  # Best Identity Threat Detection and Response (ITDR)  Software

  *By [Brandon Summers-Miller](https://research.g2.com/insights/author/brandon-summers-miller)*

   Identity threat detection and response (ITDR) software detects identity-related threats and vulnerabilities, such as credential misuse and abuse, unapproved entitlements and privilege escalations, and other identity-related threats. Information security teams use this software as part of their threat detection initiatives, specifically geared toward the identity-related attack surface.

Identity threat detection and response (ITDR) software is different from [identity and access management (IAM) software](https://www.g2.com/categories/identity-and-access-management-iam); IAM’s function is to prevent identity-related risks through proper user authentication and access up front, while ITDR identifies threats once systems have been compromised. ITDR is also different from [insider threat management (ITM) software](https://www.g2.com/categories/insider-threat-management-itm) in that ITDR identifies credentials and privileges abuse, commonly from external parties that have identified and misused identity vulnerabilities, while ITM monitors the actions a threat actor takes such as downloading data they are not entitled to.

To qualify for inclusion in the Identity Threat Detection and Response (ITDR) category, a product must:

- Monitor and detect potentially malicious identity and privileges activity
- Identify identity-related misconfigurations
- Investigate identity threats with contextual user information
- Flag unauthorized accounts and excessive privileges




  ## How Many Identity Threat Detection and Response (ITDR)  Software Products Does G2 Track?
**Total Products under this Category:** 62

  
## How Does G2 Rank Identity Threat Detection and Response (ITDR)  Software Products?

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 3,100+ Authentic Reviews
- 62+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.

  
## Which Identity Threat Detection and Response (ITDR)  Software Is Best for Your Use Case?

- **Leader:** [CrowdStrike Falcon Endpoint Protection Platform](https://www.g2.com/products/crowdstrike-falcon-endpoint-protection-platform/reviews)
- **Highest Performer:** [Guardz](https://www.g2.com/products/guardz/reviews)
- **Easiest to Use:** [Huntress Managed ITDR](https://www.g2.com/products/huntress-managed-itdr/reviews)
- **Top Trending:** [Huntress Managed ITDR](https://www.g2.com/products/huntress-managed-itdr/reviews)
- **Best Free Software:** [Huntress Managed ITDR](https://www.g2.com/products/huntress-managed-itdr/reviews)

  
---

**Sponsored**

### Guardz

Guardz is a unified cybersecurity platform specifically designed for Managed Service Providers (MSPs). This innovative solution consolidates essential security controls, identity threat detection and response (ITDR), endpoint protection (EDR), email security, user awareness training and phishing simulations, and Managed Detection and Response (MDR) into a single AI-native framework. The platform aims to enhance operational efficiency by streamlining security processes and providing a comprehensive approach to cybersecurity. Targeting MSPs, Guardz addresses the unique challenges these providers face in managing multiple security tools that often operate in silos. By adopting an identity-centric approach, Guardz connects various security vectors, effectively reducing the gaps that can leave organizations vulnerable. This layered and holistic view enables MSPs to respond to user risks in real time, ensuring that security measures are not only reactive but also proactive in safeguarding client environments. Key features of Guardz include its 24/7 AI and human-led Managed Detection and Response (MDR) services. The platform employs agentic AI to triage threats at machine speed, allowing for rapid identification and prioritization of potential security incidents. This automated triage process is complemented by expert analysts who validate findings, mitigate risks, and guide response actions. As a result, MSPs can offer scalable protection to their clients without the need to expand their workforce, making it a cost-effective solution for growing cybersecurity demands. Guardz stands out in the cybersecurity landscape by providing a unified platform that integrates various security functions into one cohesive system. This integration not only simplifies the management of security tools but also enhances the overall effectiveness of security measures. By leveraging AI-driven insights and human expertise, Guardz empowers MSPs to deliver robust cybersecurity solutions that adapt to the evolving threat landscape, ensuring their clients remain protected against emerging risks.



[Visit website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=1003176&amp;secure%5Bdisplayable_resource_id%5D=1003176&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=page_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=1003176&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=1231537&amp;secure%5Bresource_id%5D=1003176&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fidentity-threat-detection-and-response-itdr&amp;secure%5Btoken%5D=af361c25ad8663edc080ebe522af9d8eb689f758f0c28a38feb2acca8e88b349&amp;secure%5Burl%5D=https%3A%2F%2Fguardz.com%2F%3Futm_source%3Dg2%26utm_medium%3Dcpc%26utm_campaign%3Dvisitwebsite&amp;secure%5Burl_type%5D=custom_url)

---

  ## What Are the Top-Rated Identity Threat Detection and Response (ITDR)  Software Products in 2026?
### 1. [CrowdStrike Falcon Endpoint Protection Platform](https://www.g2.com/products/crowdstrike-falcon-endpoint-protection-platform/reviews)
  Organizations today face a serious challenge: managing numerous security vendors and tools while confronting an ever-evolving threat landscape. Sophisticated adversaries are becoming smarter, faster, and more evasive, launching complex attacks that can strike in minutes or even seconds. Traditional security approaches struggle to keep pace, leaving businesses vulnerable. The CrowdStrike Falcon Platform addresses this by offering a unified, cloud-native solution. It consolidates previously siloed security solutions and incorporates third-party data into a single platform with one efficient and resource-conscious agent, leveraging advanced AI and real-time threat intelligence. This approach simplifies security operations, speeds analyst decision making, and enhances protection to stop the breach, allowing organizations to reduce risk with less complexity and lower costs. CrowdStrike&#39;s Falcon Platform includes: - Endpoint Security: Secure the endpoint, stop the breach - Identify Protection: Identity is the front line, defend it - Next-Gen SIEM: The future of SIEM, today - Data Protection: Real-time data protection from endpoint to cloud - Exposure Management: Understand risk to stop breaches - Charlotte AI: Powering the next evolution of the SOC


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 374
**How Do G2 Users Rate CrowdStrike Falcon Endpoint Protection Platform?**

- **Quality of Support:** 8.9/10 (Category avg: 9.1/10)
- **Ease of Use:** 9.0/10 (Category avg: 9.1/10)

**Who Is the Company Behind CrowdStrike Falcon Endpoint Protection Platform?**

- **Seller:** [CrowdStrike](https://www.g2.com/sellers/crowdstrike)
- **Company Website:** https://www.crowdstrike.com
- **Year Founded:** 2011
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @CrowdStrike (110,386 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2497653/ (11,258 employees on LinkedIn®)

**Who Uses This Product?**
  - **Who Uses This:** Security Analyst, Cyber Security Analyst
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 46% Enterprise, 42% Mid-Market


#### What Are CrowdStrike Falcon Endpoint Protection Platform's Pros and Cons?

**Pros:**

- Features (113 reviews)
- Threat Detection (102 reviews)
- Ease of Use (98 reviews)
- Security (96 reviews)
- Detection (85 reviews)

**Cons:**

- Expensive (53 reviews)
- Complexity (39 reviews)
- Learning Curve (35 reviews)
- Limited Features (31 reviews)
- Pricing Issues (28 reviews)

### 2. [Huntress Managed ITDR](https://www.g2.com/products/huntress-managed-itdr/reviews)
  Hackers aren’t wasting time breaking into your networks the hard way—they’re using infostealers to grab credentials, session cookies, and access tokens in seconds. Huntress Managed ITDR is designed for this always-evolving threat landscape. With a 3-minute mean time to respond (MTTR) and a low false positive rate, Huntress stops real threats before they wreck your business. Built to support organizations of ALL sizes, Huntress Managed ITDR closes blind spots across your workflows and shuts down avenues attackers rely on. Our enterprise-grade solution gives you continuous monitoring for identity-based threats, rapid detection of unauthorized access, location-based and VPN/tunnel/proxy anomalies, and fast response to suspicious activities like rogue applications, shadow workflows, and business email compromise (BEC) scams. By focusing on protecting user credentials and session tokens, Huntress keeps your organization&#39;s digital identities safe, even as attackers develop sneakier tactics.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 94
**How Do G2 Users Rate Huntress Managed ITDR?**

- **Quality of Support:** 9.7/10 (Category avg: 9.1/10)
- **Ease of Use:** 9.5/10 (Category avg: 9.1/10)

**Who Is the Company Behind Huntress Managed ITDR?**

- **Seller:** [Huntress Labs](https://www.g2.com/sellers/huntress-labs)
- **Company Website:** https://huntress.com
- **Year Founded:** 2015
- **HQ Location:** Ellicott City, US
- **Twitter:** @HuntressLabs (40,164 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/10172550/ (916 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 76% Small-Business, 19% Mid-Market


#### What Are Huntress Managed ITDR's Pros and Cons?

**Pros:**

- Continuous Monitoring (23 reviews)
- Threat Detection (22 reviews)
- Alert Management (12 reviews)
- Easy Integrations (12 reviews)
- Customer Support (11 reviews)

**Cons:**

- Inadequate Detection (5 reviews)
- Inefficient Alert System (5 reviews)
- Limited Control (4 reviews)
- Portal Issues (4 reviews)
- UX Improvement (4 reviews)

### 3. [IBM MaaS360](https://www.g2.com/products/ibm-maas360/reviews)
  IBM MaaS360 is an easy to use, unified endpoint management (UEM) solution that transforms the way that organizations support users, apps, content, and data across essentially every type of device. Its open, cloud-based platform integrates with preferred security and productivity tools. You can protect your workforce with evolved Threat Management, Mobile Security, Device management features and your analytics will be powered by watsonx AI capabilities, helping you to set up a good security posture. IBM MaaS360 is available for purchase on ibm.com and AWS Marketplace.


  **Average Rating:** 4.2/5.0
  **Total Reviews:** 183
**How Do G2 Users Rate IBM MaaS360?**

- **Quality of Support:** 8.1/10 (Category avg: 9.1/10)
- **Ease of Use:** 8.2/10 (Category avg: 9.1/10)

**Who Is the Company Behind IBM MaaS360?**

- **Seller:** [IBM](https://www.g2.com/sellers/ibm)
- **Company Website:** https://www.ibm.com/us-en
- **Year Founded:** 1911
- **HQ Location:** Armonk, NY
- **Twitter:** @IBM (709,298 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1009/ (324,553 employees on LinkedIn®)

**Who Uses This Product?**
  - **Who Uses This:** IT Manager, Software Engineer
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 45% Mid-Market, 34% Enterprise


#### What Are IBM MaaS360's Pros and Cons?

**Pros:**

- Features (48 reviews)
- Security (46 reviews)
- Device Management (38 reviews)
- Ease of Use (37 reviews)
- Protection (24 reviews)

**Cons:**

- Learning Curve (24 reviews)
- Poor Interface Design (17 reviews)
- Poor UI (17 reviews)
- Slow Performance (17 reviews)
- Outdated Interface (13 reviews)

### 4. [Microsoft Defender for Identity](https://www.g2.com/products/microsoft-defender-for-identity/reviews)
  Microsoft Defender for Identity enables you to integrate Microsoft Defender for Identity with Defender for Endpoint, for an even more complete threat protection solution. While Defender for Identity monitors the traffic on your domain controllers, Defender for Endpoint monitors your endpoints, together providing a single interface from which you can protect your environment.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 91
**How Do G2 Users Rate Microsoft Defender for Identity?**

- **Quality of Support:** 7.9/10 (Category avg: 9.1/10)
- **Ease of Use:** 8.1/10 (Category avg: 9.1/10)

**Who Is the Company Behind Microsoft Defender for Identity?**

- **Seller:** [Microsoft](https://www.g2.com/sellers/microsoft)
- **Year Founded:** 1975
- **HQ Location:** Redmond, Washington
- **Twitter:** @microsoft (13,105,638 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/microsoft/ (227,697 employees on LinkedIn®)
- **Ownership:** MSFT

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 38% Enterprise, 32% Small-Business


### 5. [Okta](https://www.g2.com/products/okta/reviews)
  Okta, Inc. is The World’s Identity Company™. We secure AI, machine, and human identity so everyone is free to safely use any technology. Our customer and workforce solutions empower businesses and developers to protect their AI agents, users, employees, and partners while driving security, efficiencies, and innovation. Learn why the world’s leading brands trust Okta for authentication, authorization, and more at okta.com.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 1,196
**How Do G2 Users Rate Okta?**

- **Quality of Support:** 8.9/10 (Category avg: 9.1/10)
- **Ease of Use:** 9.3/10 (Category avg: 9.1/10)

**Who Is the Company Behind Okta?**

- **Seller:** [Okta](https://www.g2.com/sellers/okta)
- **Company Website:** https://okta.com
- **Year Founded:** 2009
- **HQ Location:** San Francisco, California
- **Twitter:** @okta (42,783 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/926041/ (7,230 employees on LinkedIn®)

**Who Uses This Product?**
  - **Who Uses This:** Software Engineer, Account Executive
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 51% Mid-Market, 39% Enterprise


#### What Are Okta's Pros and Cons?

**Pros:**

- Ease of Use (205 reviews)
- Security (156 reviews)
- Authentication Security (151 reviews)
- Single Sign-On (141 reviews)
- Easy Access (138 reviews)

**Cons:**

- Authentication Issues (77 reviews)
- Login Issues (64 reviews)
- Expensive (46 reviews)
- Complex Setup (44 reviews)
- Frequent Authentication (39 reviews)

### 6. [Falcon Identity protection](https://www.g2.com/products/falcon-identity-protection/reviews)
  CrowdStrike Falcon Next-Gen Identity Security enables frictionless identity security with real-time threat prevention and IT policy enforcement using identity, behavioral, and risk analytics. Since 80% of breaches involve compromised credentials, segmenting identities, automating enforcement, and using risk based conditional access to verify authentication traffic can reduce risk and reduce IT complexity. With over 4000 customers and hundreds of millions of identities 1,000+ enterprises have already secured 4M+ workforce identities in hybrid deployments using CrowdStrike’s frictionless risk-based authentication.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 13
**How Do G2 Users Rate Falcon Identity protection?**

- **Quality of Support:** 8.2/10 (Category avg: 9.1/10)
- **Ease of Use:** 8.3/10 (Category avg: 9.1/10)

**Who Is the Company Behind Falcon Identity protection?**

- **Seller:** [CrowdStrike](https://www.g2.com/sellers/crowdstrike)
- **Year Founded:** 2011
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @CrowdStrike (110,386 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2497653/ (11,258 employees on LinkedIn®)
- **Ownership:** NASDAQ: CRWD

**Who Uses This Product?**
  - **Company Size:** 54% Mid-Market, 38% Enterprise


### 7. [Guardz](https://www.g2.com/products/guardz/reviews)
  Guardz is a unified cybersecurity platform specifically designed for Managed Service Providers (MSPs). This innovative solution consolidates essential security controls, identity threat detection and response (ITDR), endpoint protection (EDR), email security, user awareness training and phishing simulations, and Managed Detection and Response (MDR) into a single AI-native framework. The platform aims to enhance operational efficiency by streamlining security processes and providing a comprehensive approach to cybersecurity. Targeting MSPs, Guardz addresses the unique challenges these providers face in managing multiple security tools that often operate in silos. By adopting an identity-centric approach, Guardz connects various security vectors, effectively reducing the gaps that can leave organizations vulnerable. This layered and holistic view enables MSPs to respond to user risks in real time, ensuring that security measures are not only reactive but also proactive in safeguarding client environments. Key features of Guardz include its 24/7 AI and human-led Managed Detection and Response (MDR) services. The platform employs agentic AI to triage threats at machine speed, allowing for rapid identification and prioritization of potential security incidents. This automated triage process is complemented by expert analysts who validate findings, mitigate risks, and guide response actions. As a result, MSPs can offer scalable protection to their clients without the need to expand their workforce, making it a cost-effective solution for growing cybersecurity demands. Guardz stands out in the cybersecurity landscape by providing a unified platform that integrates various security functions into one cohesive system. This integration not only simplifies the management of security tools but also enhances the overall effectiveness of security measures. By leveraging AI-driven insights and human expertise, Guardz empowers MSPs to deliver robust cybersecurity solutions that adapt to the evolving threat landscape, ensuring their clients remain protected against emerging risks.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 107
**How Do G2 Users Rate Guardz?**

- **Quality of Support:** 9.2/10 (Category avg: 9.1/10)
- **Ease of Use:** 9.4/10 (Category avg: 9.1/10)

**Who Is the Company Behind Guardz?**

- **Seller:** [Guardz](https://www.g2.com/sellers/guardz)
- **Company Website:** https://guardz.com/
- **Year Founded:** 2022
- **HQ Location:** Tel Aviv, IL
- **Twitter:** @GuardzCyber (110 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/guardz/ (153 employees on LinkedIn®)

**Who Uses This Product?**
  - **Who Uses This:** Owner, Manager
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 73% Small-Business, 21% Mid-Market


#### What Are Guardz's Pros and Cons?

**Pros:**

- Ease of Use (58 reviews)
- Security (49 reviews)
- Features (37 reviews)
- Easy Setup (28 reviews)
- Threat Detection (28 reviews)

**Cons:**

- Limited Features (13 reviews)
- Integration Issues (8 reviews)
- Lack of Features (8 reviews)
- Limited Customization (8 reviews)
- Insufficient Information (7 reviews)

### 8. [CrowdStrike Falcon Shield](https://www.g2.com/products/crowdstrike-falcon-shield/reviews)
  CrowdStrike Falcon Shield enables security teams to secure their entire SaaS stack with its prevention, detection, and response platform. Falcon Shield integrates with over 150 applications out of the box, continuously monitoring for misconfigurations, detecting threats, and triggering response sequences to secure applications. Secure users, prevent GenAI mishaps, detect shadow apps, and monitor devices from one SaaS Security Posture Management Platform. Falcon Shield is part of the CrowdStrike Falcon platform allowing for a complete end-to-end Cloud and Identity protection , while using Falcon WorkFlow for easy one-click remediation.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 32
**How Do G2 Users Rate CrowdStrike Falcon Shield?**

- **Quality of Support:** 9.8/10 (Category avg: 9.1/10)
- **Ease of Use:** 9.4/10 (Category avg: 9.1/10)

**Who Is the Company Behind CrowdStrike Falcon Shield?**

- **Seller:** [CrowdStrike](https://www.g2.com/sellers/crowdstrike)
- **Year Founded:** 2011
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @CrowdStrike (110,386 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2497653/ (11,258 employees on LinkedIn®)
- **Ownership:** NASDAQ: CRWD

**Who Uses This Product?**
  - **Top Industries:** Financial Services, Information Technology and Services
  - **Company Size:** 53% Enterprise, 47% Mid-Market


#### What Are CrowdStrike Falcon Shield's Pros and Cons?

**Pros:**

- Compliance Monitoring (1 reviews)
- Comprehensive Security (1 reviews)
- Ease of Implementation (1 reviews)
- Integrations (1 reviews)


### 9. [SentinelOne Singularity Endpoint](https://www.g2.com/products/sentinelone-singularity-endpoint/reviews)
  SentinelOne (NYSE:S) is pioneering autonomous cybersecurity to prevent, detect, and respond to cyber attacks faster and with higher accuracy than ever before. The Singularity Platform protects and empowers leading global enterprises with real-time visibility, cross-platform correlation, and AI-powered response across endpoints, cloud workloads and containers, network-connected (IoT) devices and identity-centric attack surfaces. To learn more, visit www.sentinelone.com or follow us at @SentinelOne, on LinkedIn or Facebook. Over 9,250 customers, including 4 of the Fortune 10, hundreds of the Global 2000, prominent governments, healthcare providers, and educational institutions, trust SentinelOne to bring their defenses into the future, gaining more capability with less complexity. SentinelOne is a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms, and is a go-to platform across all customer profiles, as highlighted in Gartner’s Critical Capabilities report. SentinelOne continues to prove its industry-leading capabilities in the MITRE Engenuity ATT&amp;CK® Evaluation, with 100% protection detection, 88% less noise, and zero delays in the 2024 MITRE ATT&amp;CK Engenuity evaluations, demonstrating our dedication to keeping our customers ahead of threats from every vector.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 195
**How Do G2 Users Rate SentinelOne Singularity Endpoint?**

- **Quality of Support:** 8.9/10 (Category avg: 9.1/10)
- **Ease of Use:** 8.9/10 (Category avg: 9.1/10)

**Who Is the Company Behind SentinelOne Singularity Endpoint?**

- **Seller:** [SentinelOne](https://www.g2.com/sellers/sentinelone)
- **Company Website:** https://www.sentinelone.com
- **Year Founded:** 2013
- **HQ Location:** Mountain View, CA
- **Twitter:** @SentinelOne (57,750 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2886771/ (3,197 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 45% Mid-Market, 36% Enterprise


#### What Are SentinelOne Singularity Endpoint's Pros and Cons?

**Pros:**

- Ease of Use (16 reviews)
- Features (11 reviews)
- Threat Detection (11 reviews)
- Customer Support (10 reviews)
- Security (7 reviews)

**Cons:**

- Learning Curve (4 reviews)
- Not User-Friendly (4 reviews)
- Slow Performance (4 reviews)
- Complexity (3 reviews)
- Difficult Configuration (3 reviews)

### 10. [Microsoft Entra Identity Protection](https://www.g2.com/products/microsoft-entra-identity-protection/reviews)
  Identity Protection is a tool that allows organizations to accomplish three key tasks: Automate the detection and remediation of identity-based risks. Investigate risks using data in the portal. Export risk detection data to your SIEM.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 41
**How Do G2 Users Rate Microsoft Entra Identity Protection?**

- **Quality of Support:** 9.0/10 (Category avg: 9.1/10)
- **Ease of Use:** 9.0/10 (Category avg: 9.1/10)

**Who Is the Company Behind Microsoft Entra Identity Protection?**

- **Seller:** [Microsoft](https://www.g2.com/sellers/microsoft)
- **Year Founded:** 1975
- **HQ Location:** Redmond, Washington
- **Twitter:** @microsoft (13,105,638 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/microsoft/ (227,697 employees on LinkedIn®)
- **Ownership:** MSFT

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 51% Enterprise, 27% Mid-Market


### 11. [Semperis Directory Services Protector](https://www.g2.com/products/semperis-directory-services-protector/reviews)
  Semperis Directory Services Protector puts Active Directory security and identity threat detection and response on autopilot with continuous AD threat monitoring, real-time alerts, and autonomous remediation capabilities. DSP helps you respond more effectively to Active Directory security incidents and everyday operational mistakes. It provides a complete picture of risk exposure in hybrid environments and provides backup and recovery of critical Entra ID resources


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 25
**How Do G2 Users Rate Semperis Directory Services Protector?**

- **Quality of Support:** 9.6/10 (Category avg: 9.1/10)
- **Ease of Use:** 9.1/10 (Category avg: 9.1/10)

**Who Is the Company Behind Semperis Directory Services Protector?**

- **Seller:** [Semperis](https://www.g2.com/sellers/semperis)
- **Company Website:** https://www.semperis.com
- **Year Founded:** 2015
- **HQ Location:** Hoboken, New Jersey
- **Twitter:** @SemperisTech (10,095 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/semperis/ (658 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 80% Enterprise, 20% Mid-Market


#### What Are Semperis Directory Services Protector's Pros and Cons?

**Pros:**

- Ease of Use (8 reviews)
- Security (7 reviews)
- Features (6 reviews)
- Customer Support (5 reviews)
- Automation (4 reviews)

**Cons:**

- Communication Issues (2 reviews)
- Data Inconsistency (2 reviews)
- Lack of Information (2 reviews)
- Limited Reporting (2 reviews)
- Poor Customer Support (2 reviews)

### 12. [CyberArk Workforce Identity](https://www.g2.com/products/cyberark-workforce-identity/reviews)
  CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and Identity Management solutions in a single offering. Workforce Access capabilities include single sign-on, multi-factor authentication, session security, and credential management. Identity Management capabilities include lifecycle management, identity orchestration, and identity governance. With CyberArk Identity, organizations can secure workforce access to applications, endpoints, and infrastructure and protect themselves from the leading cause of data breaches – compromised credentials. CyberArk Identity is part of the CyberArk Identity Security Platform. Built for the dynamic enterprise, CyberArk Identity Security Platform secures access for any identity to any resource or environment from anywhere using any device. The CyberArk Identity Security Platform enables operational efficiencies with a single admin portal, streamlines meeting compliance requirements with unified audit capabilities, and delivers Identity Security Intelligence for continuous identity threat detection and protection. Workforce Access solutions: • CyberArk Single Sign-On (SSO) is an easy-to-manage solution for one-click access to your cloud, mobile, and legacy apps. CyberArk SSO enables a secure and frictionless sign-in experience for both internal and external users that adjusts based on risk. • CyberArk App Gateway is an add-on to our Single Sign-On solution that enables VPN-less access to legacy applications. It allows companies to set up per-application, per-user access to individual legacy applications hosted on-premises. • CyberArk Adaptive Multi-Factor Authentication (MFA) helps strengthen security and prevent attacks involving compromised credentials by requiring users to present multiple forms of evidence to gain access to your applications. Unlike traditional MFA solutions, CyberArk Adaptive MFA uses AI-powered behavioral analytics and contextual information to determine which authentication factors to apply to a particular user in a specific situation. • CyberArk Secure Web Sessions is a cloud-based service that enables organizations to monitor, record, and audit end-user activity within high-risk and high-value web applications. Security and compliance specialists can use Secure Web Sessions to search recorded sessions using free text input and quickly filter events by users, dates, and actions. • CyberArk Workforce Password Management is an enterprise-focused password manager providing a user-friendly solution to store business application credentials in a centralized vault and securely share them with other users in the organization. Identity Management Services: • CyberArk Identity Lifecycle Management provides an easy way to route application access requests, create application accounts, manage entitlements for those accounts, and revoke access when necessary. • CyberArk Identity Flows is an identity orchestration solution that improves security, efficiency, and productivity by automating identity data and events. With Identity Flows, organizations can orchestrate complex identity management processes and synchronize identity data across diverse applications, directory stores, and repositories. • CyberArk Identity Compliance solution continuously discovers access, streamlines access certifications, and provides comprehensive identity analytics. Identity Compliance automates manually intensive, error-prone administrative processes, ensuring all workforce and privileged access rights are properly assigned and continually certified across enterprises.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 126
**How Do G2 Users Rate CyberArk Workforce Identity?**

- **Quality of Support:** 9.0/10 (Category avg: 9.1/10)
- **Ease of Use:** 8.8/10 (Category avg: 9.1/10)

**Who Is the Company Behind CyberArk Workforce Identity?**

- **Seller:** [CyberArk](https://www.g2.com/sellers/cyberark)
- **Year Founded:** 1999
- **HQ Location:** Newton, MA
- **Twitter:** @CyberArk (17,751 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/26630/ (2,893 employees on LinkedIn®)
- **Ownership:** NASDAQ:CYBR

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 48% Enterprise, 48% Mid-Market


#### What Are CyberArk Workforce Identity's Pros and Cons?

**Pros:**

- Ease of Use (14 reviews)
- Access Management (6 reviews)
- Intuitive (6 reviews)
- Customer Support (5 reviews)
- Access Control (4 reviews)

**Cons:**

- Missing Features (4 reviews)
- Integration Issues (2 reviews)
- Lack of Automation (2 reviews)
- Lack of Features (2 reviews)
- Browser Extension Issues (1 reviews)

### 13. [Heimdal](https://www.g2.com/products/heimdal/reviews)
  Accommodate all your cybersecurity needs under one convenient roof with the Heimdal® Unified Cybersecurity Platform. Our cybersecurity solutions can be used as standalone products or integrated into one another as part of a cohesive and unified XDR platform. Whether you’re a reseller, distributor, MSSP, or an organization committed to bolstering your online security, we provide an array of cutting-edge products to make your mission smoother. Heimdal® is a fast-growing cybersecurity company focused on continuous technological innovation. Since its establishment in 2014 in Copenhagen, based on the winning idea of CTF World Champions, Heimdal has experienced spectacular growth by proactively building products that anticipate threatscape trends. The company offers a multi-layeredand unified security suite that combines threat prevention, patch and asset management, endpoint rights management, antivirus and mail security which together secure customers against cyberattacks and keep critical information and intellectual property safe. Heimdal has been recognized as a thought leader in the industry and has won multiple international awards both for its solutions and for its educational content creation. The Heimdal line of products currently consists of 10 products and 2 services. The former category encompasses DNS Security for Endpoints &amp; Network, Patch &amp; Asset Management, Privileged Access Management, Application Control, Next-Gen Endpoint Antivirus, Ransomware Encryption Protection, Email Security, Email Fraud Prevention, and Remote Desktop. The latter is represented by Endpoint Detection &amp; Response, as well as eXtended Detection &amp; Response, or EDR and XDR for short. Currently, Heimdal’s cybersecurity solutions are deployed in more than 45 countries and supported regionally from offices in 15+ countries, by 175+ highly qualified specialists. Heimdal is ISAE 3000 certified and secures more than 2 million endpoints for over 10,000 companies. The company supports its partners without concessions on the basis of predictability and scalability. The common goal is to create a sustainable ecosystem and a strategic partnership.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 61
**How Do G2 Users Rate Heimdal?**

- **Quality of Support:** 9.5/10 (Category avg: 9.1/10)
- **Ease of Use:** 8.6/10 (Category avg: 9.1/10)

**Who Is the Company Behind Heimdal?**

- **Seller:** [Heimdal®](https://www.g2.com/sellers/heimdal)
- **Company Website:** https://heimdalsecurity.com/
- **Year Founded:** 2014
- **HQ Location:** Copenhagen, Denmark
- **Twitter:** @HeimdalSecurity (5,109 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/heimdal-security/ (264 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Computer &amp; Network Security, Construction
  - **Company Size:** 61% Mid-Market, 26% Small-Business


#### What Are Heimdal's Pros and Cons?

**Pros:**

- Product Quality (2 reviews)
- Reliability (2 reviews)
- Security (2 reviews)
- 24/7 Availability (1 reviews)
- Customer Support (1 reviews)

**Cons:**

- Complex Interface (2 reviews)
- Not User-Friendly (2 reviews)
- Poor Interface Design (2 reviews)
- User Difficulty (2 reviews)
- User Interface (2 reviews)

### 14. [SaaS Alerts](https://www.g2.com/products/saas-alerts/reviews)
  ​​SaaS Alerts is a automated cybersecurity platform to detect and automate the remediation of SaaS security threats. The platform provides unified, continuous monitoring of core business SaaS applications to protect against data theft and malicious actors, including Microsoft 365, Google Workspace, Salesforce, Slack, Dropbox, Okta, Duo and more. SaaS Alerts uses machine learning pattern detection to identify breaches, create instant alerts, and lock affected accounts, providing you with valuable time to respond before further damage can occur. It also enables you to terminate dangerous end-user file sharing activities and automate essential security tasks, enhancing efficiency and overall security.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 14
**How Do G2 Users Rate SaaS Alerts?**

- **Quality of Support:** 9.6/10 (Category avg: 9.1/10)
- **Ease of Use:** 8.5/10 (Category avg: 9.1/10)

**Who Is the Company Behind SaaS Alerts?**

- **Seller:** [Kaseya](https://www.g2.com/sellers/kaseya)
- **Company Website:** https://www.kaseya.com/
- **Year Founded:** 2000
- **HQ Location:** Miami, FL
- **Twitter:** @KaseyaCorp (17,428 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/kaseya/ (5,512 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 79% Small-Business, 21% Mid-Market


#### What Are SaaS Alerts's Pros and Cons?

**Pros:**

- Alerts (4 reviews)
- Ease of Use (3 reviews)
- Alert Notifications (2 reviews)
- Features (2 reviews)
- Reporting (2 reviews)

**Cons:**

- Ineffective Alerts (2 reviews)
- Inefficient Alert System (2 reviews)
- False Positives (1 reviews)
- Inadequate Filtering Capabilities (1 reviews)
- Inefficient Filtering (1 reviews)

### 15. [WithSecure Elements Extended Detection and Response (XDR)](https://www.g2.com/products/withsecure-elements-extended-detection-and-response-xdr/reviews)
  WithSecure Elements Extended Detection and Response (XDR) is a unified solution, designed to protect modern IT estates. It minimizes the impact of attacks by using automated and advanced preventative controls that keep incident volumes and lower-level attacks at bay. AI-powered tooling enables fast detection, investigation, and response to threats. Luminen GenAI assistant is automatically included with Elements XDR, further empowering your analyst. Secure your digital environment: - Endpoints (laptops and workstations, mobiles, servers) - Digital identities and their user credentials (Microsoft Entra ID) - Cloud resources (Microsoft Azure) - Emails and cloud-based collaboration services (Microsoft 365 including Exchange, SharePoint sites, OneDrive, and Microsoft Teams)


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 117
**How Do G2 Users Rate WithSecure Elements Extended Detection and Response (XDR)?**

- **Quality of Support:** 8.8/10 (Category avg: 9.1/10)
- **Ease of Use:** 9.1/10 (Category avg: 9.1/10)

**Who Is the Company Behind WithSecure Elements Extended Detection and Response (XDR)?**

- **Seller:** [WithSecure](https://www.g2.com/sellers/withsecure)
- **Year Founded:** 1988
- **HQ Location:** Helsinki, Finland
- **Twitter:** @WithSecure (66,598 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/6219/ (1,746 employees on LinkedIn®)
- **Ownership:** FSOYF

**Who Uses This Product?**
  - **Company Size:** 45% Mid-Market, 40% Small-Business


#### What Are WithSecure Elements Extended Detection and Response (XDR)'s Pros and Cons?

**Pros:**

- Ease of Use (2 reviews)
- Efficiency (2 reviews)
- Alerting (1 reviews)
- Cloud Management (1 reviews)
- Easy Management (1 reviews)

**Cons:**

- Not User-Friendly (2 reviews)
- Alert Issues (1 reviews)
- Console Issues (1 reviews)
- Delay Issues (1 reviews)
- False Positives (1 reviews)

### 16. [SailPoint](https://www.g2.com/products/sailpoint/reviews)
  SailPoint is the leader in identity security for the modern enterprise. Harnessing the power of AI and machine learning, SailPoint automates the management and control of access, delivering only the required access to the right identities and technology resources at the right time. Our sophisticated identity platform seamlessly integrates with existing systems and workflows, providing the singular view into all identities and their access. We meet customers where they are with an intelligent identity solution that matches the scale, velocity and environmental needs of the modern enterprise. SailPoint empowers the most complex enterprises worldwide to build a security foundation grounded in identity security.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 170
**How Do G2 Users Rate SailPoint?**

- **Quality of Support:** 7.9/10 (Category avg: 9.1/10)
- **Ease of Use:** 8.4/10 (Category avg: 9.1/10)

**Who Is the Company Behind SailPoint?**

- **Seller:** [SailPoint](https://www.g2.com/sellers/sailpoint)
- **Company Website:** https://www.sailpoint.com
- **Year Founded:** 2004
- **HQ Location:** Austin, TX
- **Twitter:** @SailPoint (15,035 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/47456/ (3,441 employees on LinkedIn®)

**Who Uses This Product?**
  - **Who Uses This:** Software Engineer
  - **Top Industries:** Financial Services, Information Technology and Services
  - **Company Size:** 75% Enterprise, 18% Mid-Market


#### What Are SailPoint's Pros and Cons?

**Pros:**

- Ease of Use (36 reviews)
- Features (30 reviews)
- Security (24 reviews)
- Identity Management (21 reviews)
- Integrations (21 reviews)

**Cons:**

- Improvement Needed (17 reviews)
- Poor Customer Support (16 reviews)
- Missing Features (14 reviews)
- Expensive (12 reviews)
- Difficult Learning (11 reviews)

### 17. [Qomplx](https://www.g2.com/products/qomplx/reviews)
  QOMPLX is a leading provider of identity-focused cybersecurity software solutions. Our technology continually monitors user activity across all points of access, including cloud and on-premise systems, to prevent harm to your network, detect suspicious behavior and anomalies, and provide contextualized recommendations to improve your overall cybersecurity. The QOMPLX data platform provides real-time alerts and visualizations for rapid response and to allow for a proactive stance against malicious actors. It also enables the capture and store of identity data for future analysis, allowing organizations to detect and respond to emerging threats in a timely and effective manner. Additionally, our platform provides comprehensive reporting, audit trails, and a secure environment for identity management. With QOMPLX solutions, organizations can protect their digital environment from identity-related threats and ensure business continuity by utilizing: • Threat Detection and Response (ITDR) Prevent, detect and respond to identity threats in real-time • Managed Solutions Cost effective managed cybersecurity including Managed ITDR, Managed Extended Detection and Response (XDR), and Managed Detection and Response (MDR) • Attack Surface Monitoring (ASM) Discover cyber vulnerabilities and the size of your attack surface


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 11
**How Do G2 Users Rate Qomplx?**

- **Quality of Support:** 9.5/10 (Category avg: 9.1/10)
- **Ease of Use:** 8.5/10 (Category avg: 9.1/10)

**Who Is the Company Behind Qomplx?**

- **Seller:** [QOMPLX](https://www.g2.com/sellers/qomplx)
- **Year Founded:** 2015
- **HQ Location:** Tysons, Virginia
- **Twitter:** @QOMPLX (570 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/qomplx/about (24 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 55% Mid-Market, 27% Enterprise


### 18. [Sonrai Security](https://www.g2.com/products/sonrai-security/reviews)
  Sonrai Security is a leading cloud privileged access management solutions provider. With a mission to empower enterprises of all sizes to innovate securely and confidently, Sonrai Security delivers identity, access, and privilege security for companies running on AWS, Azure, and Google Cloud platforms. The company is renowned for pioneering the Cloud Permissions Firewall, enabling one-click least privilege while supporting developer access needs without disruption. Trusted by Cloud Operations, Development, and Security Teams at leading companies across various industries, Sonrai Security is committed to driving innovation and excellence in cloud security. Sonrai’s Cloud Permissions Firewall, the leading cloud PAM solution, gets cloud access under control, slashes the privileged attack surface, and automates least privilege all without impeding DevOps. The Cloud Permissions Firewall uses privileged permission intelligence and usage monitoring to determine who needs what permissions in your cloud. Then, with one-click, it eliminates all unused sensitive privileges across your entire multi-cloud estate. Just-in-time access and exceptions are granted to roles on the fly as new needs come up so development goes uninterrupted. SecOps teams spend 97% less time achieving least privilege and slash the attack surface by 92%.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 26
**How Do G2 Users Rate Sonrai Security?**

- **Quality of Support:** 9.1/10 (Category avg: 9.1/10)
- **Ease of Use:** 8.6/10 (Category avg: 9.1/10)

**Who Is the Company Behind Sonrai Security?**

- **Seller:** [Sonrai Security](https://www.g2.com/sellers/sonrai-security)
- **Year Founded:** 2017
- **HQ Location:** New York, US
- **LinkedIn® Page:** https://www.linkedin.com/company/sonrai-security (64 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 42% Mid-Market, 38% Enterprise


#### What Are Sonrai Security's Pros and Cons?

**Pros:**

- Cloud Security (12 reviews)
- Security (12 reviews)
- Cloud Management (10 reviews)
- Ease of Use (9 reviews)
- Cloud Technology (8 reviews)

**Cons:**

- Complexity (3 reviews)
- Expensive (3 reviews)
- Feature Limitations (3 reviews)
- Improvement Needed (3 reviews)
- Limited Customization (3 reviews)

### 19. [Reco](https://www.g2.com/products/reco-saas-security/reviews)
  Reco is the leader in Dynamic SaaS Security — the only approach that eliminates the SaaS Security Gap (the growing gap between what you can protect and what’s outpacing your security). This gap is driven by SaaS Sprawl — the proliferation of apps, AI, and identities; the challenge of keeping their configurations secure amidst constant updates, and the challenge of finding threats hidden within an ever-growing number of events. Dynamic SaaS Security keeps pace with this sprawl, no matter how fast it evolves, by covering the entire SaaS lifecycle — cradle to grave. It tracks all apps, SaaS-to-SaaS connections, Shadow SaaS, AI Agents, and Shadow AI tools, including their users and data, and adds support for new apps in days, not quarters. It maintains airtight posture and compliance — even as apps and AI Agents are added or updated. And it also ensures accounts remain secure, access privileges are minimized, and alerts are provided for critical threats. Some of the questions we help Security teams answer, include: - What SaaS, GenAI, Shadow applications are our employees using? - Are there applications employees have installed that have access to our company&#39;s data? - Are there any risky users in my company who may leak financial or personal company data? - Do employees have the appropriate level of permissions or are they over-permissioned? - Are our application configurations in compliance with industry standards? - What unsanctioned SaaS apps are being used? - Are any employees using GenAI tools incorrectly with company data? Reco uses advanced analytics around persona, actions, interactions and relationships to other users, and then alerts on exposure from misconfigurations, over-permission users, compromised accounts, and risky user behavior. This comprehensive picture is generated continuously using the Reco Knowledge Graph and empowers security teams to take swift action to effectively prioritize their most critical points of risk. The company’s leadership team brings expertise and innovation from leading technology, cybersecurity and counterintelligence organizations. Reco is backed by top-tier investors including Insight Partners, Zeev Ventures, BoldStart Ventures, and Angular Ventures and has established partnerships with leading technology companies including AWS, Wiz, Palo Alto Networks, Tines and Torq. You can learn more or book a demo at www.reco.ai.


  **Average Rating:** 4.9/5.0
  **Total Reviews:** 7
**How Do G2 Users Rate Reco?**

- **Quality of Support:** 10.0/10 (Category avg: 9.1/10)
- **Ease of Use:** 9.3/10 (Category avg: 9.1/10)

**Who Is the Company Behind Reco?**

- **Seller:** [Reco](https://www.g2.com/sellers/reco)
- **Year Founded:** 2020
- **HQ Location:** New York, New York
- **Twitter:** @recolabs_ai (240 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/recolabs/ (63 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 71% Mid-Market, 14% Enterprise


#### What Are Reco's Pros and Cons?

**Pros:**

- Ease of Use (3 reviews)
- Customer Support (2 reviews)
- Easy Integrations (1 reviews)
- Easy Setup (1 reviews)
- Intuitive (1 reviews)

**Cons:**

- Limitations (1 reviews)

### 20. [Vectra AI Platform](https://www.g2.com/products/vectra-ai-platform/reviews)
  The Vectra AI Platform helps security teams detect and stop real attacks that evade traditional security controls across network, identity, cloud, and SaaS environments. It provides real-time visibility into how attackers move through hybrid and multi-cloud environments, enabling teams to understand attack activity early and respond before incidents escalate. By correlating attacker behavior across the full attack lifecycle, the platform reduces alert noise and surfaces high-confidence threats that matter most. Analysts spend less time triaging isolated alerts and more time investigating complete attack stories with the context needed to take decisive action. Vectra AI unifies detection, investigation, and coordinated response across identity, endpoint, and network controls. Its approach is aligned with real-world defensive techniques, reflected in the highest number of vendor references in MITRE D3FEND and recognition as a Leader in the 2025 Gartner® Magic Quadrant™ for Network Detection and Response. Organizations worldwide rely on Vectra AI to detect attacks others miss and demonstrate measurable improvements in security operations.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 20
**How Do G2 Users Rate Vectra AI Platform?**

- **Quality of Support:** 8.2/10 (Category avg: 9.1/10)
- **Ease of Use:** 8.4/10 (Category avg: 9.1/10)

**Who Is the Company Behind Vectra AI Platform?**

- **Seller:** [Vectra AI](https://www.g2.com/sellers/vectra-ai)
- **Year Founded:** 2011
- **HQ Location:** San Jose, CA
- **Twitter:** @Vectra_AI (3,272 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1229716/ (662 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 75% Enterprise, 15% Mid-Market


#### What Are Vectra AI Platform's Pros and Cons?

**Pros:**

- Ease of Understanding (1 reviews)
- Ease of Use (1 reviews)


### 21. [Oort Identity Security Platform](https://www.g2.com/products/oort-identity-security-platform/reviews)
  Oort is an identity threat detection and response platform for enterprise security. Oort enables IAM, SOC, and GRC professionals to find users quickly and easily, to conduct deep and thorough identity investigations, and to collect evidence for audit. Oort&#39;s Identity Security Checks automatically detect identity threats and vulnerabilities in SaaS identity providers (IdP) and human resources systems (HRIS). Seamless workflow integrations with Slack, Microsoft Teams, and ServiceNow enable thoughtful and immediate remediation that speeds up teams and adds simplicity to the chaotic mess of identity security.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 6
**How Do G2 Users Rate Oort Identity Security Platform?**

- **Quality of Support:** 10.0/10 (Category avg: 9.1/10)
- **Ease of Use:** 9.3/10 (Category avg: 9.1/10)

**Who Is the Company Behind Oort Identity Security Platform?**

- **Seller:** [Oort](https://www.g2.com/sellers/oort)
- **Year Founded:** 2019
- **HQ Location:** Boston, US
- **LinkedIn® Page:** https://www.linkedin.com/company/oort-inc/ (13 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 67% Mid-Market, 33% Enterprise


### 22. [RevealSecurity](https://www.g2.com/products/revealsecurity/reviews)
  Reveal Security ITDR detects identity threats in and across SaaS applications and cloud services – post authentication. The solution uses a patented unsupervised machine learning algorithm to continuously monitor and validate the behavior of human and machine identities to quickly and accurately alert on suspicious activity. Organizations can protect against account takeover attacks, insider threats, and third party/supply chain risk, after the point of login, without the need for creating rules which are noisy, expensive and also require you to know what you are looking for. Learn more at Reveal.Security.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 7
**How Do G2 Users Rate RevealSecurity?**

- **Quality of Support:** 9.7/10 (Category avg: 9.1/10)
- **Ease of Use:** 9.3/10 (Category avg: 9.1/10)

**Who Is the Company Behind RevealSecurity?**

- **Seller:** [RevealSecurity](https://www.g2.com/sellers/revealsecurity)
- **Year Founded:** 2021
- **HQ Location:** New York, US
- **LinkedIn® Page:** https://www.linkedin.com/company/revealsecurity (41 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 57% Small-Business, 43% Mid-Market


#### What Are RevealSecurity's Pros and Cons?

**Pros:**

- Ease of Use (1 reviews)
- Easy Implementation (1 reviews)
- Easy Installation (1 reviews)
- Threat Detection (1 reviews)
- User Behavior Analytics (1 reviews)

**Cons:**

- Expensive (1 reviews)

### 23. [Petra Security](https://www.g2.com/products/petra-security/reviews)
  Petra Security is AI-powered ITDR 2.0 for MSPs. Today’s cyberattacks hit your M365. Petra is best-in-class to detect &amp; stop BECs, Token Theft, and other M365 threats.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 4
**How Do G2 Users Rate Petra Security?**

- **Quality of Support:** 10.0/10 (Category avg: 9.1/10)
- **Ease of Use:** 10.0/10 (Category avg: 9.1/10)

**Who Is the Company Behind Petra Security?**

- **Seller:** [Petra Security](https://www.g2.com/sellers/petra-security)
- **HQ Location:** San Francisco, US
- **LinkedIn® Page:** https://www.linkedin.com/company/petrasecurity/ (9 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 100% Small-Business


### 24. [Securonix Security Operations and Analytics Platform](https://www.g2.com/products/securonix-security-operations-and-analytics-platform/reviews)
  Securonix is working to radically transform all areas of data security with actionable security intelligence.


  **Average Rating:** 4.0/5.0
  **Total Reviews:** 14
**How Do G2 Users Rate Securonix Security Operations and Analytics Platform?**

- **Quality of Support:** 8.3/10 (Category avg: 9.1/10)
- **Ease of Use:** 8.7/10 (Category avg: 9.1/10)

**Who Is the Company Behind Securonix Security Operations and Analytics Platform?**

- **Seller:** [Securonix](https://www.g2.com/sellers/securonix)
- **Year Founded:** 2008
- **HQ Location:** Addison, US
- **Twitter:** @Securonix (4,282 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/759889 (648 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 50% Enterprise, 36% Small-Business


#### What Are Securonix Security Operations and Analytics Platform's Pros and Cons?

**Pros:**

- Alerting (1 reviews)
- Alerting System (1 reviews)
- Alert Notifications (1 reviews)
- Alerts (1 reviews)
- Analysis (1 reviews)

**Cons:**

- Complex Setup (1 reviews)
- Information Deficiency (1 reviews)
- Insufficient Detail (1 reviews)
- Integration Issues (1 reviews)
- Limited Features (1 reviews)

### 25. [IBM Verify Identity Protection](https://www.g2.com/products/ibm-verify-identity-protection/reviews)
  IBM Verify Identity Protection is an advanced security solution designed to detect and mitigate identity-based risks across an organization&#39;s IT infrastructure. By integrating Identity Threat Detection and Response (ITDR) with Identity Security Posture Management (ISPM), it offers comprehensive protection against identity-related threats. Leveraging AI-powered observability, the solution effectively monitors both human and non-human identities, enhancing overall identity hygiene. Key Features and Functionality: - Advanced ITDR Capabilities: Provides detailed contextual analysis across identity infrastructures, including cloud Identity Providers (IdPs), on-premises or hybrid directories, multifactor authentication (MFA) solutions, single sign-on (SSO), and privileged access management (PAM) platforms. - Detection of Misconfigurations and Noncompliance: Identifies vulnerabilities caused by human error, policy deviations, and inadequate implementations of identity tools such as MFA and IAM systems. - Elimination of Identity and Access Exposure: Detects and facilitates remediation of identity-related vulnerabilities like shadow assets, unauthorized local accounts, missing MFA, and unauthorized SaaS applications across various cloud platforms. - Continuous Access Flow Mapping: Monitors and documents data and request movements through systems and applications to ensure secure access. - Uncovering Hidden Vulnerabilities: Identifies and addresses previously unnoticed security gaps, including shadow access, exposed assets, compromised identities, and lack of MFA. - Holistic Identity Security Approach: Provides visibility across identity systems to consolidate threats and detect both vulnerabilities and active attacks. Primary Value and Problem Solved: IBM Verify Identity Protection empowers organizations to proactively identify and remediate identity posture issues and threats, thereby safeguarding against identity-based attacks. By offering full visibility into access activities for all identities—both human and machine—across multicloud, SaaS, and on-premises environments, it enhances security posture and ensures compliance. The integration of ISPM and ITDR within a single solution allows for the identification of weaknesses before they are exploited and provides real-time responses to ongoing threats, effectively reducing the risk of data breaches and unauthorized access.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 2
**How Do G2 Users Rate IBM Verify Identity Protection?**

- **Quality of Support:** 8.3/10 (Category avg: 9.1/10)
- **Ease of Use:** 10.0/10 (Category avg: 9.1/10)

**Who Is the Company Behind IBM Verify Identity Protection?**

- **Seller:** [IBM](https://www.g2.com/sellers/ibm)
- **Year Founded:** 1911
- **HQ Location:** Armonk, NY
- **Twitter:** @IBM (709,298 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1009/ (324,553 employees on LinkedIn®)
- **Ownership:** SWX:IBM

**Who Uses This Product?**
  - **Company Size:** 50% Small-Business, 50% Enterprise



    ## What Is Identity Threat Detection and Response (ITDR)  Software?
  [User Threat Prevention Software](https://www.g2.com/categories/user-threat-prevention)
  ## What Software Categories Are Similar to Identity Threat Detection and Response (ITDR)  Software?
    - [Managed Detection and Response (MDR)  Software](https://www.g2.com/categories/managed-detection-and-response-mdr)
    - [Cloud Security Monitoring and Analytics Software](https://www.g2.com/categories/cloud-security-monitoring-and-analytics)
    - [Extended Detection and Response (XDR) Platforms](https://www.g2.com/categories/extended-detection-and-response-xdr-platforms)

  
    
