This content is currently locked.

Your current McLean & Company subscription does not include access to this content. Contact your account representative to gain access to Premium SoftwareReviews.

Contact Your Representative
Or Call Us:
1-877-281-0480 (US/CAN) or
+1-519-936-2659 (International)

Identity Threat Detection and Response (ITDR) Software

Identity Threat Detection and Response

What is Identity Threat Detection and Response Software?

Identity Threat Detection and Response (ITDR) is a strategic solution in protecting user identities and systems from cyber threats. ITDR systems monitor user behaviors to detect strange login patterns or unauthorized access attempts, to quickly pinpoint and resolve possible security threats. When a threat is detected, ITDR solutions facilitate immediate actions, like isolating compromised accounts or requiring extra authentication measures, to mitigate risks and protect sensitive information.

Common Features

  • Discover Machine Identities
  • Discover Federated Identities
  • Continuous Discovery
  • ZSP support
  • Authentication support
  • Suspicious activity
  • Time to value
  • Forensics
  • Policy Creation and Right Sizing
  • Refactoring
  • TTP detection
  • Discover Human Identities

Write a Review to receive up to a $10 Gift Card*

*After you complete our short 5-6 minute survey, we will happily provide you with your choice of reward up to $10 based on available options for your region.

Write a Review

Top Identity Threat Detection and Response Software 2024

Products below are ineligible for awards due to insufficient recent reviews

Composite Score
5.9 /10
CX Score
5.9 /10

Microsoft Entra ID Protection uses advanced machine learning to identify sign-in risks and unusual user behavior to block, challenge, limit, or allow access.

We don't have enough data from reviews to share who uses this product. Learn more about .

We don't have enough data from reviews to share who uses this product. Learn more about .

We don't have enough data from reviews to share who uses this product. Learn more about .

We don't have enough data from reviews to share who uses this product. Learn more about .

We don't have enough data from reviews to share who uses this product. Learn more about .

We don't have enough data from reviews to share who uses this product. Learn more about .

We don't have enough data from reviews to share who uses this product. Learn more about .

We don't have enough data from reviews to share who uses this product. Learn more about .

We don't have enough data from reviews to share who uses this product. Learn more about .