Best Identity Threat Detection and Response (ITDR) Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Identity threat detection and response (ITDR) software detects identity-related threats and vulnerabilities, such as credential misuse and abuse, unapproved entitlements and privilege escalations, and other identity-related threats. Information security teams use this software as part of their threat detection initiatives, specifically geared toward the identity-related attack surface.

Identity threat detection and response (ITDR) software is different from identity and access management (IAM) software; IAM’s function is to prevent identity-related risks through proper user authentication and access up front, while ITDR identifies threats once systems have been compromised. ITDR is also different from insider threat management (ITM) software in that ITDR identifies credentials and privileges abuse, commonly from external parties that have identified and misused identity vulnerabilities, while ITM monitors the actions a threat actor takes such as downloading data they are not entitled to.

To qualify for inclusion in the Identity Threat Detection and Response (ITDR) category, a product must:

Monitor and detect potentially malicious identity and privileges activity
Identify identity-related misconfigurations
Investigate identity threats with contextual user information
Flag unauthorized accounts and excessive privileges
Show More
Show Less

Featured Identity Threat Detection and Response (ITDR) Software At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
56 Listings in Identity Threat Detection and Response (ITDR) Available
(386)4.7 out of 5
2nd Easiest To Use in Identity Threat Detection and Response (ITDR) software
View top Consulting Services for CrowdStrike Falcon Endpoint Protection Platform
(75)4.8 out of 5
1st Easiest To Use in Identity Threat Detection and Response (ITDR) software
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
(202)4.2 out of 5
Entry Level Price:$4.00
View top Consulting Services for IBM MaaS360
(96)4.3 out of 5
8th Easiest To Use in Identity Threat Detection and Response (ITDR) software
(106)4.6 out of 5
Entry Level Price:Free
3rd Easiest To Use in Identity Threat Detection and Response (ITDR) software
View top Consulting Services for Guardz
(32)4.8 out of 5
5th Easiest To Use in Identity Threat Detection and Response (ITDR) software
(41)4.5 out of 5
9th Easiest To Use in Identity Threat Detection and Response (ITDR) software
(199)4.7 out of 5
Entry Level Price:Contact Us
4th Easiest To Use in Identity Threat Detection and Response (ITDR) software
View top Consulting Services for SentinelOne Singularity Endpoint
(127)4.5 out of 5
Entry Level Price:Starting at $2.00
6th Easiest To Use in Identity Threat Detection and Response (ITDR) software
(25)4.8 out of 5
7th Easiest To Use in Identity Threat Detection and Response (ITDR) software