  # Best Enterprise Identity Threat Detection and Response (ITDR)  Software

  *By [Brandon Summers-Miller](https://research.g2.com/insights/author/brandon-summers-miller)*

   Products classified in the overall Identity Threat Detection and Response (ITDR) category are similar in many regards and help companies of all sizes solve their business problems. However, enterprise business features, pricing, setup, and installation differ from businesses of other sizes, which is why we match buyers to the right Enterprise Business Identity Threat Detection and Response (ITDR) to fit their needs. Compare product ratings based on reviews from enterprise users or connect with one of G2&#39;s buying advisors to find the right solutions within the Enterprise Business Identity Threat Detection and Response (ITDR) category.

In addition to qualifying for inclusion in the Identity Threat Detection and Response (ITDR) Software category, to qualify for inclusion in the Enterprise Business Identity Threat Detection and Response (ITDR) Software category, a product must have at least 10 reviews left by a reviewer from an enterprise business.




  
## How Many Identity Threat Detection and Response (ITDR)  Software Products Does G2 Track?
**Total Products under this Category:** 62

### Category Stats (May 2026)
- **Average Rating**: 4.54/5
- **New Reviews This Quarter**: 45
- **Buyer Segments**: Small-Business 49% │ Mid-Market 34% │ Enterprise 16%
- **Top Trending Product**: SailPoint (+0.012)
*Last updated: May 19, 2026*

  
## How Does G2 Rank Identity Threat Detection and Response (ITDR)  Software Products?

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 3,100+ Authentic Reviews
- 62+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.

  
  
---

**Sponsored**

### Deepwatch

Deepwatch is the leader in Precision MDR powered by AI and humans. We amplify human expertise with AI insights to reduce the risks that matter most to your business. Unlike one-size-fits-all MDR, Deepwatch delivers protection that is comprehensive, custom, clear, and ceaseless—stopping threats before and after they emerge with tailored responses at every step. Deepwatch is tuned to each customer’s environment, trained on their priorities and the stack they’ve invested in to strengthen defenses and focus on what matters most. There are no black boxes—customers get clarity on every detection, decision, and data source, along with the name of the analyst behind it. Around-the-clock protection is delivered by security experts who act on real-time threats, powered by AI. Visit Deepwatch.com. Always Watching. Always Protecting. Deepwatch is: - Named to CRNs 2025 Security 100 List - Global INFOSEC Awards Winner 2024 - Splunk AMER Marketing Partner of the Year 2023 - CRN Tech Innovators Winner 2023 - Great Place to Work® Certified 2020-2025 - Forbes 2023-2024 Best Startup Employers - Equity Investments and Strategic Financing from Springcoast Capital Partners, Splunk Ventures and Vista Credit Partners: $180 million in 2023 - Goldman Sachs portfolio company: $53m Series B investment 2020



[Visit website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=1003176&amp;secure%5Bdisplayable_resource_id%5D=1797&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=neighbor_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=1797&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=108062&amp;secure%5Bresource_id%5D=1003176&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fidentity-threat-detection-and-response-itdr&amp;secure%5Btoken%5D=70651549078547b97fab808a5c1e8c1723b96acc03e0df9c3777c47bc49e7054&amp;secure%5Burl%5D=https%3A%2F%2Fwww.deepwatch.com%2Fplatform%2Fg2&amp;secure%5Burl_type%5D=book_demo)

---

  ## What Are the Top-Rated Identity Threat Detection and Response (ITDR)  Software Products in 2026?
### 1. [CrowdStrike Falcon Endpoint Protection Platform](https://www.g2.com/products/crowdstrike-falcon-endpoint-protection-platform/reviews)
  Organizations today face a serious challenge: managing numerous security vendors and tools while confronting an ever-evolving threat landscape. Sophisticated adversaries are becoming smarter, faster, and more evasive, launching complex attacks that can strike in minutes or even seconds. Traditional security approaches struggle to keep pace, leaving businesses vulnerable. The CrowdStrike Falcon Platform addresses this by offering a unified, cloud-native solution. It consolidates previously siloed security solutions and incorporates third-party data into a single platform with one efficient and resource-conscious agent, leveraging advanced AI and real-time threat intelligence. This approach simplifies security operations, speeds analyst decision making, and enhances protection to stop the breach, allowing organizations to reduce risk with less complexity and lower costs. CrowdStrike&#39;s Falcon Platform includes: - Endpoint Security: Secure the endpoint, stop the breach - Identify Protection: Identity is the front line, defend it - Next-Gen SIEM: The future of SIEM, today - Data Protection: Real-time data protection from endpoint to cloud - Exposure Management: Understand risk to stop breaches - Charlotte AI: Powering the next evolution of the SOC


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 384
**How Do G2 Users Rate CrowdStrike Falcon Endpoint Protection Platform?**

- **Quality of Support:** 8.9/10 (Category avg: 9.1/10)
- **Ease of Use:** 9.0/10 (Category avg: 9.1/10)

**Who Is the Company Behind CrowdStrike Falcon Endpoint Protection Platform?**

- **Seller:** [CrowdStrike](https://www.g2.com/sellers/crowdstrike)
- **Company Website:** https://www.crowdstrike.com
- **Year Founded:** 2011
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @CrowdStrike (110,553 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2497653/ (11,258 employees on LinkedIn®)

**Who Uses This Product?**
  - **Who Uses This:** Security Analyst, Cyber Security Analyst
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 46% Enterprise, 42% Mid-Market


#### What Are CrowdStrike Falcon Endpoint Protection Platform's Pros and Cons?

**Pros:**

- Features (113 reviews)
- Threat Detection (103 reviews)
- Ease of Use (98 reviews)
- Security (97 reviews)
- Detection (86 reviews)

**Cons:**

- Expensive (54 reviews)
- Complexity (39 reviews)
- Learning Curve (35 reviews)
- Limited Features (31 reviews)
- Pricing Issues (29 reviews)

### 2. [Semperis Directory Services Protector](https://www.g2.com/products/semperis-directory-services-protector/reviews)
  Semperis Directory Services Protector puts Active Directory security and identity threat detection and response on autopilot with continuous AD threat monitoring, real-time alerts, and autonomous remediation capabilities. DSP helps you respond more effectively to Active Directory security incidents and everyday operational mistakes. It provides a complete picture of risk exposure in hybrid environments and provides backup and recovery of critical Entra ID resources


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 25
**How Do G2 Users Rate Semperis Directory Services Protector?**

- **Quality of Support:** 9.6/10 (Category avg: 9.1/10)
- **Ease of Use:** 9.1/10 (Category avg: 9.1/10)

**Who Is the Company Behind Semperis Directory Services Protector?**

- **Seller:** [Semperis](https://www.g2.com/sellers/semperis)
- **Company Website:** https://www.semperis.com
- **Year Founded:** 2015
- **HQ Location:** Hoboken, New Jersey
- **Twitter:** @SemperisTech (10,082 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/semperis/ (658 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 80% Enterprise, 20% Mid-Market


#### What Are Semperis Directory Services Protector's Pros and Cons?

**Pros:**

- Ease of Use (8 reviews)
- Security (7 reviews)
- Features (6 reviews)
- Customer Support (5 reviews)
- Automation (4 reviews)

**Cons:**

- Communication Issues (2 reviews)
- Data Inconsistency (2 reviews)
- Lack of Information (2 reviews)
- Limited Reporting (2 reviews)
- Poor Customer Support (2 reviews)

### 3. [Microsoft Defender for Identity](https://www.g2.com/products/microsoft-defender-for-identity/reviews)
  Microsoft Defender for Identity enables you to integrate Microsoft Defender for Identity with Defender for Endpoint, for an even more complete threat protection solution. While Defender for Identity monitors the traffic on your domain controllers, Defender for Endpoint monitors your endpoints, together providing a single interface from which you can protect your environment.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 92
**How Do G2 Users Rate Microsoft Defender for Identity?**

- **Quality of Support:** 7.9/10 (Category avg: 9.1/10)
- **Ease of Use:** 8.1/10 (Category avg: 9.1/10)

**Who Is the Company Behind Microsoft Defender for Identity?**

- **Seller:** [Microsoft](https://www.g2.com/sellers/microsoft)
- **Year Founded:** 1975
- **HQ Location:** Redmond, Washington
- **Twitter:** @microsoft (13,101,622 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/microsoft/ (227,697 employees on LinkedIn®)
- **Ownership:** MSFT

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 39% Enterprise, 32% Small-Business


### 4. [Microsoft Entra Identity Protection](https://www.g2.com/products/microsoft-entra-identity-protection/reviews)
  Identity Protection is a tool that allows organizations to accomplish three key tasks: Automate the detection and remediation of identity-based risks. Investigate risks using data in the portal. Export risk detection data to your SIEM.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 41
**How Do G2 Users Rate Microsoft Entra Identity Protection?**

- **Quality of Support:** 9.0/10 (Category avg: 9.1/10)
- **Ease of Use:** 9.0/10 (Category avg: 9.1/10)

**Who Is the Company Behind Microsoft Entra Identity Protection?**

- **Seller:** [Microsoft](https://www.g2.com/sellers/microsoft)
- **Year Founded:** 1975
- **HQ Location:** Redmond, Washington
- **Twitter:** @microsoft (13,101,622 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/microsoft/ (227,697 employees on LinkedIn®)
- **Ownership:** MSFT

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 51% Enterprise, 27% Mid-Market



    ## What Is Identity Threat Detection and Response (ITDR)  Software?
  [User Threat Prevention Software](https://www.g2.com/categories/user-threat-prevention)
  ## What Software Categories Are Similar to Identity Threat Detection and Response (ITDR)  Software?
    - [Endpoint Detection &amp; Response (EDR) Software](https://www.g2.com/categories/endpoint-detection-response-edr)
    - [Managed Detection and Response (MDR)  Software](https://www.g2.com/categories/managed-detection-and-response-mdr)
    - [Extended Detection and Response (XDR) Platforms](https://www.g2.com/categories/extended-detection-and-response-xdr-platforms)

  
    
