Introducing G2.ai, the future of software buying.Try now

Best Identity Threat Detection and Response (ITDR) Software - Page 3

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Identity threat detection and response (ITDR) software detects identity-related threats and vulnerabilities, such as credential misuse and abuse, unapproved entitlements and privilege escalations, and other identity-related threats. Information security teams use this software as part of their threat detection initiatives, specifically geared toward the identity-related attack surface.

Identity threat detection and response (ITDR) software is different from identity and access management (IAM) software; IAM’s function is to prevent identity-related risks through proper user authentication and access up front, while ITDR identifies threats once systems have been compromised. ITDR is also different from insider threat management (ITM) software in that ITDR identifies credentials and privileges abuse, commonly from external parties that have identified and misused identity vulnerabilities, while ITM monitors the actions a threat actor takes such as downloading data they are not entitled to.

To qualify for inclusion in the Identity Threat Detection and Response (ITDR) category, a product must:

Monitor and detect potentially malicious identity and privileges activity
Identify identity-related misconfigurations
Investigate identity threats with contextual user information
Flag unauthorized accounts and excessive privileges
Show More
Show Less

Featured Identity Threat Detection and Response (ITDR) Software At A Glance

Free Plan Available:
Guardz
Sponsored
Highest Performer:
Easiest to Use:
Show LessShow More
Highest Performer:
Easiest to Use:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Identity Threat Detection and Response (ITDR) Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
51 Listings in Identity Threat Detection and Response (ITDR) Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Authomize protects organizations from identity-based cyberattacks with the first Identity Threat Detection and Response (ITDR) Platform. Authomize collects and normalizes data of identities, access p

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Authomize features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Authomize
    Year Founded
    2020
    HQ Location
    Alpharetta, US
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Authomize protects organizations from identity-based cyberattacks with the first Identity Threat Detection and Response (ITDR) Platform. Authomize collects and normalizes data of identities, access p

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Authomize features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Seller
Authomize
Year Founded
2020
HQ Location
Alpharetta, US
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The problem of Attack Path Management requires a fundamentally different, unique methodology designed to help organizations understand, empirically quantify impact, and eliminate identity-based Attack

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BloodHound Enterprise features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Alexandria, US
    Twitter
    @SpecterOps
    39,709 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    241 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The problem of Attack Path Management requires a fundamentally different, unique methodology designed to help organizations understand, empirically quantify impact, and eliminate identity-based Attack

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
BloodHound Enterprise features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2017
HQ Location
Alexandria, US
Twitter
@SpecterOps
39,709 Twitter followers
LinkedIn® Page
www.linkedin.com
241 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VeriClouds credential verification services help organizations detect compromised credentials through the whole customer lifecycle and limit the risk of account takeover attacks. VeriClouds uses the s

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CredVerify features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Seattle, US
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

VeriClouds credential verification services help organizations detect compromised credentials through the whole customer lifecycle and limit the risk of account takeover attacks. VeriClouds uses the s

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
CredVerify features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2014
HQ Location
Seattle, US
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secure and comprehensive access control to on-premises infrastructure, centrally managed from Active Directory, minimizing risk across all Linux, UNIX, and Windows systems. Server Suite secures privi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 56% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Delinea Server Suite Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Security
    1
    Ease of Use
    1
    Identity Management
    1
    Implementation Ease
    1
    Reliability
    1
    Cons
    Access Issues
    1
    Notification Issues
    1
    Password Issues
    1
    Password Management
    1
    Poor Customer Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Delinea Server Suite features and usability ratings that predict user satisfaction
    6.7
    Quality of Support
    Average: 9.1
    8.3
    Ease of Use
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Delinea
    Year Founded
    2004
    HQ Location
    San Francisco
    Twitter
    @DelineaInc
    849 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,164 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Secure and comprehensive access control to on-premises infrastructure, centrally managed from Active Directory, minimizing risk across all Linux, UNIX, and Windows systems. Server Suite secures privi

Users
No information available
Industries
No information available
Market Segment
  • 56% Enterprise
  • 33% Mid-Market
Delinea Server Suite Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Security
1
Ease of Use
1
Identity Management
1
Implementation Ease
1
Reliability
1
Cons
Access Issues
1
Notification Issues
1
Password Issues
1
Password Management
1
Poor Customer Support
1
Delinea Server Suite features and usability ratings that predict user satisfaction
6.7
Quality of Support
Average: 9.1
8.3
Ease of Use
Average: 9.2
Seller Details
Seller
Delinea
Year Founded
2004
HQ Location
San Francisco
Twitter
@DelineaInc
849 Twitter followers
LinkedIn® Page
www.linkedin.com
1,164 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Identity is the new perimeter and securing identities, establishing privileged access policies, and implementing zero trust programs are critical to protect organizations from threat actors. The rise

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GuruCul Identity Analytics features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Gurucul
    Year Founded
    2010
    HQ Location
    El Segundo, US
    Twitter
    @Gurucul
    1,323 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    288 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Identity is the new perimeter and securing identities, establishing privileged access policies, and implementing zero trust programs are critical to protect organizations from threat actors. The rise

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
GuruCul Identity Analytics features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Seller
Gurucul
Year Founded
2010
HQ Location
El Segundo, US
Twitter
@Gurucul
1,323 Twitter followers
LinkedIn® Page
www.linkedin.com
288 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Identity Confluence is an intelligent Identity Governance and Administration (IGA) platform designed to help IT and security teams manage access, automate identity lifecycles, and maintain continuous

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Identity Confluence features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Pune, IN
    LinkedIn® Page
    www.linkedin.com
    93 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Identity Confluence is an intelligent Identity Governance and Administration (IGA) platform designed to help IT and security teams manage access, automate identity lifecycles, and maintain continuous

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Identity Confluence features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2017
HQ Location
Pune, IN
LinkedIn® Page
www.linkedin.com
93 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    🛡️ Mirket ITDR – Identity-Centric Threat Detection for the Modern Enterprise Mirket ITDR, the threat detection module of our unified Mentis Platform, empowers organizations to detect identity-based at

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Identity Threat Detection and Response features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    London, GB
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

🛡️ Mirket ITDR – Identity-Centric Threat Detection for the Modern Enterprise Mirket ITDR, the threat detection module of our unified Mentis Platform, empowers organizations to detect identity-based at

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Identity Threat Detection and Response features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2020
HQ Location
London, GB
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Netwrix PingCastle helps organizations uncover and remediate weaknesses in their Active Directory and Entra ID environments before attackers can exploit them. It scans for misconfigurations, hidden vu

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Netwrix PingCastle features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Netwrix
    HQ Location
    Irvine, CA
    Twitter
    @Netwrix
    2,926 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    708 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Netwrix PingCastle helps organizations uncover and remediate weaknesses in their Active Directory and Entra ID environments before attackers can exploit them. It scans for misconfigurations, hidden vu

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Netwrix PingCastle features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Seller
Netwrix
HQ Location
Irvine, CA
Twitter
@Netwrix
2,926 Twitter followers
LinkedIn® Page
www.linkedin.com
708 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Obsidian Security is the first truly comprehensive threat and posture management solution built for SaaS. Our platform consolidates data across core applications to help your team optimize configurati

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Obsidian Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Helpful
    1
    Implementation Ease
    1
    Onboarding
    1
    Product Helpfulness
    1
    Cons
    Dashboard Issues
    1
    Expensive
    1
    Inadequate Threat Analysis
    1
    Limited Reporting
    1
    Reporting Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Obsidian Security features and usability ratings that predict user satisfaction
    9.2
    Quality of Support
    Average: 9.1
    8.3
    Ease of Use
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Newport Beach, California, United States
    Twitter
    @obsidiansec
    1,104 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    221 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Obsidian Security is the first truly comprehensive threat and posture management solution built for SaaS. Our platform consolidates data across core applications to help your team optimize configurati

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Mid-Market
Obsidian Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Helpful
1
Implementation Ease
1
Onboarding
1
Product Helpfulness
1
Cons
Dashboard Issues
1
Expensive
1
Inadequate Threat Analysis
1
Limited Reporting
1
Reporting Issues
1
Obsidian Security features and usability ratings that predict user satisfaction
9.2
Quality of Support
Average: 9.1
8.3
Ease of Use
Average: 9.2
Seller Details
Year Founded
2017
HQ Location
Newport Beach, California, United States
Twitter
@obsidiansec
1,104 Twitter followers
LinkedIn® Page
www.linkedin.com
221 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Permiso detects and protects against human and non-human identity threats across cloud and on-premise environments to provide modern threat detection for your modern attack surface. Permiso assesses e

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Permiso features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Permiso
    Year Founded
    2020
    HQ Location
    Palo Alto, US
    LinkedIn® Page
    www.linkedin.com
    62 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Permiso detects and protects against human and non-human identity threats across cloud and on-premise environments to provide modern threat detection for your modern attack surface. Permiso assesses e

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Permiso features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Seller
Permiso
Year Founded
2020
HQ Location
Palo Alto, US
LinkedIn® Page
www.linkedin.com
62 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Astrix Security's NHI Posture Management solution is designed to enhance organizational security by providing comprehensive visibility and control over non-human identities (NHIs) such as service acco

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Posture Management features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    New York, New York, United States
    LinkedIn® Page
    www.linkedin.com
    115 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Astrix Security's NHI Posture Management solution is designed to enhance organizational security by providing comprehensive visibility and control over non-human identities (NHIs) such as service acco

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Posture Management features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2021
HQ Location
New York, New York, United States
LinkedIn® Page
www.linkedin.com
115 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyber-first Active Directory recovery. Active Directory Forest Recovery (ADFR)—the only backup and recovery solution purpose-built for recovering Active Directory from cyber disasters—fully automa

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Semperis Active Directory Forest Recovery features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Semperis
    Year Founded
    2015
    HQ Location
    Hoboken, New Jersey
    Twitter
    @SemperisTech
    10,112 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    596 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyber-first Active Directory recovery. Active Directory Forest Recovery (ADFR)—the only backup and recovery solution purpose-built for recovering Active Directory from cyber disasters—fully automa

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Semperis Active Directory Forest Recovery features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Seller
Semperis
Year Founded
2015
HQ Location
Hoboken, New Jersey
Twitter
@SemperisTech
10,112 Twitter followers
LinkedIn® Page
www.linkedin.com
596 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SlashID is the composable identity platform to improve identity security without user friction. SlashID Gate adds authentication, authorization,rate limiting and CAPTCHA-less bot detections to your A

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SlashID Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    3
    Ease of Use
    3
    Easy Integrations
    2
    Features
    2
    Integrations
    2
    Cons
    API Difficulty
    1
    Complex Configuration
    1
    Integration Issues
    1
    Limited Features
    1
    Limited Functionality
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SlashID features and usability ratings that predict user satisfaction
    10.0
    Quality of Support
    Average: 9.1
    9.4
    Ease of Use
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SlashID
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    9 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SlashID is the composable identity platform to improve identity security without user friction. SlashID Gate adds authentication, authorization,rate limiting and CAPTCHA-less bot detections to your A

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
SlashID Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
3
Ease of Use
3
Easy Integrations
2
Features
2
Integrations
2
Cons
API Difficulty
1
Complex Configuration
1
Integration Issues
1
Limited Features
1
Limited Functionality
1
SlashID features and usability ratings that predict user satisfaction
10.0
Quality of Support
Average: 9.1
9.4
Ease of Use
Average: 9.2
Seller Details
Seller
SlashID
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
9 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Active Directory is a primary source for Authentication and Authorization for users and business applications. Microsoft doesn't provide out of the box tools that can be used to perform health & r

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SmartProfiler for Active Directory Security and Health features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Minneapolis, US
    LinkedIn® Page
    www.linkedin.com
    18 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Active Directory is a primary source for Authentication and Authorization for users and business applications. Microsoft doesn't provide out of the box tools that can be used to perform health & r

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
SmartProfiler for Active Directory Security and Health features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2019
HQ Location
Minneapolis, US
LinkedIn® Page
www.linkedin.com
18 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SPHERE is the leader in Identity Hygiene.  We help companies maintain real-time visibility, achieve least privilege, and automate identity risk mitigation. Organizations struggle with excessive, unmon

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SPHEREboard features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    Newark, New Jersey, United States
    LinkedIn® Page
    www.linkedin.com
    109 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SPHERE is the leader in Identity Hygiene.  We help companies maintain real-time visibility, achieve least privilege, and automate identity risk mitigation. Organizations struggle with excessive, unmon

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
SPHEREboard features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2009
HQ Location
Newark, New Jersey, United States
LinkedIn® Page
www.linkedin.com
109 employees on LinkedIn®