Loading...
Identity Threat Detection and Response (ITDR) solutions for detecting identity-based attacks, credential theft, and compromised accounts in real-time.
Browse 109 identity threat detection and response tools
Maps GCP service account key permissions and access for incident response
Identity threat detection platform for account fraud and ATO prevention
Identity threat detection and response platform for SaaS, cloud, and on-prem
Cloud identity threat detection and response platform for human and non-human IDs
Identity graph platform for attributing cloud & CI/CD actions to specific identities
Identity observability platform unifying human, NHI, and AI agent identities
Identity observability platform for AI agents, NHIs, and human identities
Identity protection platform for human & non-human identities across clouds
Identity security platform for access monitoring and threat detection
AI-powered identity security platform for identity breach defense and IAM
Identity security platform with ISPM, SaaS policy mgmt, and dynamic authz
Identity attack path management platform for hybrid environments
Identity threat detection and response platform for cloud infrastructure
Identity risk mgmt platform for visibility, correlation & remediation
Mobile identity protection using immutable device/app IDs and 400+ threat signals, no SDK
Real-time identity access control platform using context-aware policies
AD security platform mapping attack paths and misconfigurations in AD environments
Identity security platform mapping attack paths and misconfigurations
Detects help desk impersonation & social engineering attacks in real time
Manages NHI and AI agent lifecycle from provisioning to decommissioning
IAM ITDR platform for AI agents and non-human identities
Secures AI agents and non-human identities with discovery and governance.
Prevents account takeover attacks through predictive detection and real-time protection.
Secures AI agents by managing their non-human identities and secrets
Common questions about Identity Threat Detection and Response tools, selection guides, pricing, and comparisons.
ITDR detects identity-specific attacks including: Kerberoasting and AS-REP roasting (Active Directory), pass-the-hash and pass-the-ticket, DCSync attacks, OAuth token theft and abuse, MFA fatigue attacks, compromised service accounts, Azure AD/Entra ID attacks (consent phishing, application impersonation), and privilege escalation through identity misconfigurations.