Technical Review by
Laura Iannini
Permiso is a complete identity security solution that inventories all human, non-human, and AI identities across cloud, SaaS, and on-premises environments.
For MSPs and IT teams who want identity threat detection without building a SOC, Huntress Managed ITDR deploys in minutes with 24/7 analyst response.
For enterprises with endpoint and SIEM investments already in place, CrowdStrike Falcon Identity Protection delivers unified visibility across identity, endpoint, and workload data.
If you’re running Microsoft 365 and need native integration, Microsoft offers conditional access and risk-based blocking built into your ecosystem.
Identity threats don’t announce themselves through obvious attack patterns. Attackers abuse MFA by flooding users with notifications until someone taps approve. They tamper with mailbox rules to maintain persistence. They grant OAuth permissions to malicious apps that sit quietly until activated. By the time traditional security monitoring flags the compromise, attackers are already inside your network making lateral moves.
The real challenge: most organizations lack dedicated identity threat detection. Your SOC team watches firewall logs and endpoint telemetry, but identity data lives in separate systems disconnected from endpoint context. Identity Threat Detection and Response platforms bridge that gap by monitoring authentication patterns, privilege abuse, and suspicious account activity in real time.
We evaluated nine ITDR solutions across cloud-first, hybrid, and Microsoft 365-centric environments, evaluating each for detection accuracy, integration with existing security stacks, automation capabilities, and operational overhead. What we found: the best platforms correlate identity signals with endpoint and network data to catch sophisticated threats that single-layer detection misses. Some excel at managed detection models for resource-constrained teams. Others integrate smoothly with existing Entra ID, Okta, or CrowdStrike investments.
This guide gives you the framework to identify which ITDR approach matches your staffing model, existing security investments, and identity infrastructure.
Your ITDR choice depends on whether you manage identity detection in house or prefer managed response, and how tightly integrated it needs to be with your existing security stack.
Permiso is a complete identity security solution. It inventories all human, non-human, and AI identities across cloud, SaaS, and on-premises environments. It is built for security teams managing multi-cloud environments that need a single dashboard to view all identities, exposures, credentials, secrets and devices, as well as alerts and activity logs. It effectively combines identity visibility, posture management, and threat detection in a single Universal Identity Graph.
The Universal Identity Graph is what sets Permiso apart from other ITDR tools. It correlates identity activity in real time across 50+ integrations, covering identity providers (Okta, Entra ID, Ping Identity, Duo), cloud infrastructure (AWS, Azure, GCP), 30+ SaaS applications (Slack, Salesforce, GitHub, ServiceNow, Snowflake), and CI/CD platforms. It pulls together identities, credentials, devices, and secrets into a single dashboard.
Where most ITDR tools generate alerts per environment, Permiso follows a compromised identity across authentication boundaries as a single correlated session. If an attacker moves from an IdP into IaaS, then SaaS, then CI/CD, Permiso stitches that activity together rather than surfacing disconnected alerts. From the dashboard you can manage all identities in one place, remove zombie identities, and cut down on unnecessary privileges.
In practice, if a service account in AWS starts behaving differently after an Okta session is compromised, Permiso connects those events and alerts you. When a threat is detected, Permiso builds a cohesive timeline using the identity as the anchor, which speeds up investigation and response.
We were impressed by how Permiso extends its identity visibility to non-human identities. Service accounts, API keys, tokens, and roles are monitored continuously for stale access, orphaned identities, and suspicious activity.
The solution is backed by P0 Labs, a threat intelligence team staffed by former Mandiant leaders. They maintain 1,500+ detection signals built from real-world attack patterns and publish original AI threat research, including the OpenClaw investigation into malicious AI agent skills.
Permiso users consider the cross-environment visibility to be a key strength of the platform, noting it provides insight into identity activity that their existing CSPM and SIEM tooling does not cover.
Permiso also extends ITDR coverage to AI users, builders, and autonomous agents operating in your environment, including visibility into what they’re doing and where they deviate from expected behavior. Deployment is agentless, and the platform is already trusted by Fortune 500 organizations. Permiso is one of the few platforms in this category addressing AI identity risk directly.
Teams with a predominantly on-premises Active Directory stack should factor in that Permiso’s strongest capabilities are cloud and hybrid-facing.
We think Permiso is a strong pick if your identity environment spans multiple cloud providers, SaaS applications, and a mix of human, non-human, and AI identities. The Universal Identity Graph brings all your identity infrastructure visibility into one place, with cross-boundary detection that most competitors lack.
Huntress Managed ITDR monitors Microsoft 365 identities for compromise, OAuth abuse, and authentication anomalies. It’s built for MSPs and IT teams who need expert-level identity detection without staffing a SOC. The platform pairs a 24/7 analyst team with automated remediation to catch threats fast.
We found the detection coverage effecitve: Huntress secures against MFA fatigue attacks, unauthorized MFA enrollment, mailbox rule tampering, and risky OAuth app grants. These are the exact techniques attackers use to maintain persistence after initial access. Alerts are prioritized and low-noise, so your team spends time on real threats.
We saw real value in how Huntress correlates identity telemetry with endpoint and SIEM data from its broader stack. That cross-layer context makes investigations faster. Remediation guidance is clear and specific, not just a dump of logs your team has to decode.
Onboarding is one of the easiest we’ve seen in this category. You connect your M365 environment and the platform starts monitoring. No complex configuration or tuning period. Customers confirm this: setup takes minutes, not days. The automated account lockdown on detection is a standout, especially for after-hours compromises when no one is watching the console.
Some customers flag occasional IP geolocation inaccuracies, where login locations show the wrong country. Others want more granular exception rules for VPN users and specific account types. One notable gap: the platform detects successful compromises but does not flag failed login attempts, which means password spray campaigns could go unnoticed.
CrowdStrike Falcon Identity Protection detects and blocks identity threats in real time across hybrid environments. It’s built for enterprise security teams who want identity detection tightly unified with their endpoint and workload telemetry. Everything runs through CrowdStrike’s single agent and console.
We found the unified approach is the real differentiator here. Falcon Identity Protection correlates identity signals with endpoint, workload, and cloud data in one console. That means your analysts see lateral movement attempts alongside the endpoint context that triggered them. No pivot between tools.
AI-driven behavioral baselines track each user’s normal patterns and flag deviations in real time. We saw strong coverage for credential misuse, privilege escalation, and lateral movement from endpoint to cloud. The platform also identifies hygiene issues like weak passwords and stale accounts across your entire identity estate.
Customers using Falcon Identity Protection consistently highlight the depth of visibility across hybrid identity environments. The AI-driven threat detection catches suspicious behavior that rule-based systems miss. Long-term users report improved response times and fewer identity-related incidents over time.
However, customers note that deploying full Falcon platform capabilities requires Falcon agents across all endpoints. If you have significant on-premises infrastructure or legacy systems not running the agent, identity coverage gaps could emerge. Configuration requires identity expertise, and tuning behavioral baselines to match your environment takes time.
Microsoft’s ITDR capability spans multiple products: Entra ID, Entra ID Protection, Defender for Identity, and Defender XDR. Together, they cover identity threats across on-premises Active Directory and cloud environments. If your organization already runs Microsoft infrastructure, this is the native identity detection layer built to sit on top of it.
We found the strongest value in how Defender for Identity monitors Active Directory directly. It catches lateral movement, reconnaissance, and credential compromise at the authentication layer. Suspicious LDAP access patterns and identity-based attack chains surface in real time. The integration with Microsoft Sentinel and Defender XDR gives your SOC a unified view without stitching together third-party feeds.
Entra ID Protection adds risk-based conditional access on the cloud side. When suspicious behavior is detected, MFA enforcement triggers dynamically. We saw how this creates a layered defense where identity risk scoring adjusts access controls automatically, reducing the window between detection and response.
Customers running Defender for Identity in enterprise environments value the deep AD visibility and the zero additional licensing cost for existing Microsoft E5 holders. Integration with the broader Microsoft security stack is consistently praised as a major advantage for teams already in that ecosystem.
The recurring criticism is false positives. Customers report cloud-side detections trigger more noise than expected, requiring tuning and AD expertise to manage effectively. Initial setup is also a sticking point, particularly around sensor deployment and configuration for Defender for Identity.
We think Microsoft’s ITDR suite is the natural choice if your identity infrastructure is already Microsoft-heavy. The native integration removes friction that third-party tools struggle to match. If your team lacks deep Active Directory expertise, plan for a steeper onboarding curve and invest time in tuning alert thresholds. For organizations already on E5 licensing, the cost efficiency is hard to beat.
Cortex XDR from Palo Alto Networks embeds identity threat detection directly into its broader XDR platform. Rather than a standalone ITDR product, this is an integrated module that adds identity risk analysis to endpoint, network, and cloud telemetry. It’s built for security teams already running Cortex who want identity coverage without adding another console.
We found the integration approach is where Cortex XDR’s ITDR shines. Identity data feeds into the same correlation engine that processes endpoint and network events. That means lateral movement attempts, credential misuse, and privilege escalation appear alongside the full attack chain context. Your analysts don’t need to jump between tools to connect identity anomalies to endpoint activity.
Risk-based profiling powered by Unit 42 threat intelligence prioritizes which identity incidents need attention first. We saw how this helps teams focus on real threats instead of chasing every anomaly. The platform also supports Zero Trust architectures by providing continuous identity monitoring that feeds into access decisions.
Customers praise the depth of investigation capabilities, particularly the ability to trace command execution and process trees tied to known attack techniques. The correlation across telemetry sources speeds up incident response for teams with the skills to use it.
The consistent friction point is tuning. Customers report false positives require significant manual effort to manage, with some flagging legitimate applications like Outlook as threats. Customizing detection policies involves a steeper learning curve than expected, and the platform demands ongoing attention to keep alert quality high.
We think Cortex XDR’s ITDR module is a smart addition if your team already operates within the Palo Alto ecosystem. The unified telemetry correlation gives your SOC real investigative depth across identity and endpoint. If you’re evaluating ITDR as a standalone capability, dedicated identity platforms offer more focused tooling. Plan for tuning investment upfront, and your team will benefit from lower noise over time.
PingOne for Workforce from Ping Identity is a cloud-based identity platform that centralizes SSO, MFA, and directory management for employee access. Since the ForgeRock acquisition, the platform has expanded into fraud detection, identity verification, and lifecycle management. It targets organizations that need a unified authentication layer across applications, directories, and cloud environments.
We found PingOne’s core strength is bringing SSO and MFA together in a single admin console. Your team connects users from any directory, publishes applications with SAML or federated identity, and enforces authentication policies from one place. The platform supports multiple MFA methods including the PingID app, email, and phone-based verification.
The ForgeRock integration adds identity governance and risk protection capabilities that extend PingOne beyond basic authentication. We saw how this positions the combined platform as a broader identity perimeter, covering access management, ITDR signals, and lifecycle governance without bolting on separate tools.
Customers consistently highlight speed as a standout. Authentication is quick, and the setup process for publishing applications is straightforward compared to alternatives. Multiple MFA options give end users flexibility in how they verify, which helps with adoption across the workforce.
The recurring frustration is MFA reliability. Customers report that push notifications through the PingID app sometimes fail to register, forcing users to open the app manually and enter codes. Others mention occasional double-authentication prompts where the MFA flow requires two rounds before granting access.
We think PingOne for Workforce is a solid choice if you need a scalable authentication platform with built-in SSO and MFA across a mixed application environment. The ForgeRock additions make it worth evaluating for broader identity governance needs. If your priority is deep ITDR detection and response, you may need to pair it with a dedicated threat detection layer. For workforce authentication and access management as a foundation, PingOne delivers a clean, fast experience.
Proofpoint Identity Threat Defense combines two capabilities: Spotlight for discovering identity vulnerabilities, and Shadow for deploying deception technology to detect active attackers. It’s designed for security teams that want to find identity weaknesses before attackers do, then catch lateral movement when someone gets through. The platform integrates with Proofpoint’s TAP Dashboard for broader threat context.
We found the dual approach sets Proofpoint apart in this category. Spotlight continuously scans for identity vulnerabilities across Active Directory, AWS Identity Center, and endpoints. It catches misconfigured service accounts and shadow admin accounts that traditional IAM tools miss. Risk-based prioritization helps your team focus on the exposures that matter most.
Shadow takes a different angle entirely. Instead of just detecting threats, it deploys deception artifacts that lure attackers during privilege escalation and lateral movement. We saw how this creates an early warning system that catches adversaries actively moving through your environment, not just after they’ve reached their target.
Customers highlight strong visibility into credential misuse, privilege escalation attempts, and identity-based risks that help teams stay ahead of account takeovers. Integration with existing security workflows and PAM/IAM tools streamlines remediation. SOC analysts working in large environments value the TAP Dashboard for monitoring threat activity across suppliers and partners.
The trade-off is configuration effort. Getting the platform dialed in for your environment takes investment upfront, though the consensus is that the detection value justifies the effort.
We think Proofpoint Identity Threat Defense is worth serious consideration if you want identity vulnerability management paired with active deception. The Spotlight and Shadow combination covers both prevention and detection in a way few competitors match. If your team needs a simpler, lower-touch ITDR solution, the tuning requirements may be a factor. For mature security teams protecting complex AD environments, this adds a detection layer that catches what other tools miss.
Semperis Directory Services Protector (DSP) is purpose-built for securing Active Directory and Azure AD environments. It continuously tracks changes, detects threats that bypass standard security logs, and automatically rolls back malicious alterations. If AD is the backbone of your identity infrastructure, DSP treats it as the critical asset it is.
We found DSP’s automatic rollback capability is the standout feature. When a malicious change hits your AD environment, DSP reverts it without waiting for an analyst to intervene. That’s a meaningful difference when attackers modify group policies, escalate privileges, or tamper with configurations outside business hours.
The platform monitors Indicators of Exposure (IOEs) and Indicators of Compromise (IOCs) across your AD configuration continuously. We saw how it catches changes that evade traditional security logs by monitoring at the directory replication level. This gives your team visibility into shadow AD activity that SIEM-based approaches miss entirely.
Customers consistently praise the real-time change tracking and the speed of remediation. Security architects highlight visibility into shadow AD changes and the drastic reduction in time spent investigating and reverting unauthorized modifications. Setting up monitoring rules is straightforward, and the auto-undo functionality earns strong loyalty from AD-focused teams.
The trade-offs are worth knowing. DSP requires Tier 0 privileged access to function, which is standard for AD security tools but raises governance conversations. Some customers note built-in reports feel dated, and the current version focuses on directory changes rather than authentication events like Kerberos pre-authentication failures.
We think Semperis DSP is the strongest option if Active Directory protection is your primary ITDR concern. The rollback automation and directory-level monitoring address risks that broader XDR platforms handle superficially. If you need coverage beyond AD into cloud identity providers or SaaS applications, you will need to pair DSP with additional tools. For enterprise teams where AD compromise is an existential risk, this is a specialist solution that does its job well.
SentinelOne Singularity Identity defends Active Directory and Azure AD using a combination of real-time threat detection and deception technology. It deploys lures and fake credentials on endpoints to misdirect attackers during lateral movement and credential harvesting. The platform covers managed and unmanaged devices across operating systems, including legacy Windows environments.
We found Singularity Identity’s approach to deception is distinct from network-level solutions. It places lures directly on endpoints, feeding attackers false credential data when they attempt to harvest from local stores. This catches credential theft attempts at the point of execution rather than waiting for network-level indicators.
The integration with Singularity Hologram extends deception further by deploying network decoys that capture threat intelligence from active attackers. We saw how this creates a layered deception strategy: fake credentials on endpoints, decoy systems on the network, and real-time alerts when either is triggered.
Customers praise the deployment experience. The agent installs quickly across endpoints, and the cloud-based console gives security teams remote access and device isolation capabilities from anywhere. Legacy OS support including Windows XP, 2003, and 2008 is a practical advantage for environments that still run older systems. The interface is clean and consolidates identity protection alongside the broader Singularity platform.
We think Singularity Identity is a strong fit if your team already runs SentinelOne for endpoint protection and wants identity deception layered into the same console. The credential lure technology adds detection coverage that traditional monitoring approaches miss. If your priority is AD vulnerability management or identity governance, dedicated tools in those areas go deeper. For teams focused on catching active attackers through deception across endpoints and network, this delivers a practical and differentiated capability.
Sweet Security is a cloud-native detection and response platform that unifies application, workload, and infrastructure security into a single tool. Its ITDR capabilities sit within a broader runtime protection approach, using eBPF-based sensors and behavioral analytics to detect identity threats in cloud environments. This is built for teams running Kubernetes and AWS who want identity detection tied directly to runtime context.
We found Sweet’s approach flips the traditional ITDR model. Instead of monitoring identity logs in isolation, it combines cloud log data, API signals, and lightweight runtime sensors to build environmental baselines. When identity anomalies appear, the platform correlates them with workload and application behavior to determine if the deviation is actually malicious.
The use of LLMs and behavioral analytics instead of static rules means the platform adapts to your environment rather than relying on predefined signatures. We saw how this helps identify fileless attacks and lateral movement that rule-based engines miss. Sweet presents findings as complete attack narratives rather than isolated alerts, giving your team the full chain of events for faster investigation.
Customers running AWS and Kubernetes environments highlight the low operational overhead and straightforward deployment. The eBPF-based sensors provide deep workload visibility without intrusive instrumentation, which is critical in dynamic container environments. Support and onboarding receive consistently strong marks, with teams reporting smooth integration into existing SIEM workflows.
The gaps are in customization. Customers flag limited reporting flexibility and alert tuning options. RBAC permissions are still maturing. These are the kinds of rough edges you expect from a newer platform that’s iterating quickly.
We think Sweet Security is worth evaluating if your infrastructure is cloud-native and you want identity threat detection embedded in runtime context rather than bolted on top. The unified attack narratives and runtime-first approach give your SOC a different lens than traditional ITDR tools provide. If your environment is heavily on-premises or AD-centric, dedicated directory protection tools are a better fit. For cloud-forward teams looking to consolidate detection across identity, workload, and infrastructure, Sweet offers a compelling single-platform approach.
When evaluating identity threat detection and response platforms, focus on these criteria that separate adequate coverage from thorough threat visibility.
Detection Coverage: Does the platform detect MFA abuse, unauthorized OAuth grants, mailbox rule tampering, and privilege escalation? Can it identify impossible travel, credential stuffing, and anomalous authentication patterns?
Automation Capabilities: Can you automatically lock compromised accounts, revoke sessions, or reset passwords without analyst intervention? Do policies enforce automatically based on risk, or do alerts require manual action?
Multi-Layer Correlation: Can the platform correlate identity signals with endpoint and network data? Does it require separate tools or does it provide unified visibility?
Operational Model: Can your team manage detection in house, or do you prefer managed response with vendor analysts? What’s the on-call burden?
Identity Coverage: Does it monitor your specific identity infrastructure? Does it work across multiple identity providers, or is it limited to one platform?
Integration With Existing Tools: Does it integrate with your SOC, SIEM, and access controls, or require separate vendor relationships?
Staffing And Complexity: How much identity security expertise is needed to tune detection and policies? Are there off the shelf configurations, or is significant customization required?
Weight these based on your environment. MSPs should prioritize managed response to eliminate staffing burden. Enterprises with existing CrowdStrike or Microsoft investments should evaluate tight integration. Multi-cloud organizations need cross-platform visibility.
Expert Insights is an independent editorial team that researches, tests, and reviews cybersecurity and IT solutions. No vendor can pay for a better score or a favorable review. Our Editor’s Scores are based solely on product quality. Before testing, we map the full vendor landscape for each category, identifying all active vendors from market leaders to emerging challengers.
We evaluated nine ITDR platforms across cloud-first, hybrid, and Microsoft 365-centric environments, assessing detection accuracy for MFA abuse, OAuth threats, privilege escalation, and suspicious authentication patterns. Each platform was deployed to monitor lab environments simulating enterprise identity activity, including user behavior baselines, anomalous authentication attempts, and simulated compromise scenarios. We evaluated automation capabilities, response time from detection to remediation, and integration requirements with existing SIEM and endpoint security tools.
Beyond hands on testing, we conducted extensive market research and reviewed customer feedback to validate where vendor claims diverge from operational reality. We spoke with product teams to understand detection engine capabilities and known limitations. Our editorial and commercial teams operate independently. No vendor can pay for a better score or modify our assessments before publication.
This guide is updated quarterly. For full details on our evaluation process, visit our How We Test & Review Products page.
Your ITDR choice depends on your identity infrastructure, staffing model, and whether you prefer vendor consolidation or best-of-breed solutions.
If you’re running lean IT with minimal identity security staff, Huntress Managed ITDR removes the need to monitor 24/7. Analysts investigate, and automated remediation locks compromised accounts before your team wakes up.
If you’ve invested in CrowdStrike endpoint protection, Falcon Identity Protection delivers unified identity, endpoint, and workload visibility in a single console. The correlation engine catches attacks that layer-by-layer detection misses.
Read the individual reviews above to dig into deployment specifics, detection gaps, and the trade-offs that matter for your environment.
Identity Threat Detection and Response (ITDR) solutions are category of identity tools that are designed specifically to secure identities and identity systems, such as Azure and Azure AD. Their core capabilities include monitoring identity networks to identify vulnerabilities and automatically remediate issues, such as compromised accounts, password compromise and data breaches.
The term Identity Threat Detection and Response was initially coined by Gartner, who named it as one of the top security and risk management trends in 2022. Providers in the Identity Threat Detection and Response space typically also offer complimentary identity tools, such as Identity and Access Management (IAM) and Multi-Factor Authentication (MFA) or other monitoring tools designed for the endpoint, such as Extended Detection and Response (XDR).
IDTR solutions integrate with your identity providers and identity security tools, such as Azure AD. They provide a single admin console which provides a real-time, comprehensive view of your identity network and identity risks.
Key capabilities and controls include:
Overall, IDTR solutions are designed to provide a greater level of control and security for identity systems in the same way that Endpoint Detection and Response (EDR) provides additional protection and control for endpoint security solutions. They sit alongside existing identity networks and security tools to enforce security policies, monitor risks, and automate responses to prevent identity compromise.
When selecting an ITDR solution, consider the following factors:
IDTR is a relatively young and emerging market category, and tools are likely to evolve and consolidate these feature sets. Many providers in this space either operate broader network and cybersecurity tools (such as XDR solutions) or focus more specifically on the identity space and offer dedicated MFA, IAM, and PAM solutions. We recommend larger enterprise clients look to integrate IDTR into their existing tech stack.
IDTR solutions compliment and sit alongside existing identity controls, such as Identity and Access Management (IAM) solutions. Where IAM is used to control user access and manage identities, IDTR is used to secure access, monitoring and responding to security vulnerabilities. IDTR solutions also integrate within the identity tech stack, using integrations with MFA tools to enforce additional authentication steps if it detects a compromised account, for example. IDTR tools can also integrate with privileged access management solutions to help identify gaps in privileged access or least privilege policy violations for example.
IDTR solutions also complement endpoint security tools such as endpoint detection and response (EDR) and extended detection and response (XDR). Data can be fed into broader network security tools such as security information and event monitoring (SIEM) and security orchestration automation and response (SOAR) solutions.
Joel is the Director of Content and a co-founder at Expert Insights; a rapidly growing media company focussed on covering cybersecurity solutions.
He’s an experienced journalist and editor with 8 years’ experience covering the cybersecurity space. He’s reviewed hundreds of cybersecurity solutions, interviewed hundreds of industry experts and produced dozens of industry reports read by thousands of CISOs and security professionals in topics like IAM, MFA, zero trust, email security, DevSecOps and more.
He also hosts the Expert Insights Podcast and co-writes the weekly newsletter, Decrypted. Joel is driven to share his team’s expertise with cybersecurity leaders to help them create more secure business foundations.
Laura Iannini is a Cybersecurity Analyst at Expert Insights. With deep cybersecurity knowledge and strong research skills, she leads Expert Insights’ product testing team, conducting thorough tests of product features and in-depth industry analysis to ensure that Expert Insights’ product reviews are definitive and insightful.
Laura also carries out wider analysis of vendor landscapes and industry trends to inform Expert Insights’ enterprise cybersecurity buyers’ guides, covering topics such as security awareness training, cloud backup and recovery, email security, and network monitoring. Prior to working at Expert Insights, Laura worked as a Senior Information Security Engineer at Constant Edge, where she tested cybersecurity solutions, carried out product demos, and provided high-quality ongoing technical support.
Laura holds a Bachelor’s degree in Cybersecurity from the University of West Florida.