboration

      • Document Management
      • Collaborative Work Management
      • Visual Collaboration Applications
      • Knowledge Management (KM) Software
      • Meeting Solutions
      • View All
    • Public Sector and Government

      • Government Budgeting and Planning Solution
      • Cloud-Based ERP for U.S. Local Government
      • Government ERP Solutions
      • Citizen Service Delivery
      • Government Contracting Software
      • View All
    • Retail

      • Digital Commerce
      • Digital Commerce Payment Vendors (Transitioning to Digital Commerce Payment Platforms)
      • Retail Assortment Management Applications: Long Life Cycle Products
      • Retail Workforce Management Applications (Transitioning to Retail Workforce Management Technology)
      • Digital Shelf Analytics
      • View All
    • Sales

      • Revenue Enablement Platforms
      • Sales Force Automation Platforms (Transitioning to CRM Sales Platforms)
      • Revenue Intelligence (Transitioning to Revenue Action Orchestration)
      • Configure, Price and Quote Applications
      • Search and Product Discovery
      • View All
    • Supply Chain Management

      • Supply Chain Planning Solutions
      • Transportation Management Systems
      • Real-Time Transportation Visibility Platforms
      • Warehouse Management Systems
      • Supply Chain Strategy, Planning and Operations Consulting
      • View All
    • Utilities

      • Geospatial Information Systems for Energy and Utilities
      • Mobile Workforce Management Software for Utilities (Transitioning to Mobile Workforce Management Solutions for Power and Utilities)
      • Energy Management and Optimization Systems
      • Energy Trading and Risk Management
      • Advanced Distribution Management Systems
      • View All
    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

      • Application Development
      • Artificial Intelligence
      • Cloud Computing
      • Customer Relationship Management
      • Data and Analytics
      • Education
      • Enterprise Networking and Communications
      • Finance
      • Healthcare and Life Sciences
      • Human Resources
      • IT Infrastructure and IoT
      • IT Security
      • Legal
      • Manufacturing
      • Marketing
      • Productivity and Collaboration
      • Public Sector and Government
      • Retail
      • Sales
      • Supply Chain Management
      • Utilities
      Browse All Categories

      Application Development

      69 markets
      • Observability Platforms
      • Integrated Development Environment (IDE) Software
      • Enterprise Agile Planning Tools
      • Integration Platform as a Service
      • AI-Augmented Software Testing Tools
      • API Management
      • Enterprise Low-Code Application Platforms
      • Robotic Process Automation
      • DevOps Platforms (Transitioning to DevSecOps Platforms)
      • Business Process Automation Tools
      • Enterprise Architecture Tools
      • Business Orchestration and Automation Technologies
      • Custom Software Development Services
      • Code Review Tools
      • Digital Adoption Platforms
      • Domain Registrars
      • Game Engine Software
      • Public Cloud IT Transformation Services (Transitioning to Public Cloud Optimization and Transformation Services)
      • Website Builders
      • Developer Productivity Insight Platforms
      • AI Agents for Application Developers
      • Application Platforms (Transitioning to Cloud-Native Application Protection Platforms)
      • Feature Management
      • Application Crowdtesting Services
      • Test Data Management
      • API Generation Software
      • Prototyping Software
      • Mobile App Analytics
      • AI-Augmented Code Modernization Tools
      • Virtual Reality Development Software
      • Application Testing Services, Worldwide (Transitioning to Quality Engineering Services)
      • Green Software Engineering
      • Event Brokers
      • Application Integration Platforms
      • Digital Twin of an Organization Platforms
      • Independent Third-Party Software Support of Megavendors
      • Microsoft 365 Implementation and Support Services
      • Application Development Life Cycle Management (Transitioning to DevOps Platforms)
      • BPM-Platform-Based Case Management Frameworks
      • Microsoft Product Support Services
      • Product Roadmapping Tools for Software Engineering
      • Multiexperience Development Platforms
      • AI Agent Development Platforms for Software Engineering
      • Application Portfolio Management Tools
      • Application Composition Platform
      • Internal Developer Portals
      • Cloud Development Environments
      • Mobile Development Frameworks (Transitioning to Web and Mobile Development Frameworks)
      • Load Testing Tools
      • Blockchain Consulting and Proof-of-Concept Development Services
      • B2B Gateway Software
      • Citizen Application Development Platforms
      • Mobile Application Testing Services
      • SAP S/4HANA Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • Oracle Cloud Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • SAP Application Services, Worldwide
      • SAP SuccessFactors Service Providers (Transitioning to Cloud ERP Services)
      • Service Mesh
      • Value Stream Management Platforms
      • Business-Outcome-Driven Enterprise Architecture Consulting (Retired)
      • Oracle Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • Rapid Mobile App Development Tools
      • SAP Selective Test Data Management Tools
      • API and MCP Testing Tools
      • Augmented Reality Development Software
      • Blockchain as a Service
      • Mobile Application Management (Transitioning to Endpoint Management Tools)
      • Mobile Back-End Services
      • R&D Outsourcing Providers
      View More
  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Identity Threat Detection and Response (ITDR)

Identity Threat Detection and Response (ITDR) Reviews and Ratings

What is Identity Threat Detection and Response (ITDR)?

Identity Threat Detection and Response (ITDR) refers to a set of security practices and technologies designed to detect, investigate, and respond to threats targeting digital identities within an organization. These threats often involve compromised credentials, privilege escalation, or unauthorized access to sensitive systems. ITDR solutions work by continuously monitoring identity-related activities, analyzing behavior patterns, and identifying anomalies that may indicate malicious intent. Once a threat is detected, ITDR tools help security teams respond quickly by isolating affected accounts, enforcing multi-factor authentication, or initiating automated remediation workflows. As identity becomes a primary attack vector in modern cyber threats, ITDR plays a crucial role in strengthening an organization’s overall security posture.

How Categories and Markets Are Defined

Product Listings

Filter by

Products 1 - 17 of 17
Sort by
Logo of Falcon Next-Gen Identity Security

Falcon Next-Gen Identity Security

By CrowdStrike

4.6
(148 Ratings)

CrowdStrike Falcon Identity Protection delivers identity threat detection and response (ITDR) capabilities, protecting organizations from identity-based attacks in real time. It unifies identity and endpoint protection, improving security outcomes and operational efficiency. Falcon Identity Protection provides comprehensive visibility and protection across on-premises, cloud, and hybrid identity environments. By baselining normal user behavior, it instantly detects and prevents malicious identity activity. It also extends conditional, risk-based access controls, maintaining security with a frictionless user experience. With Falcon Identity Protection, organizations gain proactive security against identity threats, preventing breaches before they occur.

Show More Details
Logo of Microsoft Defender for Identity

Microsoft Defender for Identity

By Microsoft

4.3
(64 Ratings)

Microsoft Defender for Identity is a software designed to help organizations detect and investigate advanced identity-related threats within on-premises Active Directory environments. It provides real-time monitoring and analysis of user activities, behaviors, and permissions to identify potential security risks such as compromised accounts, lateral movement, and reconnaissance efforts. The software uses data from Active Directory signals and network traffic to pinpoint suspicious actions and provide actionable insights for security operations teams. Its integration with broader security platforms allows streamlined incident response and supports investigations by enabling visibility into identity-based attacks targeting businesses.

Show More Details
Logo of Proofpoint Identity Threat Defense

Proofpoint Identity Threat Defense

By Proofpoint

4.5
(28 Ratings)

Proofpoint Identity Threat Defense is a software that detects and mitigates identity-based threats within enterprise environments. The software uses analytics to identify compromised credentials, lateral movement, and privilege escalation tactics used by attackers. It provides visibility into user accounts and privileges to help organizations manage attack surfaces associated with identity and access. By analyzing network and directory activity, the software uncovers potential exposures, high-risk accounts, and attack paths that could be exploited. It integrates with existing security tools to enrich detection and response efforts and supports policy-driven remediation to reduce risk related to compromised identities. Proofpoint Identity Threat Defense addresses identity security challenges by providing organizations with the ability to detect, prioritize, and respond to threats targeting user accounts within their networks.

Show More Details
Logo of Singularity Identity

Singularity Identity

By SentinelOne

4.3
(28 Ratings)

Singularity Identity is a software developed by SentinelOne designed to detect and protect against identity-based threats within enterprise environments. The software offers real-time monitoring and analysis of identity-related activities, including credential exposures, lateral movement attempts, and privilege escalations. By leveraging behavioral analytics and automated response mechanisms, it helps organizations identify and mitigate risks associated with compromised accounts and unauthorized access. Singularity Identity integrates with existing security frameworks to provide visibility into user credentials, access patterns, and directory service activities, enabling organizations to address challenges related to identity security and maintain access integrity across their networks.

Show More Details
Logo of Netwrix Threat Prevention

Netwrix Threat Prevention

By Netwrix

4.2
(11 Ratings)

Netwrix Threat Prevention, part of the Netwrix Identity Threat Detection and Response (ITDR) solution, helps organizations protect Active Directory from identity-based threats. By capturing events at the source, without relying on native logs, it spots suspicious authentications and unauthorized modifications in real time, and can be configured to automatically block them to stop privilege escalation, policy tampering, and other identity-based attacks. With built-in alerting, centralized event storage and search, and integrations with SIEM tools, it enables faster investigation, supports compliance, and strengthens the resilience of identity infrastructure.

Show More Details
Logo of Cisco Identity Intelligence

Cisco Identity Intelligence

By Cisco Systems

4.3
(9 Ratings)

Cisco Identity Intelligence is a software designed to provide organizations with visibility and analysis of identity data across hybrid and multi-cloud environments. The software aggregates identity information from various sources, utilizing analytics and artificial intelligence to detect suspicious activities, potential threats, and policy violations. By integrating with existing security systems, the software enables administrators to assess risks associated with user accounts, identities, and credentials. The solution aids businesses in managing access controls, identifying privileged users, and mitigating the risk of identity-driven attacks. The software addresses the challenge of maintaining secure and compliant identity management in complex enterprise environments by offering actionable insights and improving operational efficiency.

Show More Details
Logo of Cortex XDR

Cortex XDR

By Palo Alto Networks

4.7
(6 Ratings)

Cortex XDR is a software developed by Palo Alto Networks that integrates data from network, endpoint, and cloud sources to detect, investigate, and respond to cyber threats. The software enables security teams to identify suspicious behavior, conduct root cause analysis, and respond to incidents through automated response capabilities. It provides analytics-driven threat prevention and leverages behavioral analytics to correlate alerts across different environments, helping organizations reduce risks from advanced attacks. Cortex XDR addresses challenges of fragmented security data and manual threat investigations by consolidating security operations into a single platform, allowing for more efficient detection and response workflows.

Show More Details
Logo of Netwrix Identity Threat Detection and Response (ITDR)

Netwrix Identity Threat Detection and Response (ITDR)

By Netwrix

4.2
(5 Ratings)

Netwrix Identity Threat Detection and Response is a software designed to help organizations identify, investigate, and mitigate identity-based threats across hybrid and multi-cloud environments. The software provides automated detection of suspicious activities, risk indicators, and anomalous behavior related to user identities and credentials. It facilitates incident investigation by correlating identity threat data and streamlining alert management. Netwrix Identity Threat Detection and Response enables organizations to reduce the risk associated with compromised accounts, privilege abuse, and identity-related attack paths. The software supports integration with existing security solutions and offers customizable policies to tailor detection and response to specific requirements. Its primary business purpose is to enhance security posture by addressing vulnerabilities and threats connected to identity management.

Show More Details
Logo of Delinea Identity Threat Protection

Delinea Identity Threat Protection

By Delinea

4.5
(4 Ratings)

Delinea Identity Threat Protection is a software designed to defend organizations against identity-based cyber threats by monitoring, analyzing, and responding to anomalies in user behavior and access patterns. The software delivers capabilities such as detection of suspicious activities, identification of compromised credentials, and prevention of lateral movement within IT environments. It integrates with existing identity and access management solutions to provide continuous oversight of privileged accounts and enforces policies to reduce risk. The software aims to address the business problem of unauthorized access, privilege escalation, and potential data breaches through automated response mechanisms and analytics-driven threat identification, thereby supporting organizational efforts to secure sensitive information and maintain compliance with regulatory requirements.

Show More Details
Logo of Netwrix Threat Manager

Netwrix Threat Manager

By Netwrix

3.4
(3 Ratings)

Netwrix Threat Manager protects your identity infrastructure by blocking threats, detecting, and responding to identity-based attacks across Active Directory and Entra ID with high accuracy and speed. It uses behavioral analytics and machine learning to surface true threats and reduce alert noise. With automated response actions and seamless integration into SIEMs platforms, ITSM tools like ServiceNow and collaboration platforms like Slack, it enables fast, coordinated incident response. Built-in investigation tools provide full visibility into suspicious activity so your team can take control before attackers do.

Show More Details
Logo of Silverfort Identity Threat Detection & Response (ITDR)

Silverfort Identity Threat Detection & Response (ITDR)

By Silverfort

4.7
(3 Ratings)

Silverfort Identity Threat Detection & Response is a software designed to monitor, detect, and respond to identity-based threats across hybrid and multi-cloud environments. The software integrates with existing identity and access management solutions to analyze authentication activity and identify unauthorized access attempts or abnormal behavior. It delivers real-time risk assessments and alerts, as well as automated response actions to help prevent credential compromise and lateral movement within networks. Silverfort Identity Threat Detection & Response enables organizations to strengthen identity security by providing visibility into identity attack surfaces and allowing proactive measures against identity threats without requiring modifications to endpoints or changes to user workflows.

Show More Details
Logo of Gurucul Identity Threat Detection and Response (ITDR) Solution

Gurucul Identity Threat Detection and Response (ITDR) Solution

By Gurucul

4
(2 Ratings)

Gurucul Identity Threat Detection and Response (ITDR) Solution is a software designed to monitor, analyze, and manage identity-based threats within organizations. The software leverages advanced analytics and machine learning to identify suspicious activities related to user and entity behaviors, access management, and credential misuse. It provides features for real-time threat detection, automated response, and in-depth investigation of identity-related incidents to help organizations prevent data breaches and reduce risk associated with compromised identities. The software assists businesses in addressing challenges around unauthorized access, insider threats, and security gaps in identity and access management systems by providing actionable intelligence and orchestrating response workflows for identified threats.

Show More Details
Logo of Huntress Managed ITDR

Huntress Managed ITDR

By Huntress

4
(2 Ratings)

Huntress Managed ITDR is a software developed to provide identity threat detection and response capabilities for organizations. The software continuously monitors identity infrastructure to detect unauthorized access, suspicious authentication activity, and potential identity-based threats. It includes automated analysis of user and service account behaviors, lateral movement detection, and indicators of credential compromise. Huntress Managed ITDR aims to help organizations respond to identity threats by generating detailed alerts and actionable insights, enabling security teams to investigate incidents and mitigate risks associated with compromised credentials and misused permissions in their environments.

Show More Details
Logo of Semperis ITDR

Semperis ITDR

By Semperis

5
(1 Rating)

Semperis ITDR is a software designed to detect, respond to, and remediate identity-based threats within hybrid Active Directory environments. It offers capabilities for monitoring identity infrastructure, analyzing suspicious activities, and responding to potential compromises by automating threat detection workflows. The software helps organizations protect against unauthorized access and account takeover attempts. Through integration with existing security systems, it provides insights into vulnerabilities and supports incident response by offering tools for containment and recovery. The software addresses the business challenge of safeguarding identity-related assets against increasingly sophisticated cyber attacks targeting authentication platforms and user directories.

Show More Details
Logo of WithSecure Elements XDR

WithSecure Elements XDR

By WithSecure

5
(1 Rating)

WithSecure Elements XDR is a software designed to provide extended detection and response capabilities for organizations seeking to enhance their cybersecurity posture. The software integrates threat detection, incident response, and automated remediation across endpoints, cloud, and network environments. It consolidates security data from multiple sources to identify threats in real time, offering analysis tools for rapid investigation and response to incidents. Organizations use the software to reduce the likelihood of attacks and streamline processes for monitoring, containment, and recovery. The software addresses business challenges related to increasing complexity of threats and the necessity for centralized visibility and control over security operations.

Show More Details
Logo of Permiso

Permiso

By Permiso Security

Permiso is a software that provides cloud detection and response capabilities for organizations seeking to secure their cloud environments. The software monitors cloud infrastructure activity, aiming to identify and investigate potential threats by analyzing user and service account behaviors. Permiso offers features such as identity-based tracking and threat hunting, facilitating visibility into cloud activity and providing tools to detect signs of compromise. The software addresses business challenges related to unauthorized access, insider threats, and difficult-to-detect security incidents in complex cloud architectures by enabling security teams to investigate incidents efficiently and strengthen cloud security posture.

Be the first to .
Logo of Seceon aiSIEM

Seceon aiSIEM

By Seceon

Seceon Open Threat Management OTM Platform aiSIEM is a cybersecurity software designed to deliver threat detection, monitoring, and response automation for organizations. The software utilizes artificial intelligence and machine learning to analyze security data from various sources, enabling the identification of malicious activities, policy violations, and vulnerabilities. It provides automated correlation and contextualization of security events to support threat prioritization and alert management. The software offers integrated security information and event management SIEM capabilities, including log collection, normalization, and real-time analytics, cloud monitoring, and UBEA and NDR capabilities, allowing organizations to address security incidents and meet compliance requirements. The platform aims to streamline security operations by reducing manual efforts and supporting efficient incident resolution.

Be the first to .

Top Trending Products

Falcon Next-Gen Identity SecurityMicrosoft Defender for IdentityCortex XDRCisco Identity IntelligenceWithSecure Elements XDRDelinea Identity Threat ProtectionProofpoint Identity Threat DefenseHuntress Managed ITDR

Popular Product Comparisons

Falcon Next-Gen Identity Security vs Microsoft Defender for IdentityFalcon Next-Gen Identity Security vs Semperis ITDRFalcon Next-Gen Identity Security vs Silverfort Identity Threat Detection & Response (ITDR)

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.