Introducing G2.ai, the future of software buying.Try now

Best Identity Threat Detection and Response (ITDR) Software - Page 4

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Identity threat detection and response (ITDR) software detects identity-related threats and vulnerabilities, such as credential misuse and abuse, unapproved entitlements and privilege escalations, and other identity-related threats. Information security teams use this software as part of their threat detection initiatives, specifically geared toward the identity-related attack surface.

Identity threat detection and response (ITDR) software is different from identity and access management (IAM) software; IAM’s function is to prevent identity-related risks through proper user authentication and access up front, while ITDR identifies threats once systems have been compromised. ITDR is also different from insider threat management (ITM) software in that ITDR identifies credentials and privileges abuse, commonly from external parties that have identified and misused identity vulnerabilities, while ITM monitors the actions a threat actor takes such as downloading data they are not entitled to.

To qualify for inclusion in the Identity Threat Detection and Response (ITDR) category, a product must:

Monitor and detect potentially malicious identity and privileges activity
Identify identity-related misconfigurations
Investigate identity threats with contextual user information
Flag unauthorized accounts and excessive privileges
Show More
Show Less

Featured Identity Threat Detection and Response (ITDR) Software At A Glance

Free Plan Available:
Guardz
Sponsored
Highest Performer:
Easiest to Use:
Show LessShow More
Highest Performer:
Easiest to Use:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Identity Threat Detection and Response (ITDR) Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
51 Listings in Identity Threat Detection and Response (ITDR) Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Non-Human Identity Discovery & Remediation platform

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • StackGuard features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2025
    HQ Location
    Singapore, SG
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Non-Human Identity Discovery & Remediation platform

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
StackGuard features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2025
HQ Location
Singapore, SG
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Stack Identity is a comprehensive identity security platform designed to detect, eliminate, and govern unauthorized access—referred to as Shadow Access—in cloud environments. By integrating Cloud Infr

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Stack Identity features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Menlo Park, US
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Stack Identity is a comprehensive identity security platform designed to detect, eliminate, and govern unauthorized access—referred to as Shadow Access—in cloud environments. By integrating Cloud Infr

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Stack Identity features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Menlo Park, US
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    lllusive continuously discovers and automatically remediates privileged identity risks that are exploited in all ransomware and other cyberattacks. Despite best-practice investments to protect identit

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • The Illusive Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    New York, US
    Twitter
    @illusivenw
    3,862 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    72 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

lllusive continuously discovers and automatically remediates privileged identity risks that are exploited in all ransomware and other cyberattacks. Despite best-practice investments to protect identit

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
The Illusive Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2014
HQ Location
New York, US
Twitter
@illusivenw
3,862 Twitter followers
LinkedIn® Page
www.linkedin.com
72 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trustle goes beyond Cloud Infrastructure Entitlement Management (CIEM) to prioritize the most over-privileged users, and easily transition your entire organization to Just-In-Time Access to everything

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Trustle Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Services
    1
    Identity Management
    1
    Secure Access
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trustle features and usability ratings that predict user satisfaction
    8.3
    Quality of Support
    Average: 9.1
    10.0
    Ease of Use
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trustle
    Year Founded
    2019
    HQ Location
    Walnut Creek, US
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trustle goes beyond Cloud Infrastructure Entitlement Management (CIEM) to prioritize the most over-privileged users, and easily transition your entire organization to Just-In-Time Access to everything

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Trustle Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Services
1
Identity Management
1
Secure Access
1
Cons
This product has not yet received any negative sentiments.
Trustle features and usability ratings that predict user satisfaction
8.3
Quality of Support
Average: 9.1
10.0
Ease of Use
Average: 9.2
Seller Details
Seller
Trustle
Year Founded
2019
HQ Location
Walnut Creek, US
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Veza is the authorization platform for data security. Identity and security professionals use Veza to modernize access governance for the new data landscape. By automating the work of finding and fixi

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Veza Core Authorization Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Veza
    Year Founded
    2020
    HQ Location
    Silicon Valley, US
    LinkedIn® Page
    www.linkedin.com
    287 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Veza is the authorization platform for data security. Identity and security professionals use Veza to modernize access governance for the new data landscape. By automating the work of finding and fixi

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Veza Core Authorization Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Seller
Veza
Year Founded
2020
HQ Location
Silicon Valley, US
LinkedIn® Page
www.linkedin.com
287 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zilla Security is the leading provider of modern identity governance and administration (IGA), providing a SaaS platform that automates the processes of identity compliance, provisioning, and security

    Users
    No information available
    Industries
    • Hospital & Health Care
    Market Segment
    • 27% Enterprise
    • 18% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zilla Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2020
    HQ Location
    Boston, MA
    Twitter
    @zillasecurity
    52 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    33 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zilla Security is the leading provider of modern identity governance and administration (IGA), providing a SaaS platform that automates the processes of identity compliance, provisioning, and security

Users
No information available
Industries
  • Hospital & Health Care
Market Segment
  • 27% Enterprise
  • 18% Mid-Market
Zilla Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Company Website
Year Founded
2020
HQ Location
Boston, MA
Twitter
@zillasecurity
52 Twitter followers
LinkedIn® Page
www.linkedin.com
33 employees on LinkedIn®